DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks

Zuchao Ma, Liang Liu, Weizhi Meng*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

281 Downloads (Pure)

Abstract

The Internet of Things (IoT) is growing rapidly, which allows many smart devices to connect and cooperate with each other. While for the sake of distributed architecture, an IoT environment is known to be vulnerable to insider attacks. In this work, we focus on this challenge and consider an advanced insider threat, called multiple-mix attack, which typically combines three sub-attacks: tamper attack, drop attack and replay attack. For protection, we develop a Distributed Consensus based Trust Model (DCONST), which can build the nodes’ reputation by sharing particular information, called cognition. In particular, DCONST can detect malicious nodes by using the K-Means clustering, without disturbing the normal operations of a network. In the evaluation, as compared with some similar models, DCONST can overall provide a better detection rate by increasing around 10% to 40%.

Original languageEnglish
Title of host publicationProceedings of 25th Australasian Conference on Information Security and Privacy
EditorsJoseph K. Liu, Hui Cui
PublisherSpringer
Publication date2020
Pages247-267
ISBN (Print)9783030553036
DOIs
Publication statusPublished - 2020
Event25th Australasian Conference on Information Security and Privacy - Perth, Australia
Duration: 30 Nov 20202 Dec 2020
Conference number: 25

Conference

Conference25th Australasian Conference on Information Security and Privacy
Number25
Country/TerritoryAustralia
CityPerth
Period30/11/202002/12/2020
SeriesLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume12248 LNCS
ISSN0302-9743

Keywords

  • Consensus
  • IoT network
  • K-means method
  • Malicious node
  • Trust management

Fingerprint

Dive into the research topics of 'DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks'. Together they form a unique fingerprint.

Cite this