Detecting FDI Attack on Dense IoT Network with Distributed Filtering Collaboration and Consensus

10/29/2020
by   Carlos Pedroso, et al.
0

The rise of IoT has made possible the development of personalized services, like industrial services that often deal with massive amounts of data. However, as IoT grows, its threats are even greater. The false data injection (FDI) attack stands out as being one of the most harmful to data networks like IoT. The majority of current systems to handle this attack do not take into account the data validation, especially on the data clustering service. This work introduces CONFINIT, an intrusion detection system against FDI attacks on the data dissemination service into dense IoT. It combines watchdog surveillance and collaborative consensus among IoT devices for getting the swift detection of attackers. CONFINIT was evaluated in the NS-3 simulator into a dense industrial IoT and it has gotten detection rates of 99 false negative and 3.6 without FDI attackers.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/19/2022

Dissemination Control in Dynamic Data Clustering For Dense IIoT Against False Data Injection Attack

The IoT has made possible the development of increasingly driven service...
research
12/01/2020

Towards a Universal Features Set for IoT Botnet Attacks Detection

The security pitfalls of IoT devices make it easy for the attackers to e...
research
06/29/2022

CoAP-DoS: An IoT Network Intrusion Dataset

The need for secure Internet of Things (IoT) devices is growing as IoT d...
research
03/02/2023

D-Score: An Expert-Based Method for Assessing the Detectability of IoT-Related Cyber-Attacks

IoT devices are known to be vulnerable to various cyber-attacks, such as...
research
06/16/2020

Managing Consensus-Based Cooperative Task Allocation for IIoT Networks

Current IoT services include industry-oriented services, which often req...
research
11/19/2019

Protecting RESTful IoT Devices from Battery Exhaustion DoS Attacks

Many IoT use cases involve constrained battery-powered devices offering ...
research
07/29/2023

Exposing Hidden Attackers in Industrial Control Systems using Micro-distortions

For industrial control systems (ICS), many existing defense solutions fo...

Please sign up or login with your details

Forgot password? Click here to reset