Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

ELD: Adaptive Detection of Malicious Nodes under Mix-Energy-Depleting-Attacks Using Edge Learning in IoT Networks

  • Conference paper
  • First Online:
Information Security (ISC 2020)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12472))

Included in the following conference series:

  • 971 Accesses

Abstract

Due to the distributed framework, Internet of Things (IoT) is vulnerable to insider attacks like energy-depleting attack, where an attacker can behave maliciously to consume the battery of IoT devices. Such attack is difficult to detect because the attacker may behave differently under various environments and it is hard to decide the attack path. In this work, we focus on this challenge, and consider an advanced energy-depleting attack, called mix-energy-depleting attack, which combines three typical attacks such as carousel attack, flooding attack and replay attack. Regarding the detection, we propose an approach called Edge Learning Detection (ELD), which can learn malicious traffic by constructing an intrusion edge and can identify malicious nodes by building an intrusion graph. To overcome the problem that it is impractical to provide labeled data for system training in advance, our proposed ELD can train its model during detection by labeling traffic automatically. Then the obtained detection results can be used to optimize the adaptability of ELD in detecting practical attacks. In the evaluation, as compared with some similar methods, ELD can overall provide a better detection rate ranged from 5% to 40% according to concrete conditions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ahmad, I., Basheri, M., Iqbal, M.J., Rahim, A.: Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access 6, 33789–33795 (2018)

    Article  Google Scholar 

  2. Akhil Dubey, V.J., Kumar, A.: A survey in energy drain attacks and their countermeasures in wireless sensor networks. Int. J. Eng. Res. Technol. 3, 1206–1210 (2014)

    Google Scholar 

  3. Bhunia, S.S., Gurusamy, M.: Dynamic attack detection and mitigation in IoT using SDN. In: 27th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1–6. IEEE (2017)

    Google Scholar 

  4. Du, Q., Wei, Y., Mao, Y.: Distributed deployment of anomaly detection scheme in resource-limited IoT devices. In: IEEE ICCT, pp. 323–329. IEEE (2019)

    Google Scholar 

  5. Geethanjali, N., Gayathri, E.: A survey on energy depletion attacks in wireless sensor networks. Int. J. Sci. Res. 3(9), 2070–2074 (2014)

    Google Scholar 

  6. Gelenbe, E., Kadioglu, Y.M.: Energy life-time of wireless nodes with network attacks and mitigation. In: 2018 IEEE ICC Workshops, pp. 1–6. IEEE (2018)

    Google Scholar 

  7. Liu, L., Ma, Z., Meng, W.: Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks. Future Gener. Comput. Syst. 101, 865–879 (2019)

    Article  Google Scholar 

  8. Liu, X., Abdelhakim, M., Krishnamurthy, P., Tipper, D.: Identifying malicious nodes in multihop IoT networks using diversity and unsupervised learning. In: 2018 IEEE ICC, pp. 1–6. IEEE (2018)

    Google Scholar 

  9. Luo, T., Nagarajan, S.G.: Distributed anomaly detection using autoencoder neural networks in WSN for IoT. In: IEEE ICC, pp. 1–6. IEEE (2018)

    Google Scholar 

  10. Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1–6. IEEE (2015)

    Google Scholar 

  11. Nguyen, T., Ngo, T., Nguyen, T.: The flooding attack in low power and lossy networks: a case study. In: International Conference on Smart Communications in Network Technologies (SaCoNeT), pp. 183–187. IEEE (2018)

    Google Scholar 

  12. Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825–2830 (2011)

    MathSciNet  MATH  Google Scholar 

  13. Pu, C.: Energy depletion attack against routing protocol in the Internet of Things. In: IEEE CCNC, pp. 1–4. IEEE (2019)

    Google Scholar 

  14. Resende, P.A.A., Drummond, A.C.: A survey of random forest based methods for intrusion detection systems. ACM Comput. Surv. (CSUR) 51(3), 1–36 (2018)

    Article  Google Scholar 

  15. Rughoobur, P., Nagowah, L.: A lightweight replay attack detection framework for battery depended IoT devices designed for healthcare. In: Proceedings of ICTUS, pp. 811–817. IEEE (2017)

    Google Scholar 

  16. Sedjelmaci, H., Senouci, S.M., Al-Bahri, M.: A lightweight anomaly detection technique for low-resource IoT devices: a game-theoretic methodology. In: IEEE ICC, pp. 1–6. IEEE (2016)

    Google Scholar 

  17. Sharma, V., Hussain, M.: Mitigating replay attack in wireless sensor network through assortment of packets. In: Satapathy, S.C., Prasad, V.K., Rani, B.P., Udgata, S.K., Raju, K.S. (eds.) Proceedings of the First International Conference on Computational Intelligence and Informatics. AISC, vol. 507, pp. 221–230. Springer, Singapore (2017). https://doi.org/10.1007/978-981-10-2471-9_22

    Chapter  Google Scholar 

  18. Singh, S., Jain, P.: Detection and prevention for avoidance of energy draining vampire attack in MANET. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 7(5), 966–970 (2017)

    Google Scholar 

  19. Singh, S.R., Narendra Babu, C.R.: Improving the performance of energy attack detection in wireless sensor networks by secure forward mechanism. Int. J. Sci. Res. Publ. 4, 367 (2014)

    Google Scholar 

  20. Soni, M., Pahadiya, B.: Detection and removal of vampire attack in wireless sensor network. Int. J. Comput. Appl. 126(7), 46–50 (2015)

    Google Scholar 

  21. Vasserman, E.Y., Hopper, N.: Vampire attacks: draining life from wireless ad hoc sensor networks. IEEE Trans. Mob. Comput. 12(2), 318–332 (2011)

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China under Grant No. 61402225 and the Science and Technology Funds from National State Grid Ltd. (The Research on Key Technologies of Distributed Parallel Database Storage and Processing based on Big Data).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weizhi Meng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ma, Z., Liu, L., Meng, W. (2020). ELD: Adaptive Detection of Malicious Nodes under Mix-Energy-Depleting-Attacks Using Edge Learning in IoT Networks. In: Susilo, W., Deng, R.H., Guo, F., Li, Y., Intan, R. (eds) Information Security. ISC 2020. Lecture Notes in Computer Science(), vol 12472. Springer, Cham. https://doi.org/10.1007/978-3-030-62974-8_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-62974-8_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-62973-1

  • Online ISBN: 978-3-030-62974-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics