...
首页> 外文期刊>IEEE transactions on information forensics and security >A GLRT-Based Mechanism for Detecting Relay Misbehavior in Clustered IoT Networks
【24h】

A GLRT-Based Mechanism for Detecting Relay Misbehavior in Clustered IoT Networks

机译:基于GLRT的集群式IoT网络中中继不当行为检测机制

获取原文
获取原文并翻译 | 示例
           

摘要

Clustering Internet of Things (IoT) networks, to alleviate the network scalability problem, provides an opportunity for an adversary to compromise a set of nodes by simply compromising the relay they are associated with. In such scenarios, an adversary who has compromised the relay can affect the network's performance by deliberately dropping the packets transmitted by the IoT devices and/or by corrupting the packets to be forwarded by the relay. In this way, the adversary can successfully mimic a bad radio channel between the IoT devices and the relay, thereby requiring the IoT devices to retransmit more frequently. Such a strategy increases the processing load on the IoT devices and will drain their batteries at a faster rate. To detect such an attack, we present hybrid intrusion detection systems that rely on the monitoring of uplink and downlink packets transmitted between IoT devices and the relay. Specifically, we compare the observed packet drop probabilities against their long-term expected values. The detection rules proposed originate from the generalized likelihood ratio test, where the adversary parameters are estimated using maximum likelihood estimation. A semi-analytical approach to obtain the expressions for the false alarm probability is presented in order to determine the decision thresholds. Results presented show the effectiveness of the proposed detection systems, demonstrate the impact of the choice of adversary parameters on them, and validate the expressions obtained for the false alarm probability.
机译:群集物联网(IoT)网络以缓解网络可扩展性问题,为攻击者提供了一个机会,可以通过简单地破坏与之关联的中继来破坏一组节点。在这种情况下,破坏中继的对手可能会通过故意丢弃IoT设备传输的数据包和/或破坏要由中继转发的数据包来影响网络性能。通过这种方式,对手可以成功模仿IoT设备与中继之间的不良无线电信道,从而要求IoT设备更频繁地重新传输。这种策略增加了物联网设备的处理负担,并将以更快的速度消耗其电池。为了检测到这种攻击,我们提出了混合入侵检测系统,该系统依赖于对物联网设备与中继之间传输的上行链路和下行链路数据包的监视。具体来说,我们将观察到的丢包概率与其长期期望值进行比较。提出的检测规则源自广义似然比检验,其中使用最大似然估计来估计对手参数。为了确定决策阈值,提出了一种用于获得误报概率的表达式的半分析方法。给出的结果证明了所提出的检测系统的有效性,证明了对手参数选择对其的影响,并验证了针对虚警概率的表达式。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号