The Open UniversitySkip to content
 

Malicious Nodes Detection based on Artificial Neural Network in IoT Environments

Khatun, Mirza Akhi; Chowdhury, Niaz and Uddin, Mohammed Nasir (2019). Malicious Nodes Detection based on Artificial Neural Network in IoT Environments. In: 22nd International Conference on Computer and Information Technology (ICCIT), Dec 2019, Dhaka, Bangladesh.

Full text available as:
[img]
Preview
PDF (Accepted Manuscript) - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader
Download (1MB) | Preview
Google Scholar: Look up in Google Scholar

Abstract

The central promise of the Internet of Things (IoT) is to accelerate the interaction with surroundings. Appliances such as smartwatches, smart bulbs, thermostats, fitness trackers, next-generation vehicles, and so on have gained the ability to communicate and accept instructions from outside with the help of various embedded devices. While doing so, they almost always operate with little to no human interaction. These embedded devices, alongside a lot of benefits, also bring forth several security challenges. From the manufacturers’ point of view, performance and production remain the top priority leaving security a less addressed problem. This practice has manifested itself in the form of various attacks including the Distributed Denial of Service (DDoS) where malware prepared with the aid of malicious nodes in IoT devices are used to carry out the attack. It is, therefore, essential to comprehend the nature of these attacks and swiftly identify infected devices to combat this situation. Machine Learning, or more particularly a branch of this technique commonly known as Deep Learning, has already demonstrated its outstanding potentials while administering with the heterogeneous data of diverse sizes. Using the Artificial Neural Network (ANN), this work suggests a method of detecting malicious nodes in IoT environments. The contribution of the paper is in two-fold. First, it classifies the usual and malicious patterns of IoT devices in the network, and second, describes a scheme for successfully detecting malicious nodes with 77.51% accuracy.

Item Type: Conference or Workshop Item
Academic Unit/School: Faculty of Science, Technology, Engineering and Mathematics (STEM) > Knowledge Media Institute (KMi)
Faculty of Science, Technology, Engineering and Mathematics (STEM)
Research Group: OpenTEL
Item ID: 68039
Depositing User: Niaz Chowdhury
Date Deposited: 11 Nov 2019 09:50
Last Modified: 24 Jan 2020 13:09
URI: http://oro.open.ac.uk/id/eprint/68039
Share this page:

Download history for this item

These details should be considered as only a guide to the number of downloads performed manually. Algorithmic methods have been applied in an attempt to remove automated downloads from the displayed statistics but no guarantee can be made as to the accuracy of the figures.

Actions (login may be required)

Policies | Disclaimer

© The Open University   contact the OU