Secure-MQTT: an efficient fuzzy logic-based approach to detect DoS attack in MQTT protocol for internet of things

被引:55
作者
Haripriya, A. P. [1 ]
Kulothungan, K. [1 ]
机构
[1] Anna Univ, Dept IST, Chennai, Tamil Nadu, India
关键词
Intrusion detection; Fuzzy interpolation; Fuzzy inference engine; Rule base; Publisher; Subscriber; Broker; INTRUSION DETECTION;
D O I
10.1186/s13638-019-1402-8
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The advancements in the domain of Internet of Things (IoT) accelerated the development of new communication technologies. Machine to machine communication in IoT is accomplished with application protocols such as the Constrained Application Protocol and Message Queuing Telemetry Transport (MQTT). The openness of these protocols leads to various types of attacks including DoS Attack. MQTT is widely used in secure IoT applications like health monitoring. One of the prominent attacks in IoT is the denial of service (DoS) attack. This enforces the need for an efficient intrusion detection system method in MQTT-based application. In this paper, we address the vulnerabilities in MQTT, through which intruders can control the low-configuration devices in the network. This paper proposes a lightweight fuzzy logic-based intrusion detection scheme called Secure-MQTT, for detecting malicious activity during the communication between IoT devices. The proposed method uses a fuzzy logic-based system to detect the malicious behavior of the node with the help of a fuzzy rule interpolation mechanism. Secure-MQTT avoids the use of a dense rule base by exploiting the fuzzy rule interpolation that generates rules dynamically. The proposed method provides an effective mechanism to protect the low configuration devices from the DoS attack. The simulation results show that the proposed method detects the attacks more accurately when compared to the existing methods.
引用
收藏
页数:15
相关论文
共 26 条
  • [1] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
    Al-Fuqaha, Ala
    Guizani, Mohsen
    Mohammadi, Mehdi
    Aledhari, Mohammed
    Ayyash, Moussa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
  • [2] Internet of Things: A survey on the security of IoT frameworks
    Ammar, Mahmoud
    Russello, Giovanni
    Crispo, Bruno
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 : 8 - 27
  • [3] The Internet of Things: A survey
    Atzori, Luigi
    Iera, Antonio
    Morabito, Giacomo
    [J]. COMPUTER NETWORKS, 2010, 54 (15) : 2787 - 2805
  • [4] Cho E, 2009, LECT NOTES COMPUTER, V5787, P515
  • [5] TCP in the Internet of Things: From Ostracism to Prominence
    Gomez, Carles
    Arcia-Moret, Andres
    Crowcroft, Jon
    [J]. IEEE INTERNET COMPUTING, 2018, 22 (01) : 29 - 41
  • [6] Fuzzy interpolative reasoning via scale and move transformations
    Huang, ZH
    Shen, Q
    [J]. IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2006, 14 (02) : 340 - 359
  • [7] MQTT-S - A publish/subscribe protocol for Wireless Sensor Networks
    Hunkeler, Urs
    Truong, Hong Linh
    Stanford-Clark, Andy
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEM SOFTWARE AND MIDDLEWARE AND WORKSHOPS, VOLS 1 AND 2, 2008, : 791 - +
  • [8] An Efficient Device Authentication Protocol Without Certification Authority for Internet of Things
    Jang, Sunggyun
    Lim, Ducsun
    Kang, Jinyeong
    Joe, Inwhee
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (04) : 1681 - 1695
  • [10] Lavrova Daria, 2015, International Journal of Communication Networks and Information Security, V7, P131