DOI QR코드

DOI QR Code

A new method to detect attacks on the Internet of Things (IoT) using adaptive learning based on cellular learning automata

  • Dogani, Javad (Department of Electrical and Computer Engineering, University of Hormozgan) ;
  • Farahmand, Mahdieh (Department of Mechanics, Electrical and Computer, Islamic Azad University Science and Research Branch) ;
  • Daryanavard, Hassan (Department of Electrical and Computer Engineering, University of Hormozgan)
  • 투고 : 2021.02.06
  • 심사 : 2021.08.23
  • 발행 : 2022.02.01

초록

The Internet of Things (IoT) is a new paradigm that connects physical and virtual objects from various domains such as home automation, industrial processes, human health, and monitoring. IoT sensors receive information from their environment and forward it to their neighboring nodes. However, the large amounts of exchanged data are vulnerable to attacks that reduce the network performance. Most of the previous security methods for IoT have neglected the energy consumption of IoT, thereby affecting the performance and reducing the network lifetime. This paper presents a new multistep routing protocol based on cellular learning automata. The network lifetime is improved by a performance-based adaptive reward and fine parameters. Nodes can vote on the reliability of their neighbors, achieving network reliability and a reasonable level of security. Overall, the proposed method balances the security and reliability with the energy consumption of the network.

키워드

참고문헌

  1. L. Lee and K. Lee, The Internet of Things (IoT): Applications, investments, and challenges for enterprises, Bus. Horiz. 4 (2015), 431-440. https://doi.org/10.1016/j.bushor.2015.03.008
  2. M. M. Noor and W. H. Hassan, Current research on Internet of Things (IoT) security: A survey, Comput. Netw. 148 (2019), 283-294. https://doi.org/10.1016/j.comnet.2018.11.025
  3. E. B. Priyanka, C. Maheswari, and S. Thangavel, A smart-integrated IoT module for intelligent transportation in oil industry, Int. J. Numer. Model. 1 (2020), article no. e2731.
  4. L. Garcia et al., IoT-based smart irrigation systems: An overview on the recent trends on sensors and IoT systems for irrigation in precision agriculture, Sensors 20 (2020), article no. 1042.
  5. F. Mehmood et al., A novel approach towards the design and implementation of virtual network based on controller in future IoT applications, Electronics 9 (2020), article no. 604.
  6. F. John Dian, R. Vahidnia, and A. Rahmati, Wearables and the Internet of Things (IoT), applications, opportunities, and challenges: A survey, IEEE Access 8 (2020), 69200-69211. https://doi.org/10.1109/access.2020.2986329
  7. K. Ashton, That 'Internet of Things' thing, 2009, Available from: http://www.rfidjournal.com/articles/view?4986
  8. K. Shafique et al., Internet of Things (IoT) for next-generation smart systems: A review of current challenges, future trends and prospects for emerging 5G-IoT scenarios, IEEE Access 8 (2020), 23022-23040. https://doi.org/10.1109/access.2020.2970118
  9. L. Greco et al., Trends in IoT based solutions for health care: Moving AI to the edge, Pattern Recognit. Lett. 135 (2020), 346-353. https://doi.org/10.1016/j.patrec.2020.05.016
  10. F. Al-Turjman, H. Zahmatkesh, and R. Shahroze, An overview of security and privacy in smart cities IoT communications, Trans. Emerg. Telecommun. Technol. (2019), e3677.
  11. V. Hassija et al., A survey on IoT security: Application areas, security threats, and solution architectures, IEEE Access 7 (2019), 82721-82743. https://doi.org/10.1109/access.2019.2924045
  12. N. Chaabouni et al., Network intrusion detection for IoT security based on learning techniques, IEEE Commun. Surv. Tutor. 21 (2019), 2671-2701. https://doi.org/10.1109/COMST.2019.2896380
  13. M. Gajewski et al., Anomaly traffic detection and correlation in smart home automation IoT systems, Trans. Emerg. Telecommun. Technol. 1 (2020), article no. e4053.
  14. L. Chettri and R. Bera, A comprehensive survey on Internet of Things (IoT) toward 5G wireless systems, IEEE Internet Things J. 7 (2020), 16-32. https://doi.org/10.1109/jiot.2019.2948888
  15. M. F. Elrawy, A. I. Awad, and H. F. A. Hamed, Intrusion detection systems for IoT-based smart environments: A survey, J. Cloud Comput. 7 (2018), 1-20. https://doi.org/10.1186/s13677-017-0102-3
  16. M. D. S. S. Romeo, Intrusion detection system (IDS) in Internet of Things (IoT) devices for smart home, Int. J. Psychosoc. Rehabil. 23 (2019), 1217-1227.
  17. S. N. Mohanty et al., An efficient lightweight integrated blockchain (ELIB) model for IoT security and privacy, Future Gener. Comput. Syst. 102 (2020), 1027-1037. https://doi.org/10.1016/j.future.2019.09.050
  18. Y. Maleh and A. Ezzati, Towards an efficient datagram transport layer security for constrained applications in Internet of Things, Int. Rev. Comput. Softw. 11 (2016), 611-621.
  19. P. Sudhakaran, Energy efficient distributed lightweight authentication and encryption technique for IoT security, Int. J. Commun. Syst. (2019), article no. e4198.
  20. J. Kari, Theory of cellular automata: A survey, Theor. Comput. Sci. 334 (2005), 3-33. https://doi.org/10.1016/j.tcs.2004.11.021
  21. H. H. Pajouh et al., A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks, IEEE Trans. Emerg. Topics Comput. Secur. 7 (2019), no. 2, 314-323. https://doi.org/10.1109/TETC.2016.2633228
  22. R. Rani, S. Kumar, and U. Dohare, Trust evaluation for light weight security in sensor enabled Internet of Things: Game theory oriented approach, IEEE Internet Things J. 6 (2019), 8421-8432. https://doi.org/10.1109/jiot.2019.2917763
  23. T. D. Nguyen et al., DI OT: A federated self-learning anomaly detection system for IoT, in Proc. IEEE Int. Conf. Distrib. Comput. Syst. (ICDCS), (Dallas, TX, USA), July 2019.
  24. H. Zhu et al., Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks, Int. J. Distrib. Sens. Netw. 14 (2018), no. 11, 1-15.
  25. D. Airehrour, J. Gutierrez, and S. Kumar Ray, A lightweight trust design for IoT routing, in Proc. IEEE Int. Conf. Dependable, Auton. Secure Comput. & Int. Conf. Pervasive Intell. Comput. & Int. Conf. Big Data Intell. Comput. Cyber Sci. Technol. Congr. (DASC/PiCom/DataCom/CyberSciTech), (Auckland, New Zealand), Aug. 2016.
  26. Y. Fu et al., An automata based intrusion detection method for Internet of Things, Mob. Inf. Syst. 2017 (2017), 1-13.
  27. X. Yan et al., Trustworthy network anomaly detection based on an adaptive learning rate and momentum in IIoT, IEEE Trans. Industr. Inform. 16 (2020), no. 9, 6182-6192. https://doi.org/10.1109/tii.2020.2975227
  28. H. Wu and W. Wang, A game theory based collaborative security detection method for Internet of Things systems, IEEE Trans. Inf. Forensics Secur. 13 (2018), no. 6, 1432-1445. https://doi.org/10.1109/tifs.2018.2790382
  29. T. Gu et al., Towards learning-automation IoT attack detection through reinforcement learning, in Proc. IEEE Int. Symp. World Wirel. Mob. Multimed. Netw. (WoWMoM), (Cork, Ireland), Aug. 2020.
  30. S. Venkatraman and B. Surendiran, Adaptive hybrid intrusion detection system for crowd sourced multimedia Internet of Things systems, Multimed. Tools Appl. 79 (2020), 3993-4010. https://doi.org/10.1007/s11042-019-7495-6
  31. A. A. Diro and N. Chilamkurti, Distributed attack detection scheme using deep learning approach for Internet of Things, Future Gener. Comput. Syst. 82 (2018), 761-768. https://doi.org/10.1016/j.future.2017.08.043
  32. S. Rezvy et al., An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks, in Proc. Annu. Conf. Inf. Sci. Syst. (CISS), (Baltimore, MD, USA), Mar. 2019, 1-6.
  33. B. Hussain et al., Deep learning-based DDoS-attack detection for cyber-physical system over 5G network, IEEE Trans. Industr. Inform. 17 (2021), no. 2, 860-870. https://doi.org/10.1109/tii.2020.2974520
  34. W. Q. Li, Q. Yu, and L. X. Ma, Cellular automata-based WSN energy saving technology, Adv. Mat. Res. 546-547 (2012), 1334-1339. https://doi.org/10.4028/www.scientific.net/AMR.546-547.1334