About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Journal article

Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks

From

Nanjing University of Aeronautics and Astronautics1

Department of Applied Mathematics and Computer Science, Technical University of Denmark2

Cyber Security, Department of Applied Mathematics and Computer Science, Technical University of Denmark3

The Internet of Things (IoT) has experienced a rapid growth in the last few years allowing different Internet-enabled devices to interact with each other in various environments. Due to the distributed nature, IoT networks are vulnerable to various threats especially insider attacks. There is a significant need to detect malicious nodes timely.

Intuitively, large damage would be caused in IoT networks if attackers conduct a set of attacks collaboratively and simultaneously. In this work, we investigate this issue and first formalize a multiple-mix-attack model. Then, we propose an approach called Perceptron Detection (PD), which uses both perceptron and K-means method to compute IoT nodes’ trust values and detect malicious nodes accordingly.

To further improve the detection accuracy, we optimize the route of network and design an enhanced perceptron learning process, named Perceptron Detection with enhancement (PDE). The experimental results demonstrate that PD and PDE can detect malicious nodes with a higher accuracy rate as compared with similar methods, i.e., improving the detection accuracy of malicious nodes by around 20% to 30%.

Language: English
Year: 2019
Pages: 865-879
ISSN: 18727115 and 0167739x
Types: Journal article
DOI: 10.1016/j.future.2019.07.021
ORCIDs: Meng, Weizhi

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis