透過您的圖書館登入
IP:3.145.23.123
  • 期刊

Detection Algorithm of Abnormal Behavior in Security for IIoT Based on Random Inspection

摘要


Traditional security abnormal behavior detection algorithms are difficult to adapt to the Industrial Internet of Things scenario. To this end, an algorithm for detecting abnormal behaviors of the Industrial Internet of Things based on random inspections is proposed. Based on the clustered hierarchical Industrial Internet of Things topology, it manages the number of network nodes and sets different inspection inspection rates according to the reputation value interval. Detect and analyze the communication behavior attributes of nodes in the network such as packet loss rate and transmission delay, perform reputation evaluation, and then discover abnormal behaviors of the nodes and detect different types of malicious attacks. Simulation results show that the new abnormal behavior detection algorithm improves the detection accuracy without affecting the life of the network. The proposed random inspection mechanism helps the algorithm to find malicious nodes with low energy consumption and high efficiency, and improves the security of the Industrial Internet of Things.

參考文獻


Oh SH, Hong CO, Choi YA. A malicious and malfunctioning node detection scheme for wireless sensor networks[J]. Wireless Sensor Network, 2012, 4(3): 84-90.
Babu Shaik Sahil, Raha Arnab, Naskar Mrinal Kanti. Trust evaluation based on node's characteristics and neighbouring nodes' recommendations for WSN[J]. Wireless Sensor Network, 2014, 6(8): 157-172.
L. Bhasker. Genetically derived secure cluster-based data aggregation in wireless sensor networks[J]. IET Information Security, 2014, 8(1): 1-7.
Y. Liu, M. Dong, K. Ota and A. Liu. ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks. IEEE Transactions on Information Forensics and Security, 2016, 11(9): 2013-2027.
OUYANG X, TIAN B, LI D. A novel hierarchical reputation model for wireless sensor networks[J]. International journal of digital content technology and its applications, 2012, 6(10): 61-69.

延伸閱讀