Efficient time-delay attack detection based on node pruning and model fusion in IoT networks

被引:0
|
作者
Wenjie Zhao
Yu Wang
Wenbin Zhai
Liang Liu
Yulei Liu
机构
[1] Nanjing University of Aeronautics and Astronautics,College of Computer Science and Technology
[2] The Fifth Electronics Research Institute of the Ministry of Industry and Information Technology,undefined
来源
Peer-to-Peer Networking and Applications | 2023年 / 16卷
关键词
IoT network; Malicious node detection; Time-delay attack; Model fusion;
D O I
暂无
中图分类号
学科分类号
摘要
IoT devices are vulnerable to various attacks because they are resource-limited. This paper introduces a novel type of attack called time-delay attack. The malicious nodes delay packet forwarding by extending the processing time of packets, thus affecting the performance and availability of the network. This attack is very stealthy and difficult to detect because it does not violate any communication protocol. To the best of our knowledge, how to detect the time-delay attack in IoT networks is still an open problem. We first propose a machine learning-based baseline algorithm to detect the time-delay attack. It models the system features of each node and the forwarding time of packets to detect whether a node is malicious or not. However, the baseline algorithm needs to detect all nodes in the network, which causes unnecessary resource consumption. Moreover, using a single model in the baseline algorithm does not have high robustness. To reduce the overhead and improve the detection performance, we design an efficient Detection algorithm based on Node pruning and Model fusion (DNM). DNM uses node pruning to filter out suspected nodes from all nodes. The suspected nodes are then detected according to a fusion model. We conduct experimental evaluations based on the Cooja network simulator. The experimental results show that baseline and DNM possess close to 90% accuracy, and DNM significantly outperforms other algorithms with an average F1-score of 0.85.
引用
收藏
页码:1286 / 1309
页数:23
相关论文
共 12 条
  • [1] Efficient time-delay attack detection based on node pruning and model fusion in IoT networks
    Zhao, Wenjie
    Wang, Yu
    Zhai, Wenbin
    Liu, Liang
    Liu, Yulei
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (02) : 1286 - 1309
  • [2] ETD: An Efficient Time Delay Attack Detection Framework for UAV Networks
    Zhai, Wenbin
    Liu, Liang
    Ding, Youwei
    Sun, Shanshan
    Gu, Ying
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2913 - 2928
  • [3] HOTD: A holistic cross-layer time-delay attack detection framework for unmanned aerial vehicle networks
    Zhai, Wenbin
    Sun, Shanshan
    Liu, Liang
    Ding, Youwei
    Lu, Wanying
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2023, 177 : 117 - 130
  • [4] Detection of selective-edge packet attack based on edge reputation in IoT networks
    Yang, Lei
    Liu, Liang
    Ma, Zuchao
    Ding, Youwei
    COMPUTER NETWORKS, 2021, 188
  • [5] Multi-objective-based feature selection for DDoS attack detection in IoT networks
    Roopak, Monika
    Tian, Gui Yun
    Chambers, Jonathon
    IET NETWORKS, 2020, 9 (03) : 120 - 127
  • [6] Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks
    Liu, Liang
    Ma, Zuchao
    Meng, Weizhi
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 : 865 - 879
  • [7] Towards multiple-mix-attack detection via consensus-based trust management in IoT networks
    Ma, Zuchao
    Liu, Liang
    Meng, Weizhi
    COMPUTERS & SECURITY, 2020, 96
  • [8] Learning-Based Simultaneous Detection and Characterization of Time Delay Attack in Cyber-Physical Systems
    Ganesh, Prakhar
    Lou, Xin
    Chen, Yao
    Tan, Rui
    Yau, David K. Y.
    Chen, Deming
    Winslett, Marianne
    IEEE TRANSACTIONS ON SMART GRID, 2021, 12 (04) : 3581 - 3593
  • [9] Metric Learning-based Few-Shot Malicious Node Detection for IoT Backhaul/Fronthaul Networks
    Zhou, Ke
    Lin, Xi
    Wu, Jun
    Bashir, Ali Kashif
    Li, Jianhua
    Imran, Muhammad
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 5777 - 5782
  • [10] DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks
    Ma, Zuchao
    Liu, Liang
    Meng, Weizhi
    INFORMATION SECURITY AND PRIVACY, ACISP 2020, 2020, 12248 : 247 - 267