使用基于机器学习的信任模型减轻路由协议中的黑洞攻击

Sivagurunathan Shanmugam, Muthu Ganeshan V., Prathapchandran K., J. T.
{"title":"使用基于机器学习的信任模型减轻路由协议中的黑洞攻击","authors":"Sivagurunathan Shanmugam, Muthu Ganeshan V., Prathapchandran K., J. T.","doi":"10.4018/ijskd.310067","DOIUrl":null,"url":null,"abstract":"Many application domains gain considerable advantages with the internet of things (IoT) network. It improves our lifestyle towards smartness in smart devices. IoT devices are mostly resource-constrained such as memory, battery, etc. So it is highly vulnerable to security attacks. Traditional security mechanisms can't be applied to these devices due to their restricted resources. A trust-based security mechanism plays an important role to ensure security in the IoT environment because it consumes only fewer resources. Thus, it is essential to evaluate the trustworthiness among IoT devices. The proposed model improves trusted routing in the IoT environment by detecting and isolating malicious nodes. This model uses reinforcement learning (RL) where the agent learns the behavior of the node and isolates the malicious nodes to improve the network performance. The model focuses on IoT with the routing protocol for low power and lossy network (RPL) and counters the blackhole attack.","PeriodicalId":53530,"journal":{"name":"International Journal of Sociotechnology and Knowledge Development","volume":"27 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Mitigating Black Hole Attacks in Routing Protocols Using a Machine Learning-Based Trust Model\",\"authors\":\"Sivagurunathan Shanmugam, Muthu Ganeshan V., Prathapchandran K., J. T.\",\"doi\":\"10.4018/ijskd.310067\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Many application domains gain considerable advantages with the internet of things (IoT) network. It improves our lifestyle towards smartness in smart devices. IoT devices are mostly resource-constrained such as memory, battery, etc. So it is highly vulnerable to security attacks. Traditional security mechanisms can't be applied to these devices due to their restricted resources. A trust-based security mechanism plays an important role to ensure security in the IoT environment because it consumes only fewer resources. Thus, it is essential to evaluate the trustworthiness among IoT devices. The proposed model improves trusted routing in the IoT environment by detecting and isolating malicious nodes. This model uses reinforcement learning (RL) where the agent learns the behavior of the node and isolates the malicious nodes to improve the network performance. The model focuses on IoT with the routing protocol for low power and lossy network (RPL) and counters the blackhole attack.\",\"PeriodicalId\":53530,\"journal\":{\"name\":\"International Journal of Sociotechnology and Knowledge Development\",\"volume\":\"27 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Sociotechnology and Knowledge Development\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/ijskd.310067\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"Decision Sciences\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Sociotechnology and Knowledge Development","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/ijskd.310067","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Decision Sciences","Score":null,"Total":0}
引用次数: 2

摘要

物联网(IoT)网络使许多应用领域获得了相当大的优势。它通过智能设备改善了我们的生活方式。物联网设备大多是资源受限的,如内存、电池等。因此,它非常容易受到安全攻击。由于这些设备的资源有限,传统的安全机制无法应用于这些设备。基于信任的安全机制消耗的资源较少,对确保物联网环境的安全起着重要作用。因此,评估物联网设备之间的可信度至关重要。该模型通过检测和隔离恶意节点,改进了物联网环境中的可信路由。该模型使用强化学习(RL), agent学习节点的行为并隔离恶意节点以提高网络性能。该模型以低功耗和有损网络(RPL)路由协议的物联网为重点,对抗黑洞攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Mitigating Black Hole Attacks in Routing Protocols Using a Machine Learning-Based Trust Model
Many application domains gain considerable advantages with the internet of things (IoT) network. It improves our lifestyle towards smartness in smart devices. IoT devices are mostly resource-constrained such as memory, battery, etc. So it is highly vulnerable to security attacks. Traditional security mechanisms can't be applied to these devices due to their restricted resources. A trust-based security mechanism plays an important role to ensure security in the IoT environment because it consumes only fewer resources. Thus, it is essential to evaluate the trustworthiness among IoT devices. The proposed model improves trusted routing in the IoT environment by detecting and isolating malicious nodes. This model uses reinforcement learning (RL) where the agent learns the behavior of the node and isolates the malicious nodes to improve the network performance. The model focuses on IoT with the routing protocol for low power and lossy network (RPL) and counters the blackhole attack.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Sociotechnology and Knowledge Development
International Journal of Sociotechnology and Knowledge Development Decision Sciences-Information Systems and Management
CiteScore
4.20
自引率
0.00%
发文量
35
期刊最新文献
A New Encryption-Based Algorithm for Embedded Image Steganography Breakthrough Barriers to Knowledge Sharing Using Modern Technologies in Academic Libraries in South Africa Stimulating the Post-COVID-19 Economic Recovery Scenarios to Evaluate Students' Understanding The Impact of the Double Reduction Policy on the Educational Anxiety of Parents Under Big Data The Mediation Role of Technology Systems in the Relationship Between Education Technology Antecedents on Student Satisfaction
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1