Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3242102.3242145acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
short-paper

An Intrusion Detection System for Constrained WSN and IoT Nodes Based on Binary Logistic Regression

Published: 25 October 2018 Publication History

Abstract

In this paper we evaluate the feasibility of running a lightweight Intrusion Detection System within a constrained sensor or IoT node. We propose mIDS, which monitors and detects attacks using a statistical analysis tool based on Binary Logistic Regression (BLR). mIDS takes as input only local node parameters for both benign and malicious behavior and derives a normal behavior model that detects abnormalities within the constrained node.We offer a proof of correct operation by testing mIDS in a setting where network-layer attacks are present. In such a system, critical data from the routing layer is obtained and used as a basis for profiling sensor behavior. Our results show that, despite the lightweight implementation, the proposed solution achieves attack detection accuracy levels within the range of 96% - 100%.

References

[1]
Felix Büsching, Ulf Kulau, and Lars Wolf. 2011. Demo: INGA - An Inexpensive Node for General Applications. In Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems (SenSys '11). ACM, Seattle, WA, USA, 2.
[2]
A. P. R. da Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L. B. Ruiz, and H. C. Wong. 2005. Decentralized Intrusion Detection in Wireless Sensor Networks. In Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks (Q2SWinet '05). ACM, New York, NY, USA, 16--23.
[3]
A. Dunkels, J. Eriksson, N. Finne, and N. Tsiftes. 2011. Powertrace: Network-Level Power Profiling for Low-power Wireless Networks. Technical Report. Swedish Institute of Computer Science.
[4]
C. Ioannou and V. Vassiliou. 2016. The Impact of Network Layer Attacks in Wireless Sensor Networks. In International Workshop on Secure Internet of Things (SIoT 2016). Crete, Greece.
[5]
C. Ioannou, V. Vassiliou, and C. Sergiou. 2016. RMT: A Wireless Sensor Network Monitoring Tool. In Proceedings of the 13th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks (PE-WASUN '16). ACM, New York, NY, USA.
[6]
C. Ioannou, V. Vassiliou, and C. Sergiou. 2017. An Intrusion Detection System for Wireless Sensor Networks. In 2017 24rd International Conference on Telecommunications (ICT).
[7]
MAXFOR Technology Inc 2011. Sensor Network Makes Sensational World. MAXFOR Technology Inc.
[8]
Moteiv Corporation 2006. Tmote Sky Ultra Low Power IEEE 802.15.4 compliant wireless sensor module. Moteiv Corporation.
[9]
Fredrik Österlind. 2011. Improving Low-Power Wireless Protocols With TimingAccurate Simulation. (2011).
[10]
S. Raza, L. Wallgren, and T. Voigt. 2013. SVELTE: Real-time Intrusion Detection in the Internet of Things. Ad hoc networks 11, 8 (2013), 2661--2674.
[11]
US-CERT. 2016. Alert (TA16--288A) Heightened DDoS Threat Posed by Mirai and Other Botnets. https://www.us-cert.gov/ncas/alerts/TA16--288A
[12]
J. Zhou, Z. Cao, X. Dong, and A. V. Vasilakos. 2017. Security and Privacy for Cloud-Based IoT: Challenges. IEEE Communications Magazine 55 (2017).

Cited By

View all
  • (2024)An Overview of Problems and Difficulties with ML in WSNs ProtectionEuropean Journal of Applied Science, Engineering and Technology10.59324/ejaset.2024.2(2).182:2(245-278)Online publication date: 1-Mar-2024
  • (2024)Distributed Denial of Services (DDoS) & IoT Botnet Malware Identification Using Machine Learning & Deep Learning Models2024 Second International Conference on Advances in Information Technology (ICAIT)10.1109/ICAIT61638.2024.10690305(1-6)Online publication date: 24-Jul-2024
  • (2024)Machine Learning Solutions for the Security of Wireless Sensor Networks: A ReviewIEEE Access10.1109/ACCESS.2024.335531212(12699-12719)Online publication date: 2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MSWIM '18: Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems
October 2018
372 pages
ISBN:9781450359603
DOI:10.1145/3242102
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 October 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. binary logistic regression
  2. internet of things
  3. intrusion detection systems
  4. wireless sensor networks

Qualifiers

  • Short-paper

Conference

MSWIM '18
Sponsor:

Acceptance Rates

Overall Acceptance Rate 398 of 1,577 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)18
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)An Overview of Problems and Difficulties with ML in WSNs ProtectionEuropean Journal of Applied Science, Engineering and Technology10.59324/ejaset.2024.2(2).182:2(245-278)Online publication date: 1-Mar-2024
  • (2024)Distributed Denial of Services (DDoS) & IoT Botnet Malware Identification Using Machine Learning & Deep Learning Models2024 Second International Conference on Advances in Information Technology (ICAIT)10.1109/ICAIT61638.2024.10690305(1-6)Online publication date: 24-Jul-2024
  • (2024)Machine Learning Solutions for the Security of Wireless Sensor Networks: A ReviewIEEE Access10.1109/ACCESS.2024.335531212(12699-12719)Online publication date: 2024
  • (2024)Integration of artificial intelligence (AI) with sensor networks: Trends, challenges, and future directionsJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2023.10189236:1(101892)Online publication date: Jan-2024
  • (2024)Enhancing Wireless Sensor Network Security with Machine LearningCybernetics and Control Theory in Systems10.1007/978-3-031-70300-3_45(604-626)Online publication date: 17-Oct-2024
  • (2023)FSCB-IDS: Feature Selection and Minority Class Balancing for Attacks Detection in VANETsApplied Sciences10.3390/app1313748813:13(7488)Online publication date: 25-Jun-2023
  • (2023)Sinkhole detection and prediction using watermarking (SNDW)Journal of Intelligent & Fuzzy Systems10.3233/JIFS-22446345:4(7005-7023)Online publication date: 4-Oct-2023
  • (2023)DNN Is Not All You Need: Parallelizing Non-neural ML Algorithms on Ultra-low-power IoT ProcessorsACM Transactions on Embedded Computing Systems10.1145/357113322:3(1-33)Online publication date: 31-May-2023
  • (2023)Trust Evaluation of Topological Nodes in Intelligent Connected Vehicles Communication Network under Zero-Trust Environment2023 CAA Symposium on Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS)10.1109/SAFEPROCESS58597.2023.10295910(1-6)Online publication date: 22-Sep-2023
  • (2023)Six-GraphSecurity: Industrial Internet Intrusion Detection Based On Graph Neural Network2023 IEEE 7th Information Technology and Mechatronics Engineering Conference (ITOEC)10.1109/ITOEC57671.2023.10291647(1340-1344)Online publication date: 15-Sep-2023
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media