Research Article
BibTex RIS Cite
Year 2021, Volume: 5 Issue: 2, 123 - 128, 30.11.2021

Abstract

References

  • [1] J. Henrique, “Mitigating On-Off attacks in the internet of things,” Inter. J. Dis. Sensor Networks, pp.1-8, DOI.10.1155/2015/859731, November 2015.
  • [2] A.V., P. Zhang, “Trust management for internet of things,” J. Net. Comp., pp.120–134, Appl. (42), 2014.
  • [3] Ray, S. K., Gutierrez, Airehrour, “Secure routing for the internet of things,” A survey. J. Net. Computer App., 66,198-213, 2016.
  • [4] R. Giraud, L. Atzori, M. N., “Trustworthiness management in the social internet of things,” IEEE Transl. Data Manage, 26 , pp. 1253–1266, May 2014.
  • [5] Y. Saied, D. Zegh., M. Laurent, A. Oli., “Trust management system design for the internet of things,” context-aware and multi-service appro., 39, pp. 351–365, 2013.
  • [6] A. Shenfield, D. Day, A. Ayesh, “Intelligent IDS using ANN,” ICT Express,pp.95.99,DOI:https://doi.org/10.1016/j.icte.2018.04.003,2018
  • [7] Abderrahim, & Elhedhili, “Trust management system mitigating On-Off attacks and dishonest recommendations for the Internet of Things,” DTMS-IoT, 2016.
  • [8] F. Bao, I.R. Chen, J. Guo, “Adaptive and survivable trust management for the community of interest-based internet of things systems,”11th Inter.Symp. on Auto. Decent.Sys., Mexico,2013.
  • [9] C. Mendoza, J. Mendoza, “mitigating on-off attacks in the internet of things using a distributed trust management scheme,” Inter. J. Dis. Sens. Net., Article 859731(11), 2015.
  • [10] D. Chen, G. Chang, D. Sun, X. Wang, “Trust management model based on a fuzzy reputation for the IoT,” TRM-IoT, Comput. Sci. Inf. Syst., pp.1207–1228, April 2011.
  • [11] W. Khreich, B. Khosravifar, A. Hamou-Lhadj, and C. Delhi, “An anomaly detection system based on variable N-gram features and one-class SVM,” Info. and Sof. Techno., vol. 91, pp. 186–197, 2017.
  • [12] K.Costa, J. Papa, C.Lisboa, “Survey on machine learning-based intrusion detection approaches,” IoT ,Compu. Net., PII: S1389-1286(18)308739, DOI:https://doi.org/,10.1016/j.comnet.2019.01.023, 2019.
  • [13] M. Apte,S. Kelkar, A. Dorge ,S. Deshpande. Bomble ,A. Dhamankar, “Gateway based Trust Management System for Internet of Things,” ISSN: 2237-0722, Vol. 11 No. 4 (2021), August 2021.
  • [14] Contiki Operating System for the Internet of Things, Online Available: HTTP:// www.contiki-os.org/.
  • [15] Azure Microsoft for ML, Online Available: https://studio.azureml.net/.

Enhancement Trust Management in IoT to Detect ON-OFF Attacks with Cooja

Year 2021, Volume: 5 Issue: 2, 123 - 128, 30.11.2021

Abstract

In IoT ecosystems, the interaction of devices with each other creates a perfect environment but there are heterogeneous nodes that will supply a variety of services. In the intelligent environment, devices with various processing capacities may operate together and communicate transparently with one other and with users. These IoT gadgets are frequently exposed to the public and interact over wireless channels, making them vulnerable to malicious attacks. ON-OFF attacks (OOAs) are regarded as one of the IoT's trust threats. In these attacks, the malicious nodes alternate between behaving well and behaving badly, jeopardizing the network if they stay trusted nodes. In this paper, we introduce a model to enhance trust management in IoT to detect (OOAs) with the help of Artificial Neural Networks (ANN) to analyze the statuses (ON-OFF) and radio messages for each node which in turn assesses the resource trust automatically in IoT. We implemented our experiment by using Contiki Operating System (OS) and analyzed the data with Microsoft machine learning studio (MMLS) to display the results.

References

  • [1] J. Henrique, “Mitigating On-Off attacks in the internet of things,” Inter. J. Dis. Sensor Networks, pp.1-8, DOI.10.1155/2015/859731, November 2015.
  • [2] A.V., P. Zhang, “Trust management for internet of things,” J. Net. Comp., pp.120–134, Appl. (42), 2014.
  • [3] Ray, S. K., Gutierrez, Airehrour, “Secure routing for the internet of things,” A survey. J. Net. Computer App., 66,198-213, 2016.
  • [4] R. Giraud, L. Atzori, M. N., “Trustworthiness management in the social internet of things,” IEEE Transl. Data Manage, 26 , pp. 1253–1266, May 2014.
  • [5] Y. Saied, D. Zegh., M. Laurent, A. Oli., “Trust management system design for the internet of things,” context-aware and multi-service appro., 39, pp. 351–365, 2013.
  • [6] A. Shenfield, D. Day, A. Ayesh, “Intelligent IDS using ANN,” ICT Express,pp.95.99,DOI:https://doi.org/10.1016/j.icte.2018.04.003,2018
  • [7] Abderrahim, & Elhedhili, “Trust management system mitigating On-Off attacks and dishonest recommendations for the Internet of Things,” DTMS-IoT, 2016.
  • [8] F. Bao, I.R. Chen, J. Guo, “Adaptive and survivable trust management for the community of interest-based internet of things systems,”11th Inter.Symp. on Auto. Decent.Sys., Mexico,2013.
  • [9] C. Mendoza, J. Mendoza, “mitigating on-off attacks in the internet of things using a distributed trust management scheme,” Inter. J. Dis. Sens. Net., Article 859731(11), 2015.
  • [10] D. Chen, G. Chang, D. Sun, X. Wang, “Trust management model based on a fuzzy reputation for the IoT,” TRM-IoT, Comput. Sci. Inf. Syst., pp.1207–1228, April 2011.
  • [11] W. Khreich, B. Khosravifar, A. Hamou-Lhadj, and C. Delhi, “An anomaly detection system based on variable N-gram features and one-class SVM,” Info. and Sof. Techno., vol. 91, pp. 186–197, 2017.
  • [12] K.Costa, J. Papa, C.Lisboa, “Survey on machine learning-based intrusion detection approaches,” IoT ,Compu. Net., PII: S1389-1286(18)308739, DOI:https://doi.org/,10.1016/j.comnet.2019.01.023, 2019.
  • [13] M. Apte,S. Kelkar, A. Dorge ,S. Deshpande. Bomble ,A. Dhamankar, “Gateway based Trust Management System for Internet of Things,” ISSN: 2237-0722, Vol. 11 No. 4 (2021), August 2021.
  • [14] Contiki Operating System for the Internet of Things, Online Available: HTTP:// www.contiki-os.org/.
  • [15] Azure Microsoft for ML, Online Available: https://studio.azureml.net/.
There are 15 citations in total.

Details

Primary Language English
Subjects Engineering
Journal Section Articles
Authors

Ali Hamid Farea 0000-0002-0956-1176

Kerem Küçük 0000-0002-2621-634X

Early Pub Date November 18, 2021
Publication Date November 30, 2021
Submission Date October 13, 2021
Published in Issue Year 2021 Volume: 5 Issue: 2

Cite

IEEE A. H. Farea and K. Küçük, “Enhancement Trust Management in IoT to Detect ON-OFF Attacks with Cooja”, IJMSIT, vol. 5, no. 2, pp. 123–128, 2021.