Fuzzy-Logic Based IDS for Detecting Jamming Attacks in Wireless Mesh IoT Networks

05/08/2022
by   Michael Savva, et al.
0

The investigation in this paper targets the design and the evaluation of jamming intrusion detection based on Fuzzy Logic in wireless mesh IoT Networks in a distributed manner. Our approach uses information collected at local nodes and from the sink as input to the fuzzy logic controller. In order to find the best set of inputs, distributed or centralized, we made a comparison between five different combinations of parameters. The investigation uses the values of the ETX, Retransmissions, Packets Drop per terminal (PDPT) and Packet Delivery Ratio (PDR) as inputs to a fuzzy inference system to get Jamming Index (JI) as the system's output. The proposed method was evaluated based on the following metrics: Accuracy, Precision, Specificity, False positive rate (FPR), Recall, False negative rate (FNR) and ROC curve. In order to evaluate this approach, we implement experiments in various scenarios using the Contiki OS and the Cooja simulator tool.

READ FULL TEXT
research
06/22/2021

Anomaly-based Intrusion Detection System Using Fuzzy Logic

Recently, the Distributed Denial of Service (DDOS) attacks has been used...
research
10/13/2017

Performance Comparison of Intrusion Detection Systems and Application of Machine Learning to Snort System

This study investigates the performance of two open source intrusion det...
research
04/18/2019

Intrusion Detection Mechanism Using Fuzzy Rule Interpolation

Fuzzy Rule Interpolation (FRI) methods can serve deducible (interpolated...
research
03/01/2020

Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system

UASs form a large part of the fighting ability of the advanced military ...
research
06/06/2023

Effective Intrusion Detection in Highly Imbalanced IoT Networks with Lightweight S2CGAN-IDS

Since the advent of the Internet of Things (IoT), exchanging vast amount...
research
03/18/2018

Towards an Efficient Anomaly-Based Intrusion Detection for Software-Defined Networks

Software-defined networking (SDN) is a new paradigm that allows developi...
research
09/09/2014

Ambiguity-Driven Fuzzy C-Means Clustering: How to Detect Uncertain Clustered Records

As a well-known clustering algorithm, Fuzzy C-Means (FCM) allows each in...

Please sign up or login with your details

Forgot password? Click here to reset