Skip to main content

ORMD: Online Learning Real-Time Malicious Node Detection for the IoT Network

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2021)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12938))

Abstract

With the rapid development of the Internet of Things and its widespread deployment in daily life and production, malicious node detection is becoming more and more important. The attackers can invade the normal nodes to launch various attacks like dropping or tampering data packets. As the current approaches mainly rely on injecting and collecting data for a period of time and out-of-band communications between nodes and the sink node, it is lagging. In addition, these approaches rely on reliable source nodes and use offline data to calculate, which slows down the detection speed. In this paper, for the first time, we propose an Online learning Real-time Malicious node Detection scheme (ORMD) for IoT network. ORMD adopts an out-of-band-free data collection method, in which probe packets are injected from the sink node to randomly chosen source nodes. The source nodes return the probe packets back to the sink node. The sink node analyzes the returned probe packets to obtain the path’s reliability which is used to derive the node’s reliability. The derivation of the node’s reliability is formalized as a multiple linear regression problem, which can be solved by online learning algorithm. Simulation results show that ORMD can detect malicious nodes in real time with a high accuracy, up to 96%.

Supported by the National Key R&D Program of China (Grant No.2020AAA0107700), the National Natural Science Foundation of China (Grant 62076125, U20B2049, U20B2050), State Key Laboratory Foundation of smart grid protection and operation control, the Science and Technology Funds from National State Grid Ltd.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (IoT): a vision, architectural elements, and future directions. Futur. Gener. Comput. Syst. 29(7), 1645–1660 (2013)

    Article  Google Scholar 

  2. Fantacci, R., Pecorella, T., Viti, R., Carlini, C.: A network architecture solution for efficient IoT WSN backhauling: challenges and opportunities. IEEE Wirel. Commun. 21(4), 113–119 (2014)

    Article  Google Scholar 

  3. Meddeb, R., Triki, B., Jemili, F., Korbaa, O.: A survey of attacks in mobile ad hoc networks. In: 2017 International Conference on Engineering & MIS (ICEMIS), pp. 1–7. IEEE (2017)

    Google Scholar 

  4. Ren, K., Lou, W., Zhang, Y.: LEDS: providing location-aware end-to-end data security in wireless sensor networks. IEEE Trans. Mob. Comput. 7(5), 585–598 (2008)

    Article  Google Scholar 

  5. Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395–411 (2018)

    Article  Google Scholar 

  6. Liu, L., Ma, Z., Meng, W.: Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks. Futur. Gener. Comput. Syst. 101, 865–879 (2019)

    Article  Google Scholar 

  7. Liu, X., Abdelhakim, M., Krishnamurthy, P., Tipper, D.: Identifying malicious nodes in multihop IoT networks using diversity and unsupervised learning. In: 2018 IEEE International Conference on Communications (ICC), pp. 1–6. IEEE (2018)

    Google Scholar 

  8. Sun, Y.L., Yu, W., Han, Z., Liu, K.R.: Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE J. Sel. Areas Commun. 24(2), 305–317 (2006)

    Article  Google Scholar 

  9. Sen, J., Chowdhury, P.R., Sengupta, I.: A distributed trust establishment scheme for mobile ad hoc networks. In: 2007 International Conference on Computing: Theory and Applications (ICCTA 2007), pp. 51–58. IEEE (2007)

    Google Scholar 

  10. Liqin, T., et al.: Computation and analysis of node intending trust in WSNs. In: 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, pp. 496–499. IEEE (2010)

    Google Scholar 

  11. Rikli, N.-E., Alnasser, A.: Lightweight trust model for the detection of concealed malicious nodes in sparse wireless ad hoc networks. Int. J. Distrib. Sens. Netw. 12(7), 1550147716657246 (2016)

    Article  Google Scholar 

  12. Zhang, W., Zhu, S., Tang, J., Xiong, N.: A novel trust management scheme based on dempster-shafer evidence theory for malicious nodes detection in wireless sensor networks. J. Supercomput. 74(4), 1779–1801 (2018)

    Article  Google Scholar 

  13. Alshehri, M.D., Hussain, F.K.: A fuzzy security protocol for trust management in the internet of things (fuzzy-IoT). Computing 101(7), 791–818 (2019)

    Article  MathSciNet  Google Scholar 

  14. Lwin, M.T., Yim, J., Ko, Y.-B.: Blockchain-based lightweight trust management in mobile ad-hoc networks. Sensors 20(3), 698 (2020)

    Article  Google Scholar 

  15. Bao, F., Chen, R., Chang, M.J., Cho, J.-H.: Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Netw. Serv. Manag. 9(2), 169–183 (2012)

    Article  Google Scholar 

  16. Renubala, S., Dhanalakshmi, K.S.: Trust based secure routing protocol using fuzzy logic in wireless sensor networks. In: 2014 IEEE International Conference on Computational Intelligence and Computing Research, pp. 1–5. IEEE (2014)

    Google Scholar 

  17. Das, S., Das, A.: An algorithm to detect malicious nodes in wireless sensor network using enhanced leach protocol. In: 2015 International Conference on Advances in Computer Engineering and Applications, pp. 875–881. IEEE (2015)

    Google Scholar 

  18. Al Hayajneh, A., Bhuiyan, M.Z.A., McAndrew, I.: A novel security protocol for wireless sensor networks with cooperative communication. Computers 9(1), 4 (2020)

    Article  Google Scholar 

  19. Dai, H., Liu, H., Jia, Z.: Dynamic malicious node detection with semi-supervised multivariate classification in cognitive wireless sensor networks. Concurr. Comput. Pract. Exp. 27(12), 2910–2923 (2015)

    Article  Google Scholar 

  20. Gao, B., Maekawa, T., Amagata, D., Hara, T.: Environment-adaptive malicious node detection in manets with ensemble learning. In: 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pp. 556–566. IEEE (2018)

    Google Scholar 

  21. Eziama, E., Tepe, K., Balador, A., Nwizege, K.S., Jaimes, L.M.S.: Malicious node detection in vehicular ad-hoc network using machine learning and deep learning. In: 2018 IEEE Globecom Workshops (GC Wkshps), pp. 1–6. IEEE (2018)

    Google Scholar 

  22. Ravi, N., Shalinie, S.M.: Learning-driven detection and mitigation of DDoS attack in IoT via SDN-cloud architecture. IEEE Internet Things J. 7(4), 3559–3570 (2020)

    Article  Google Scholar 

  23. Kharrufa, H., Al-Kashoash, H., Al-Nidawi, Y., Mosquera, M.Q., Kemp, A.H.: Dynamic RPL for multi-hop routing in IoT applications. In: 2017 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS), pp. 100–103. IEEE (2017)

    Google Scholar 

  24. Marina, M.K., Das, S.R.: Ad hoc on-demand multipath distance vector routing. Wirel. Commun. Mob. Comput. 6(7), 969–988 (2006)

    Article  Google Scholar 

  25. Wang, C., Hussain, S.R., Bertino, E.: Dictionary based secure provenance compression for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 27(2), 405–418 (2015)

    Article  Google Scholar 

  26. Ying, Y., Pontil, M.: Online gradient descent learning algorithms. Found. Comput. Math. 8(5), 561–596 (2008)

    Article  MathSciNet  Google Scholar 

  27. Lu, J., Zhao, P., Hoi, S.C.: Online passive-aggressive active learning. Mach. Learn. 103(2), 141–183 (2016)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, J., Zhou, L., Liu, L., Ma, Z. (2021). ORMD: Online Learning Real-Time Malicious Node Detection for the IoT Network. In: Liu, Z., Wu, F., Das, S.K. (eds) Wireless Algorithms, Systems, and Applications. WASA 2021. Lecture Notes in Computer Science(), vol 12938. Springer, Cham. https://doi.org/10.1007/978-3-030-86130-8_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-86130-8_39

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-86129-2

  • Online ISBN: 978-3-030-86130-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics