An IoT Architecture Leveraging Digital Twins: Compromised Node Detection Scenario

08/20/2023
by   Khaled Alanezi, et al.
0

Modern IoT (Internet of Things) environments with thousands of low-end and diverse IoT nodes with complex interactions among them and often deployed in remote and/or wild locations present some unique challenges that make traditional node compromise detection services less effective. This paper presents the design, implementation and evaluation of a fog-based architecture that utilizes the concept of a digital-twin to detect compromised IoT nodes exhibiting malicious behaviors by either producing erroneous data and/or being used to launch network intrusion attacks to hijack other nodes eventually causing service disruption. By defining a digital twin of an IoT infrastructure at a fog server, the architecture is focused on monitoring relevant information to save energy and storage space. The paper presents a prototype implementation for the architecture utilizing malicious behavior datasets to perform misbehaving node classification. An extensive accuracy and system performance evaluation was conducted based on this prototype. Results show good accuracy and negligible overhead especially when employing deep learning techniques such as MLP (multilayer perceptron).

READ FULL TEXT

page 1

page 2

page 6

research
04/04/2018

A Fog-based Architecture and Programming Model for IoT Applications in the Smart Grid

The smart grid utilizes many Internet of Things (IoT) applications to su...
research
10/13/2020

Lightweight IoT Malware Detection Solution Using CNN Classification

Internet of Things (IoT) is becoming more frequently used in more applic...
research
07/27/2018

Internet of Things Security and Forensics: Challenges and Opportunities

The Internet of Things (IoT) envisions pervasive, connected, and smart n...
research
11/25/2021

A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection

The digital transformation faces tremendous security challenges. In part...
research
06/21/2019

A Language for Programming Edge Clouds for Next Generation IoT Applications

For effective use of edge computing in an IoT application, we need to pa...
research
10/21/2021

Decentralised Trustworthy Collaborative Intrusion Detection System for IoT

Intrusion Detection Systems (IDS) have been the industry standard for se...
research
10/19/2020

On the design of a Fog computing-based, driving behaviour monitoring framework

Recent technological improvements in vehicle manufacturing may greatly i...

Please sign up or login with your details

Forgot password? Click here to reset