Malicious node Detectionand Avoidance in IOT Smart home system by Considering QoS
Keywords:
IOT, Node MCU, Raspberry pi, smart home, unsupervised learning, QoSAbstract
IOT Smart home system is becoming common now a days. In this ecosystem if a data packets are corrupted or manipulated by a faulty or compromised node, then detecting the faulty node is difficult because of multi hop mesh like network. The faulty Node might lead to wrong decision and operation failure of system thus impacting the Quality of Service (QoS) of different client devices. In this paper we first create a smart home ecosystem by usingIOT nodes like Raspberry pi and Node MCU models. We apply unsupervised learning technique on statistical data collected from these nodes to accurately detect faulty/Malicious nodes. We also provide alternate route depending up on the QoS of client device.
References
[1] C. Withanage, R. Ashok, C. Yuen, and K. Otto, “A comparison of the popular home automation technologies,” in Innovative Smart Grid Technologies-Asia (ISGT Asia). IEEE, 2014, pp. 600–605.
[2] J. Zheng and M. J. Lee, “A comprehensive performance study of ieee 802.15. 4,” Sensor network operations, vol. 4, pp. 218–237, 2006.
[3] C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, “Ddos in the iot: Mirai and other botnets,” Computer, vol. 50, no. 7, pp. 80–84, 2017.
[4] S. Kriaa, M. Bouissou, and L. Pi`etre-Cambac´ed`es, “Modeling the stuxnet attack with bdmp: Towards moreformalriskassessments,”in7thInternational Conference on Risk and Security of Internet and Systems (CRiSIS). IEEE, 2012, pp. 1–8.
[5] S.J.Shackelford,A.A.Proia,B.Martell,andA.N. Craig, “Toward a global cybersecurity standard of care: Exploring the implications of the 2014 nist cybersecurity framework on shaping reasonable national and international cybersecurity practices,” Tex. Int’l LJ, vol. 50, p. 305, 2015.
[6] C.Wang,T.Feng,J.Kim,G.Wang,andW.Zhang, “Catching packet droppers and modifiers in wireless sensor networks,” IEEE Transactions on ParallelandDistributedSystems,vol.23,no.5,pp. 835–843, 2012.
[7] K. Ioannis, T. Dimitriou, and F. C. Freiling, “Towards intrusion detection in wireless sensor networks,” in Proc. of the 13th European Wireless Conference, 2007, pp. 1–10.
[8] X. Yang, J. Lin, W. Yu, P.-M. Moulema, X. Fu, and W. Zhao, “A novel en-route filtering scheme against false data injection attacks in cyberphysical networked systems,” IEEE Transactions on Computers, vol. 64, no. 1, pp. 4–18, 2015.
[9] M. Abdelhakim, L. E. Lightfoot, J. Ren, and T. Li, “Distributed detection in mobile access wireless sensor networks under byzantine attacks,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 4, pp. 950–959, 2014.
[10] T. Hayajneh, P. Krishnamurthy, D. Tipper, and T. Kim, “Detecting malicious packet dropping in the presence of collisions and channel errors in wireless ad hoc networks,” in IEEE International ConferenceonCommunications. IEEE,2009,pp. 1–6.
[11] M. Abdelhakim, L. Lightfoot, J. Ren, and T. Li, “Reliable communications overmultihop networks under routing attacks,” in Global Communications Conference(GLOBECOM). IEEE,2015,pp.1–6.
[12] M. Abdelhakim, X. Liu, and P. Krishnamurthy, “Diversityfordetectingroutingattacksinmultihop networks,” in International Conference on Computing, Networking and Communications (ICNC). IEEE, 2018, pp. 1–6.
[13] S. Kaplantzis, A. Shilton, N. Mani, and Y. A. Sekercioglu, “Detecting selective forwarding attacks in wireless sensor networks using support vector machines,” in 3rd International Conference on Intelligent Sensors, Sensor Networks and Information. IEEE, 2007, pp. 335–340.
[14] J. F. C. Joseph, B.-S. Lee, A. Das, and B.-C. Seet, “Cross-layer detection of sinking behavior in wireless ad hoc networks using svm and fda,” IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 2, pp. 233–245, 2011.
[15] A. I. Moustapha and R. R. Selmic, “Wireless sensor network modeling using modified recurrent neural networks: Application to fault detection,” IEEE Transactions on Instrumentation and Measurement, vol. 57, no. 5, pp. 981–988, 2008.
[16] D. Janakiram, V. Reddy, and A. P. Kumar, “Outlier detection in wireless sensor networks using bayesian belief networks,” in First International Conference on Communication System Software and Middleware. IEEE, 2006, pp. 1–6.
[17] K. Leung and C. Leckie, “Unsupervised anomaly detection in network intrusion detection using clusters,” in Proceedings of the Twenty-eighth Australasian conference on Computer Science, vol. 38. Australian Computer Society, Inc., 2005, pp. 333–342.
[18] S. Ruoti, S. Heidbrink, M. O’Neill, E. Gustafson, and Y. R. Choe, “Intrusion detection with unsupervised heterogeneous ensembles using cluster-based normalization,” in IEEE InternationalConferenceonWebServices. IEEE, 2017, pp. 862–865.
[19] Xin Liu, Mai Abdelhakim, Prashant Krishnamurthy, David Tipper, “Identifying Malicious Nodes in Multihop IoT Networks using Dual Link Technologies and Unsupervised Learning” Open Journal of Internet of Things (OJIOT) Volume 4, Issue 1, 2018
[20] Tiankai Liang , Bi Zeng, Jianqi Liu, Linfeng Ye,Caifeng Zou “An Unsupervised User Behavior Prediction Algorithm Based on Machine Learning and Neural Network For Smart Home” IEEE Access ( Volume: 6 ),Page(s): 49237 – 49247,Page(s): 812 – 821
[21] Irfan Awan, Muhammad Younas, Wajia Naveed “Modelling QoS in IoT Applications” 2014 17th International Conference on Network-Based Information Systems
[22] Hajar Elhammouti, Essaid Sabir, Mustapha Benjillali, Loubna Echabbi, Hamidou Tembine, “Self-Organized Connected Objects: Rethinking QoS Provisioning for IoT Services” : IEEE Communications Magazine ( Volume: 55 , Issue: 9 , Sept. 2017 )Page(s): 41 – 47
[23] Oladayo Bello, Sherali Zeadally,“Toward efficient smartification of the Internet of Things (IoT) services”Future Generation Computer SystemsVolume 92, March 2019, Pages 663-673
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
