Abstract
With the rapid development of the Internet of Things and its widespread deployment in daily life and production, malicious node detection is becoming more and more important. The attackers can invade the normal nodes to launch various attacks like dropping or tampering data packets. As the current approaches mainly rely on injecting and collecting data for a period of time and out-of-band communications between nodes and the sink node, it is lagging. In addition, these approaches rely on reliable source nodes and use offline data to calculate, which slows down the detection speed. In this paper, for the first time, we propose an Online learning Real-time Malicious node Detection scheme (ORMD) for IoT network. ORMD adopts an out-of-band-free data collection method, in which probe packets are injected from the sink node to randomly chosen source nodes. The source nodes return the probe packets back to the sink node. The sink node analyzes the returned probe packets to obtain the path’s reliability which is used to derive the node’s reliability. The derivation of the node’s reliability is formalized as a multiple linear regression problem, which can be solved by online learning algorithm. Simulation results show that ORMD can detect malicious nodes in real time with a high accuracy, up to 96%.
Supported by the National Key R&D Program of China (Grant No.2020AAA0107700), the National Natural Science Foundation of China (Grant 62076125, U20B2049, U20B2050), State Key Laboratory Foundation of smart grid protection and operation control, the Science and Technology Funds from National State Grid Ltd.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (IoT): a vision, architectural elements, and future directions. Futur. Gener. Comput. Syst. 29(7), 1645–1660 (2013)
Fantacci, R., Pecorella, T., Viti, R., Carlini, C.: A network architecture solution for efficient IoT WSN backhauling: challenges and opportunities. IEEE Wirel. Commun. 21(4), 113–119 (2014)
Meddeb, R., Triki, B., Jemili, F., Korbaa, O.: A survey of attacks in mobile ad hoc networks. In: 2017 International Conference on Engineering & MIS (ICEMIS), pp. 1–7. IEEE (2017)
Ren, K., Lou, W., Zhang, Y.: LEDS: providing location-aware end-to-end data security in wireless sensor networks. IEEE Trans. Mob. Comput. 7(5), 585–598 (2008)
Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395–411 (2018)
Liu, L., Ma, Z., Meng, W.: Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks. Futur. Gener. Comput. Syst. 101, 865–879 (2019)
Liu, X., Abdelhakim, M., Krishnamurthy, P., Tipper, D.: Identifying malicious nodes in multihop IoT networks using diversity and unsupervised learning. In: 2018 IEEE International Conference on Communications (ICC), pp. 1–6. IEEE (2018)
Sun, Y.L., Yu, W., Han, Z., Liu, K.R.: Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE J. Sel. Areas Commun. 24(2), 305–317 (2006)
Sen, J., Chowdhury, P.R., Sengupta, I.: A distributed trust establishment scheme for mobile ad hoc networks. In: 2007 International Conference on Computing: Theory and Applications (ICCTA 2007), pp. 51–58. IEEE (2007)
Liqin, T., et al.: Computation and analysis of node intending trust in WSNs. In: 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, pp. 496–499. IEEE (2010)
Rikli, N.-E., Alnasser, A.: Lightweight trust model for the detection of concealed malicious nodes in sparse wireless ad hoc networks. Int. J. Distrib. Sens. Netw. 12(7), 1550147716657246 (2016)
Zhang, W., Zhu, S., Tang, J., Xiong, N.: A novel trust management scheme based on dempster-shafer evidence theory for malicious nodes detection in wireless sensor networks. J. Supercomput. 74(4), 1779–1801 (2018)
Alshehri, M.D., Hussain, F.K.: A fuzzy security protocol for trust management in the internet of things (fuzzy-IoT). Computing 101(7), 791–818 (2019)
Lwin, M.T., Yim, J., Ko, Y.-B.: Blockchain-based lightweight trust management in mobile ad-hoc networks. Sensors 20(3), 698 (2020)
Bao, F., Chen, R., Chang, M.J., Cho, J.-H.: Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Netw. Serv. Manag. 9(2), 169–183 (2012)
Renubala, S., Dhanalakshmi, K.S.: Trust based secure routing protocol using fuzzy logic in wireless sensor networks. In: 2014 IEEE International Conference on Computational Intelligence and Computing Research, pp. 1–5. IEEE (2014)
Das, S., Das, A.: An algorithm to detect malicious nodes in wireless sensor network using enhanced leach protocol. In: 2015 International Conference on Advances in Computer Engineering and Applications, pp. 875–881. IEEE (2015)
Al Hayajneh, A., Bhuiyan, M.Z.A., McAndrew, I.: A novel security protocol for wireless sensor networks with cooperative communication. Computers 9(1), 4 (2020)
Dai, H., Liu, H., Jia, Z.: Dynamic malicious node detection with semi-supervised multivariate classification in cognitive wireless sensor networks. Concurr. Comput. Pract. Exp. 27(12), 2910–2923 (2015)
Gao, B., Maekawa, T., Amagata, D., Hara, T.: Environment-adaptive malicious node detection in manets with ensemble learning. In: 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pp. 556–566. IEEE (2018)
Eziama, E., Tepe, K., Balador, A., Nwizege, K.S., Jaimes, L.M.S.: Malicious node detection in vehicular ad-hoc network using machine learning and deep learning. In: 2018 IEEE Globecom Workshops (GC Wkshps), pp. 1–6. IEEE (2018)
Ravi, N., Shalinie, S.M.: Learning-driven detection and mitigation of DDoS attack in IoT via SDN-cloud architecture. IEEE Internet Things J. 7(4), 3559–3570 (2020)
Kharrufa, H., Al-Kashoash, H., Al-Nidawi, Y., Mosquera, M.Q., Kemp, A.H.: Dynamic RPL for multi-hop routing in IoT applications. In: 2017 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS), pp. 100–103. IEEE (2017)
Marina, M.K., Das, S.R.: Ad hoc on-demand multipath distance vector routing. Wirel. Commun. Mob. Comput. 6(7), 969–988 (2006)
Wang, C., Hussain, S.R., Bertino, E.: Dictionary based secure provenance compression for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 27(2), 405–418 (2015)
Ying, Y., Pontil, M.: Online gradient descent learning algorithms. Found. Comput. Math. 8(5), 561–596 (2008)
Lu, J., Zhao, P., Hoi, S.C.: Online passive-aggressive active learning. Mach. Learn. 103(2), 141–183 (2016)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Yang, J., Zhou, L., Liu, L., Ma, Z. (2021). ORMD: Online Learning Real-Time Malicious Node Detection for the IoT Network. In: Liu, Z., Wu, F., Das, S.K. (eds) Wireless Algorithms, Systems, and Applications. WASA 2021. Lecture Notes in Computer Science(), vol 12938. Springer, Cham. https://doi.org/10.1007/978-3-030-86130-8_39
Download citation
DOI: https://doi.org/10.1007/978-3-030-86130-8_39
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-86129-2
Online ISBN: 978-3-030-86130-8
eBook Packages: Computer ScienceComputer Science (R0)