Hybrid Internal Anomaly Detection System for IoT: Reactive Nodes with Cross-Layer Operation

dc.contributor.authorNanda Kumar Thanigaivelan
dc.contributor.authorEthiopia Nigussie
dc.contributor.authorSeppo Virtanen
dc.contributor.authorJouni Isoaho
dc.contributor.organizationfi=tietoliikennetekniikka|en=Communication Systems|
dc.contributor.organization-code1.2.246.10.2458963.20.65755342907
dc.contributor.organization-code2606801
dc.converis.publication-id35426325
dc.converis.urlhttps://research.utu.fi/converis/portal/Publication/35426325
dc.date.accessioned2022-10-27T12:12:37Z
dc.date.available2022-10-27T12:12:37Z
dc.description.abstractWe present a hybrid internal anomaly detection system that shares detection tasks between router and nodes. It allows nodes to react instinctively against the anomaly node by enforcing temporary communication ban on it. Each node monitors its own neighbors and if abnormal behavior is detected, the node blocks the packets of the anomaly node at link layer and reports the incident to its parent node. A novel RPL control message, Distress Propagation Object (DPO), is formulated and used for reporting the anomaly and network activities to the parent node and subsequently to the router. The system has configurable profile settings and is able to learn and differentiate between the nodes normal and suspicious activities without a need for prior knowledge. It has different subsystems and operation phases that are distributed in both the nodes and router, which act on data link and network layers. The system uses network fingerprinting to be aware of changes in network topology and approximate threat locations without any assistance from a positioning subsystem. The developed system was evaluated using test-bed consisting of Zolertia nodes and in-house developed PandaBoard based gateway as well as emulation environment of Cooja. The evaluation revealed that the system has low energy consumption overhead and fast response. The system occupies 3.3 KB of ROM and 0.86 KB of RAM for its operations. Security analysis confirms nodes reaction against abnormal nodes and successful detection of packet flooding, selective forwarding, and clone attacks. The system’s false positive rate evaluation demonstrates that the proposed system exhibited 5% to 10% lower false positive rate compared to simple detection system.
dc.identifier.eissn1939-0122
dc.identifier.jour-issn1939-0114
dc.identifier.olddbid173937
dc.identifier.oldhandle10024/157031
dc.identifier.urihttps://www.utupub.fi/handle/11111/33166
dc.identifier.urlhttps://doi.org/10.1155/2018/3672698
dc.identifier.urnURN:NBN:fi-fe2021042719544
dc.language.isoen
dc.okm.affiliatedauthorThanigaivelan, Nanda
dc.okm.affiliatedauthorNigussie, Ethiopia
dc.okm.affiliatedauthorVirtanen, Seppo
dc.okm.affiliatedauthorIsoaho, Jouni
dc.okm.discipline113 Computer and information sciencesen_GB
dc.okm.discipline113 Tietojenkäsittely ja informaatiotieteetfi_FI
dc.okm.internationalcopublicationnot an international co-publication
dc.okm.internationalityInternational publication
dc.okm.typeA1 ScientificArticle
dc.publisherWiley & Hindawi
dc.publisher.countryUnited Kingdomen_GB
dc.publisher.countryBritanniafi_FI
dc.publisher.country-codeGB
dc.relation.articlenumberUNSP 3672698
dc.relation.doi10.1155/2018/3672698
dc.relation.ispartofjournalSecurity and Communication Networks
dc.relation.volume2018
dc.source.identifierhttps://www.utupub.fi/handle/10024/157031
dc.titleHybrid Internal Anomaly Detection System for IoT: Reactive Nodes with Cross-Layer Operation
dc.year.issued2018

Tiedostot

Näytetään 1 - 1 / 1
Ladataan...
Name:
3672698.pdf
Size:
1.85 MB
Format:
Adobe Portable Document Format
Description:
Publisher's version