Mitigating Black Hole Attacks in Routing Protocols Using a Machine Learning-Based Trust Model

Mitigating Black Hole Attacks in Routing Protocols Using a Machine Learning-Based Trust Model

Sivagurunathan Shanmugam, Muthu Ganeshan V., Prathapchandran K., Janani T.
Copyright: © 2022 |Pages: 23
DOI: 10.4018/IJSKD.310067
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Many application domains gain considerable advantages with the internet of things (IoT) network. It improves our lifestyle towards smartness in smart devices. IoT devices are mostly resource-constrained such as memory, battery, etc. So it is highly vulnerable to security attacks. Traditional security mechanisms can't be applied to these devices due to their restricted resources. A trust-based security mechanism plays an important role to ensure security in the IoT environment because it consumes only fewer resources. Thus, it is essential to evaluate the trustworthiness among IoT devices. The proposed model improves trusted routing in the IoT environment by detecting and isolating malicious nodes. This model uses reinforcement learning (RL) where the agent learns the behavior of the node and isolates the malicious nodes to improve the network performance. The model focuses on IoT with the routing protocol for low power and lossy network (RPL) and counters the blackhole attack.
Article Preview
Top

1. Introduction

There is no exaggeration to declare that in the last few decades, countless academics and public research institutions are chiefly focusing on the internet of things (IoT) to improve learning progression. The study hence gradually enters into the IoT era with many technologies. The central concept of IoT is to interconnect loosely defined smart things and make them communicate with the environment and computing devices. Furthermore, in information and communication technology (ICT), IoT brings a new dimension that connects anyone to any location. For instance, the human lifestyle and the business gain significant benefits due to the development of IoT and thus combines the physical world with the technological world. One of the essential components of the IoT is the sensor that gathers data from the environment and controls if it requires any changes. Most of the typical applications use the concept of IoT, including greenhouse monitoring (Danita et al., 2018), telemedicine monitoring (Iyamu & Makovhololo, 2021), smart electric meter reading (Al-Turjman & Abujubbeh, 2019), and intelligent transportation (Muthuramalingam et al., 2019). Thus with the advancement in technology, IoT has become popular and developed rapidly. These technologies are remote connectivity through fault-tolerant networks, embedded systems, wireless communication, and microelectronics-mechanical systems.

Even if IoT provides significant advantages, it also faces some critical challenges, and such notable challenges are depicted in the study. For example, devices in the IoT environment are usually open to the public, and it uses wireless communication that creates susceptible to system security (Fouad et al., 2021; Wang & Wang, 2021). It interconnects numerous heterogeneous embedded mobile devices and applications that make difficulties in scalability, dynamic adaptability, and compatibility (Sharma et al., 2016). The major challenge to be noted is that the critical component of the IoT is the internet, in which most of the attacks have occurred (Burrell et al., 2021; ul Hassan et al., 2021). In addition, IoT devices are resource-constrained, including limited processing capacity, low memory, and energy. Also, a new set of problems will occur because of the high mobility of smart objects and services (Prathapchandran et al., 2021a).

Besides, an IoT device does not have powerful security mechanisms against inside and outside attacks (Hosny et al., 2020a; Hosny et al., 2020b). Moreover, the traditional security mechanisms such as the cryptography technique (encryption), hash function, and public key infrastructure (PKI) can handle only attacks from external sources (Ferrara et al., 2021). For the inside attacks, these techniques are inefficient. More to the point, these techniques consume more resources unsuitable for resource-constrained IoT applications. There are lightweight-security solutions to handle the inside attacks in the form of trust-based security mechanisms (ul Hassan et al., 2021). The trust-based security is the category of soft security in which the object's behaviors are measured to identify the misbehaving nodes. In a changeable IoT environment, the objects can misbehave at any time and disrupt the services and performance of the system. Hence, maintaining trust between the objects is a significant aspect (Alshehri et al., 2015).

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 13: 4 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing