Identifying Malicious Nodes in Multihop IoT Networks Using Diversity and Unsupervised Learning

The increased connectivity introduced in Internet of Things (IoT) applications makes such systems vulnerable to serious security threats. In this paper, we consider one of the most challenging threats in IoT networks, where devices manipulate (maliciously or unintentionally) the data transmitted in infor-mation packets as they are being forwarded from the source to the destination. We propose unsupervised learning that exploits network diversity to detect and identify suspicious networked elements. Our proposed method can identify suspicious nodes along multihop transmission paths and under variable attack levels within the network. More specifically, we formulate a contribution metric for each networked element, which is used as a feature to cluster the nodes based on their behavior. We proposed two detection approaches, namely hard detection and soft detection. In the former, nodes are clustered into malicious or benign group; while in the latter, nodes are clustered into three groups based on their suspicious level, then highly suspicious nodes are discarded and more accurate contribution features are evaluated for the remaining nodes. Soft detection has higher detection accuracy provided that there is sufficient network diversity. Simulation results show that the proposed methods achieve high detection accuracy under different percentages of malicious nodes in the network and in the existence of channel errors.

[1]  Turgay Korkmaz,et al.  A Machine Learning Based Reputation System for Defending Against Malicious Node Behavior , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[2]  Robert McLeod,et al.  A Multi-agent Based Cognitive Approach to Unsupervised Feature Extraction and Classification for Network Intrusion Detection , 2017 .

[3]  Chau Yuen,et al.  A comparison of the popular home automation technologies , 2014, 2014 IEEE Innovative Smart Grid Technologies - Asia (ISGT ASIA).

[4]  Tongtong Li,et al.  Reliable Communications over Multihop Networks under Routing Attacks , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[5]  Andreas Pitsillides,et al.  Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures , 2014, IEEE Communications Surveys & Tutorials.

[6]  Guiling Wang,et al.  Catching Packet Droppers and Modifiers in Wireless Sensor Networks , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[7]  Yasir Mehmood,et al.  Internet-of-Things-Based Smart Cities: Recent Advances and Challenges , 2017, IEEE Communications Magazine.

[8]  Rashmi Data Mining: A Knowledge Discovery Approach , 2012 .

[9]  OwezarskiPhilippe,et al.  Online and Scalable Unsupervised Network Anomaly Detection Method , 2017 .

[10]  Y.A. Sekercioglu,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.