Abstract
Due to the distributed framework, Internet of Things (IoT) is vulnerable to insider attacks like energy-depleting attack, where an attacker can behave maliciously to consume the battery of IoT devices. Such attack is difficult to detect because the attacker may behave differently under various environments and it is hard to decide the attack path. In this work, we focus on this challenge, and consider an advanced energy-depleting attack, called mix-energy-depleting attack, which combines three typical attacks such as carousel attack, flooding attack and replay attack. Regarding the detection, we propose an approach called Edge Learning Detection (ELD), which can learn malicious traffic by constructing an intrusion edge and can identify malicious nodes by building an intrusion graph. To overcome the problem that it is impractical to provide labeled data for system training in advance, our proposed ELD can train its model during detection by labeling traffic automatically. Then the obtained detection results can be used to optimize the adaptability of ELD in detecting practical attacks. In the evaluation, as compared with some similar methods, ELD can overall provide a better detection rate ranged from 5% to 40% according to concrete conditions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ahmad, I., Basheri, M., Iqbal, M.J., Rahim, A.: Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access 6, 33789–33795 (2018)
Akhil Dubey, V.J., Kumar, A.: A survey in energy drain attacks and their countermeasures in wireless sensor networks. Int. J. Eng. Res. Technol. 3, 1206–1210 (2014)
Bhunia, S.S., Gurusamy, M.: Dynamic attack detection and mitigation in IoT using SDN. In: 27th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1–6. IEEE (2017)
Du, Q., Wei, Y., Mao, Y.: Distributed deployment of anomaly detection scheme in resource-limited IoT devices. In: IEEE ICCT, pp. 323–329. IEEE (2019)
Geethanjali, N., Gayathri, E.: A survey on energy depletion attacks in wireless sensor networks. Int. J. Sci. Res. 3(9), 2070–2074 (2014)
Gelenbe, E., Kadioglu, Y.M.: Energy life-time of wireless nodes with network attacks and mitigation. In: 2018 IEEE ICC Workshops, pp. 1–6. IEEE (2018)
Liu, L., Ma, Z., Meng, W.: Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks. Future Gener. Comput. Syst. 101, 865–879 (2019)
Liu, X., Abdelhakim, M., Krishnamurthy, P., Tipper, D.: Identifying malicious nodes in multihop IoT networks using diversity and unsupervised learning. In: 2018 IEEE ICC, pp. 1–6. IEEE (2018)
Luo, T., Nagarajan, S.G.: Distributed anomaly detection using autoencoder neural networks in WSN for IoT. In: IEEE ICC, pp. 1–6. IEEE (2018)
Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1–6. IEEE (2015)
Nguyen, T., Ngo, T., Nguyen, T.: The flooding attack in low power and lossy networks: a case study. In: International Conference on Smart Communications in Network Technologies (SaCoNeT), pp. 183–187. IEEE (2018)
Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825–2830 (2011)
Pu, C.: Energy depletion attack against routing protocol in the Internet of Things. In: IEEE CCNC, pp. 1–4. IEEE (2019)
Resende, P.A.A., Drummond, A.C.: A survey of random forest based methods for intrusion detection systems. ACM Comput. Surv. (CSUR) 51(3), 1–36 (2018)
Rughoobur, P., Nagowah, L.: A lightweight replay attack detection framework for battery depended IoT devices designed for healthcare. In: Proceedings of ICTUS, pp. 811–817. IEEE (2017)
Sedjelmaci, H., Senouci, S.M., Al-Bahri, M.: A lightweight anomaly detection technique for low-resource IoT devices: a game-theoretic methodology. In: IEEE ICC, pp. 1–6. IEEE (2016)
Sharma, V., Hussain, M.: Mitigating replay attack in wireless sensor network through assortment of packets. In: Satapathy, S.C., Prasad, V.K., Rani, B.P., Udgata, S.K., Raju, K.S. (eds.) Proceedings of the First International Conference on Computational Intelligence and Informatics. AISC, vol. 507, pp. 221–230. Springer, Singapore (2017). https://doi.org/10.1007/978-981-10-2471-9_22
Singh, S., Jain, P.: Detection and prevention for avoidance of energy draining vampire attack in MANET. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 7(5), 966–970 (2017)
Singh, S.R., Narendra Babu, C.R.: Improving the performance of energy attack detection in wireless sensor networks by secure forward mechanism. Int. J. Sci. Res. Publ. 4, 367 (2014)
Soni, M., Pahadiya, B.: Detection and removal of vampire attack in wireless sensor network. Int. J. Comput. Appl. 126(7), 46–50 (2015)
Vasserman, E.Y., Hopper, N.: Vampire attacks: draining life from wireless ad hoc sensor networks. IEEE Trans. Mob. Comput. 12(2), 318–332 (2011)
Acknowledgments
This work is supported by the National Natural Science Foundation of China under Grant No. 61402225 and the Science and Technology Funds from National State Grid Ltd. (The Research on Key Technologies of Distributed Parallel Database Storage and Processing based on Big Data).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Ma, Z., Liu, L., Meng, W. (2020). ELD: Adaptive Detection of Malicious Nodes under Mix-Energy-Depleting-Attacks Using Edge Learning in IoT Networks. In: Susilo, W., Deng, R.H., Guo, F., Li, Y., Intan, R. (eds) Information Security. ISC 2020. Lecture Notes in Computer Science(), vol 12472. Springer, Cham. https://doi.org/10.1007/978-3-030-62974-8_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-62974-8_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-62973-1
Online ISBN: 978-3-030-62974-8
eBook Packages: Computer ScienceComputer Science (R0)