On-off attack detection in trust model using intra-daily variability for the IoT

Q2 Mathematics
Sornalakshmi Kannan, Revathi Venkataraman, G. Ramachandran
{"title":"On-off attack detection in trust model using intra-daily variability for the IoT","authors":"Sornalakshmi Kannan, Revathi Venkataraman, G. Ramachandran","doi":"10.11591/eei.v12i6.6110","DOIUrl":null,"url":null,"abstract":"The growth of the internet of things (IoT) increases the need to develop the trust computational model for heterogeneous networks with various IoT devices. Trust models are considered as an effective tool to mitigate insider attacks induced by IoT devices. However, trust models are exposed to on-off attacks, in which devices randomly exhibit good and bad behaviors to avoid being categorized as low-trust devices. The objective of this work is to recognize the malicious devices executing on-off attacks in IoT applications. This paper introduces an on-off attack detection strategy for the trust computational model based on the non-parametric index named intra-daily variability (IV). IV indicates trust fragmentation which depends on the frequency and the transitions between periods of low and high trust values of a device. The higher value of IV indicates the occurrence of fragmented trust values and the lower value of IV indicates the occurrence of non-fragmented trust values. Experimental results show that the proposed model outperforms the baseline methods by increasing the on-off attack detection rate.","PeriodicalId":37619,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Bulletin of Electrical Engineering and Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.11591/eei.v12i6.6110","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Mathematics","Score":null,"Total":0}
引用次数: 0

Abstract

The growth of the internet of things (IoT) increases the need to develop the trust computational model for heterogeneous networks with various IoT devices. Trust models are considered as an effective tool to mitigate insider attacks induced by IoT devices. However, trust models are exposed to on-off attacks, in which devices randomly exhibit good and bad behaviors to avoid being categorized as low-trust devices. The objective of this work is to recognize the malicious devices executing on-off attacks in IoT applications. This paper introduces an on-off attack detection strategy for the trust computational model based on the non-parametric index named intra-daily variability (IV). IV indicates trust fragmentation which depends on the frequency and the transitions between periods of low and high trust values of a device. The higher value of IV indicates the occurrence of fragmented trust values and the lower value of IV indicates the occurrence of non-fragmented trust values. Experimental results show that the proposed model outperforms the baseline methods by increasing the on-off attack detection rate.
在信任模型中利用物联网的日内变化检测攻击行为
物联网(IoT)的发展增加了开发具有各种物联网设备的异构网络的信任计算模型的需求。信任模型被认为是缓解物联网设备引起的内部攻击的有效工具。然而,信任模型容易受到on-off攻击,在这种攻击中,设备随机表现出好的和坏的行为,以避免被归类为低信任设备。这项工作的目标是识别在物联网应用程序中执行开关攻击的恶意设备。本文介绍了一种基于非参数指标每日变异度(intra- day variability, IV)的信任计算模型的开关攻击检测策略。IV表示信任碎片,依赖于设备低信任值和高信任值的频率和周期之间的转换。IV值越高,表示信任值出现碎片化,IV值越低,表示信任值出现非碎片化。实验结果表明,该模型提高了开关攻击的检测率,优于基线方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Bulletin of Electrical Engineering and Informatics
Bulletin of Electrical Engineering and Informatics Computer Science-Computer Science (miscellaneous)
CiteScore
3.60
自引率
0.00%
发文量
0
期刊介绍: Bulletin of Electrical Engineering and Informatics publishes original papers in the field of electrical, computer and informatics engineering which covers, but not limited to, the following scope: Computer Science, Computer Engineering and Informatics[...] Electronics[...] Electrical and Power Engineering[...] Telecommunication and Information Technology[...]Instrumentation and Control Engineering[...]
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信