Collusion attacks mitigation in internet of things: a fog based model

Collusion attacks are among the major security concerns nowadays due to the growth exposure in networks and communications. Internet of Things (IoT) environments are an attractive target for such type attacks. This paper discusses the problem of collusion attacks in IoT environments and how mobility of IoT devices increases the difficulty of detecting such types of attacks. It demonstrates how approaches used in detection collusion attacks in WSNs are not applicable in IoT environments. To this end, the paper introduces a model based on Fog Computing infrastructure to keep track of IoT devices and detect collusion attackers. The model uses fog computing layer for realtime monitoring and detection of collusion attacks in IoT environments. Moreover, the model uses a software defined systems layer to add a degree of flexibility for configuring Fog nodes to enable them to detect various types of collusion attacks. The paper provides algorithms, theorems, lemmas and mathematical proofs of the proposed model. Furthermore, the it highlights the possible overhead on fog nodes and network when applying the proposed model, and claims that fog layer infrastructure can provide the required resources for the scalability of the model. The experiments show how the proposed model can keep track of malicious nodes while moving from one cluster to other clusters in IoT environments in contrary to the models used in WSNs. Moreover, the experiments show that the proposed model can bear the computation overhead effectevilly, and reduces the power consumption of aggregator nodes in comparison to the models used in WSNs.

[1]  Mahmoud Al-Ayyoub,et al.  The future of mobile cloud computing: Integrating cloudlets and Mobile Edge Computing , 2016, 2016 23rd International Conference on Telecommunications (ICT).

[2]  Sangkyum Kim,et al.  Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems , 2010, 2010 IEEE International Conference on Data Mining.

[3]  Rajkumar Buyya,et al.  CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms , 2011, Softw. Pract. Exp..

[4]  Victor I. Chang,et al.  A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication , 2017, Multimedia Tools and Applications.

[5]  Meichun Hsu,et al.  Clustering billions of data points using GPUs , 2009, UCHPC-MAW '09.

[6]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[7]  Victor I. Chang,et al.  Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks , 2017, Cluster Computing.

[8]  Belle L. Tseng,et al.  User reputation in a comment rating environment , 2011, KDD.

[9]  Erman Ayday,et al.  An iterative algorithm for trust and reputation management , 2009, 2009 IEEE International Symposium on Information Theory.

[10]  Paul Van Dooren,et al.  Iterative Filtering in Reputation Systems , 2010, SIAM J. Matrix Anal. Appl..

[11]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[12]  Mahmoud Al-Ayyoub,et al.  Collusion attacks in Internet of Things: Detection and mitigation using a fog based model , 2017, 2017 IEEE Sensors Applications Symposium (SAS).

[13]  Elisa Bertino,et al.  A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks , 2013, SenSys '13.

[14]  Mahmoud Al-Ayyoub,et al.  SDMEC: Software Defined System for Mobile Edge Computing , 2016, 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW).

[15]  Tao Zhou,et al.  A robust ranking algorithm to spamming , 2010, ArXiv.

[16]  Yaser Jararweh,et al.  A Fog Computing Based System for Selective Forwarding Detection in Mobile Wireless Sensor Networks , 2016, 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W).

[17]  Yi-Cheng Zhang,et al.  Information filtering via Iterative Refinement , 2006, ArXiv.

[18]  Mahmoud Al-Ayyoub,et al.  A new broadcast scheme for sensor networks , 2014, 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA).

[19]  Victor I. Chang,et al.  Lattice assumption based fuzzy information retrieval scheme support multi-user for secure multimedia cloud , 2017, Multimedia Tools and Applications.

[20]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[21]  Yaser Jararweh,et al.  Internet of surveillance: a cloud supported large-scale wireless surveillance system , 2016, The Journal of Supercomputing.

[22]  Anurag Agarwal,et al.  The Internet of Things—A survey of topics and trends , 2014, Information Systems Frontiers.

[23]  Hong Cheng,et al.  Robust Reputation-Based Ranking on Bipartite Rating Networks , 2012, SDM.

[24]  Elisa Bertino,et al.  Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks , 2015, IEEE Transactions on Dependable and Secure Computing.

[25]  Yi-Cheng Zhang,et al.  Decoding Information from noisy, redundant, and intentionally-distorted sources , 2006 .

[26]  Victor I. Chang,et al.  Cross-domain dynamic anonymous authenticated group key management with symptom-matching for e-health social system , 2017, Future Gener. Comput. Syst..

[27]  Victor I. Chang,et al.  Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks , 2018, Future Gener. Comput. Syst..