Open Access   Article Go Back

Malicious node Detectionand Avoidance in IOT Smart home system by Considering QoS

B.R. Susheel Kumar1 , Arun Biradar2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-15 , Page no. 388-393, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si15.388393

Online published on May 16, 2019

Copyright © B.R. Susheel Kumar, Arun Biradar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: B.R. Susheel Kumar, Arun Biradar, “Malicious node Detectionand Avoidance in IOT Smart home system by Considering QoS,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.388-393, 2019.

MLA Style Citation: B.R. Susheel Kumar, Arun Biradar "Malicious node Detectionand Avoidance in IOT Smart home system by Considering QoS." International Journal of Computer Sciences and Engineering 07.15 (2019): 388-393.

APA Style Citation: B.R. Susheel Kumar, Arun Biradar, (2019). Malicious node Detectionand Avoidance in IOT Smart home system by Considering QoS. International Journal of Computer Sciences and Engineering, 07(15), 388-393.

BibTex Style Citation:
@article{Kumar_2019,
author = {B.R. Susheel Kumar, Arun Biradar},
title = {Malicious node Detectionand Avoidance in IOT Smart home system by Considering QoS},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {15},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {388-393},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1265},
doi = {https://doi.org/10.26438/ijcse/v7i15.388393}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i15.388393}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1265
TI - Malicious node Detectionand Avoidance in IOT Smart home system by Considering QoS
T2 - International Journal of Computer Sciences and Engineering
AU - B.R. Susheel Kumar, Arun Biradar
PY - 2019
DA - 2019/05/16
PB - IJCSE, Indore, INDIA
SP - 388-393
IS - 15
VL - 07
SN - 2347-2693
ER -

           

Abstract

IOT Smart home system is becoming common now a days. In this ecosystem if a data packets are corrupted or manipulated by a faulty or compromised node, then detecting the faulty node is difficult because of multi hop mesh like network. The faulty Node might lead to wrong decision and operation failure of system thus impacting the Quality of Service (QoS) of different client devices. In this paper we first create a smart home ecosystem by usingIOT nodes like Raspberry pi and Node MCU models. We apply unsupervised learning technique on statistical data collected from these nodes to accurately detect faulty/Malicious nodes. We also provide alternate route depending up on the QoS of client device.

Key-Words / Index Term

IOT, Node MCU, Raspberry pi, smart home, unsupervised learning, QoS

References

[1] C. Withanage, R. Ashok, C. Yuen, and K. Otto, “A comparison of the popular home automation technologies,” in Innovative Smart Grid Technologies-Asia (ISGT Asia). IEEE, 2014, pp. 600–605.
[2] J. Zheng and M. J. Lee, “A comprehensive performance study of ieee 802.15. 4,” Sensor network operations, vol. 4, pp. 218–237, 2006.
[3] C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, “Ddos in the iot: Mirai and other botnets,” Computer, vol. 50, no. 7, pp. 80–84, 2017.
[4] S. Kriaa, M. Bouissou, and L. Pi`etre-Cambac´ed`es, “Modeling the stuxnet attack with bdmp: Towards moreformalriskassessments,”in7thInternational Conference on Risk and Security of Internet and Systems (CRiSIS). IEEE, 2012, pp. 1–8.
[5] S.J.Shackelford,A.A.Proia,B.Martell,andA.N. Craig, “Toward a global cybersecurity standard of care: Exploring the implications of the 2014 nist cybersecurity framework on shaping reasonable national and international cybersecurity practices,” Tex. Int’l LJ, vol. 50, p. 305, 2015.
[6] C.Wang,T.Feng,J.Kim,G.Wang,andW.Zhang, “Catching packet droppers and modifiers in wireless sensor networks,” IEEE Transactions on ParallelandDistributedSystems,vol.23,no.5,pp. 835–843, 2012.
[7] K. Ioannis, T. Dimitriou, and F. C. Freiling, “Towards intrusion detection in wireless sensor networks,” in Proc. of the 13th European Wireless Conference, 2007, pp. 1–10.
[8] X. Yang, J. Lin, W. Yu, P.-M. Moulema, X. Fu, and W. Zhao, “A novel en-route filtering scheme against false data injection attacks in cyberphysical networked systems,” IEEE Transactions on Computers, vol. 64, no. 1, pp. 4–18, 2015.
[9] M. Abdelhakim, L. E. Lightfoot, J. Ren, and T. Li, “Distributed detection in mobile access wireless sensor networks under byzantine attacks,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 4, pp. 950–959, 2014.
[10] T. Hayajneh, P. Krishnamurthy, D. Tipper, and T. Kim, “Detecting malicious packet dropping in the presence of collisions and channel errors in wireless ad hoc networks,” in IEEE International ConferenceonCommunications. IEEE,2009,pp. 1–6.
[11] M. Abdelhakim, L. Lightfoot, J. Ren, and T. Li, “Reliable communications overmultihop networks under routing attacks,” in Global Communications Conference(GLOBECOM). IEEE,2015,pp.1–6.
[12] M. Abdelhakim, X. Liu, and P. Krishnamurthy, “Diversityfordetectingroutingattacksinmultihop networks,” in International Conference on Computing, Networking and Communications (ICNC). IEEE, 2018, pp. 1–6.
[13] S. Kaplantzis, A. Shilton, N. Mani, and Y. A. Sekercioglu, “Detecting selective forwarding attacks in wireless sensor networks using support vector machines,” in 3rd International Conference on Intelligent Sensors, Sensor Networks and Information. IEEE, 2007, pp. 335–340.
[14] J. F. C. Joseph, B.-S. Lee, A. Das, and B.-C. Seet, “Cross-layer detection of sinking behavior in wireless ad hoc networks using svm and fda,” IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 2, pp. 233–245, 2011.
[15] A. I. Moustapha and R. R. Selmic, “Wireless sensor network modeling using modified recurrent neural networks: Application to fault detection,” IEEE Transactions on Instrumentation and Measurement, vol. 57, no. 5, pp. 981–988, 2008.
[16] D. Janakiram, V. Reddy, and A. P. Kumar, “Outlier detection in wireless sensor networks using bayesian belief networks,” in First International Conference on Communication System Software and Middleware. IEEE, 2006, pp. 1–6.
[17] K. Leung and C. Leckie, “Unsupervised anomaly detection in network intrusion detection using clusters,” in Proceedings of the Twenty-eighth Australasian conference on Computer Science, vol. 38. Australian Computer Society, Inc., 2005, pp. 333–342.
[18] S. Ruoti, S. Heidbrink, M. O’Neill, E. Gustafson, and Y. R. Choe, “Intrusion detection with unsupervised heterogeneous ensembles using cluster-based normalization,” in IEEE InternationalConferenceonWebServices. IEEE, 2017, pp. 862–865.
[19] Xin Liu, Mai Abdelhakim, Prashant Krishnamurthy, David Tipper, “Identifying Malicious Nodes in Multihop IoT Networks using Dual Link Technologies and Unsupervised Learning” Open Journal of Internet of Things (OJIOT) Volume 4, Issue 1, 2018
[20] Tiankai Liang , Bi Zeng, Jianqi Liu, Linfeng Ye,Caifeng Zou “An Unsupervised User Behavior Prediction Algorithm Based on Machine Learning and Neural Network For Smart Home” IEEE Access ( Volume: 6 ),Page(s): 49237 – 49247,Page(s): 812 – 821
[21] Irfan Awan, Muhammad Younas, Wajia Naveed “Modelling QoS in IoT Applications” 2014 17th International Conference on Network-Based Information Systems
[22] Hajar Elhammouti, Essaid Sabir, Mustapha Benjillali, Loubna Echabbi, Hamidou Tembine, “Self-Organized Connected Objects: Rethinking QoS Provisioning for IoT Services” : IEEE Communications Magazine ( Volume: 55 , Issue: 9 , Sept. 2017 )Page(s): 41 – 47
[23] Oladayo Bello, Sherali Zeadally,“Toward efficient smartification of the Internet of Things (IoT) services”Future Generation Computer SystemsVolume 92, March 2019, Pages 663-673