Anda di halaman 1dari 12

This article has been accepted for publication in a future issue of this journal, but has not been

fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2019.2922262, IEEE
Transactions on Information Forensics and Security
1

A GLRT Based Mechanism for Detecting Relay


Misbehavior in Clustered IoT Networks
Nalam Venkata Abhishek, Anshoo Tandon, Member, IEEE, Teng Joon Lim, Fellow, IEEE and
Biplab Sikdar, Senior Member, IEEE
National University of Singapore
Email: abhishek nalam@u.nus.edu, anshoo.tandon@gmail.com, eleltj@nus.edu.sg, bsikdar@nus.edu.sg

Abstract—Clustering Internet of Things (IoT) Networks, to devices merely by comprising the relay they are associated
alleviate the network scalability problem, provides an oppor- with.
tunity for an adversary to compromise a set of nodes by An IoT network is vulnerable to many attacks other than
simply compromising the relay they are associated with. In such
scenarios, an adversary who has compromised the relay can affect eavesdropping, which can be effectively defended against
the network’s performance by deliberately dropping the packets through cryptography [7]. For instance, to degrade the perfor-
transmitted by the IoT devices and/or by corrupting the packets mance of an IoT network, an attacker may attempt to deplete
to be forwarded by the relay. In this way, the adversary can the battery of IoT devices at a faster than normal rate. One
successfully mimic a bad radio channel between the IoT devices possible way for an adversary to drain the batteries at a faster
and the relay, thereby requiring the IoT devices to retransmit
more frequently. Such a strategy increases the processing load pace, is to increase the rate of retransmissions, on the uplink
on the IoT devices and will drain their batteries at a faster and/or downlink, by mimicking a bad radio link between IoT
rate. To detect such an attack, we present hybrid intrusion device and the relay. Such scenarios where both uplink and
detection systems that rely on the monitoring of uplink and downlink channel are active are common in IoT networks
downlink packets transmitted between IoT devices and the relay. (e.g., healthcare [8], [9] and Intelligent Transportation Systems
Specifically, we compare the observed packet drop probabilities
against their long-term expected values. The detection rules [10]). This attack can be implemented if the attacker can obtain
proposed originate from the generalized likelihood ratio test, root access to a relay or at least has the access to specific
where the adversary parameters are estimated using maximum memory locations at the PHY-MAC interface, which is often
likelihood estimation. A semi-analytical approach to obtain the not a problem because many user-installed devices do not
expressions for the false alarm probability is presented in order have updated firmware and/or use default login credentials,
to determine the decision thresholds. Results presented show
the effectiveness of the proposed detection systems, demonstrate and the relay has vulnerabilities in its operating system that
the impact of the choice of adversary parameters on them and allows manipulation of its protocol stack. These attacks are
validate the expressions obtained for the false alarm probability. hard to distinguish from naturally occurring instances of weak
wireless channels, making them difficult to detect and are
also immune to detection systems proposed [7], [11]–[13] for
attacks that focus on service interruption or message security
I. I NTRODUCTION
compromise. Hence, developing Intrusion Detection systems
With the growing interest in using Internet of Things (IoT) (IDS) to detect such attacks is an important task, which we
technologies, the demand for connecting resource-constrained address in this paper
devices to the Internet has been increasing quickly. In order IDS’s can be categorized according to where most of the
to realize this potential growth, many issues like security, detection intelligence resides – centralized, distributed, or
network scalability, etc. [1]–[4] need to be addressed. It hybrid [14]. In this paper, we propose a hybrid IDS system
is estimated that more than fifty billion devices would be which relies on the IoT devices being able to count the
connected to the Internet by 2050 [5]. Such an increase in rate of packet retransmissions on the uplink, and the rate of
the number of wireless networked devices can lead to radio unsuccessful packet deliveries on the downlink, and report
access network congestion. Hence, the need to resolve the these measurements back to a trusted server which will then
network scalability issue is apparent. One of the solutions is decide whether a relay has been compromised.
the clustering approach [6]. In such an approach, a set of IoT
devices are grouped (or clustered) and are assigned a relay (or
cluster head) which would assist in forwarding the traffic to A. Related Work
and from the Base Station (assuming a cellular architecture). Examples of attacks which cryptography cannot defend
The clustering strategy could be based on Quality of Service against are Selective Forwarding, Black Hole and Channel
requirements, geographical location, etc. Relays would often degradation. Researchers in the past have proposed to over-
be user-installed equipment, which are not professionally come such attacks using various methods. Machine learning
maintained and updated, making them vulnerable to security algorithms (such as the ones in [15]), when designed using
breaches. Therefore, implementing such a strategy also causes sufficient and appropriate training data samples, can provide
security issues i.e. an adversary can compromise a set of IoT the desired performance. However, in reality, it is problematic

1556-6013 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2019.2922262, IEEE
Transactions on Information Forensics and Security
2

to inject malicious packets into the networks to build the


training data. Authors in [16] propose a detection technique
called SVELTE to detect the presence of a selective forwarding
D1
attack. The proposed system detects the adversary when it fil-
ters all the packets or sends only the mapping request packets.


In [17], the authors have presented an approach based on the
channel conditions to detect selective forwarding attacks. A
similar approach was proposed in [18] to detect forwarding DM
misbehavior of nodes. However, a sensor monitoring the data
packets of the forwarding nodes can be expensive in terms of
the energy consumed. Detecting selective forwarding attacks IoT Device Trusted Node Relay AP
using the traffic eavesdropped by monitor nodes was proposed
in [19]. It is however not practical if the system requires a large Link via Relay used for transmitting regular traffic 
Link used for transmitting feedback about the relay
number of monitor nodes. In [20], the authors have proposed
to detect selective forwarding attacks by random selection of
a single checkpoint node. To implement it, however, we need Fig. 1: Network Model Illustration.
to make major changes to the existing protocols. A sequential
probability ratio based detection system was presented in [21]
for detecting selective forwarding attacks. Their decision is all devices become dependent. The detection of an adversary
based on the expected transmission count of the nodes. A implementing such an attack is presented and is based on the
light-weight heart-beat protocol is proposed in [22]. In this Generalized Likelihood Ratio Test. The observations required
approach, an echo is sent to every node in the network. are shared with a trusted node. We numerically obtain the
A selective forwarding attack is detected when there is no expressions for the false alarm probability for all the detec-
reply received from the affected nodes. However, an intelligent tion systems proposed, by modeling the distribution of the
attacker might simply refrain from dropping the echo packets detection algorithm (in the absence of attack) using a Gamma
and thus stay undetected. distribution. More extensive simulations than those in [16, 17],
In [23], a trust-based anomaly detection technique was elaborated upon in Section IV-C, are also presented.
used to identify a malicious node. The trust is based on
the number of malicious packets injected into the network. C. Organization
It is however not clear as to how a packet is classified as In Section II, we describe the network and the adversary
legal or malicious. Therefore, the detection algorithm cannot models. In Section III, we present the detection systems
be extended to identifying the attacker considered in this and obtain the expressions for the false alarm probability. In
paper. The mechanisms presented in [24], [25] require data Section IV, results are presented to validate the expressions
for training the IDSs. In contrast, our detection method does obtained for the false alarm probability and demonstrate the
not require any training data and is based on firm theoretical performance of the proposed detection algorithms. In Section
foundations. The detection scheme in [26], where the detection V, we conclude our paper and provide some directions for
is based on the observed bit patterns, cannot be used to future work.
identify the attacker described in this paper since the attacks
we consider do not modify packets in any fixed manner and II. S YSTEM M ODEL
thus cannot be associated with particular bit patterns.
A. Network Model
We consider an IoT network with one access point, AP ,
B. Comparison to our Previous Work one relay, R, and a set of M IoT devices, D = {Dj , j =
In our previous work in [27] we considered an adversarial 1, 2, · · · , M }, associated with the relay. The IoT devices
relay which corrupts packets (unicast) to be forwarded to IoT exchange information with the secured access point AP via the
devices (i.e. the relay attacks the downlink channel of the IoT relay. Such a model can be widely implemented in both IEEE
devices). The probability of attack was assumed to be constant 802.11 local area networks and cellular wide area networks
over all the devices. In [28] we considered an adversarial with “decode and forward” relays.
relay which attacks the uplink channel (unicast) of the IoT We assume the existence of a side channel from the IoT
devices. The probability of attack is assumed to be different devices to a trusted node, as depicted in Figure 1, that will
for different devices, for greatest generality. In both cases, we be used by the proposed detection system. The same will be
assume that each user is transmitting or receiving a different elaborated upon in Section III. In this paper, we present two
packet from other users, and that all channels are independent. possibilities for deploying such trusted nodes:
Hence, packets are dropped independently of each other. 1) The access point may be used as the trusted node. In some
In addition to the unicast scenarios above, in this paper, scenarios, it may be reasonably assumed that every IoT
we consider the case of broadcast packets on the downlink device has the ability to directly communicate with the
where, in the presence of an attack, a corrupted packet is access point wirelessly, but at a bit rate that is much lower
received at all devices and thus the packet drop event at than it can communicate with its relay. To extend the

1556-6013 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2019.2922262, IEEE
Transactions on Information Forensics and Security
3

coverage of the network in order to enable the IoT devices the bits of the physical layer payload. When the packet
to communicate with the AP and vice-versa, techniques received by the IoT device is corrupted, it will be dropped
like frequency hopping, power boosting, etc. can be used and the IoT device requests for a re-transmission.
[29]. The adversary, by deliberately implementing the above strate-
2) The other possibility is to deploy special trusted nodes, gies, can create an adverse impact on the battery lifetime
called sentinel nodes [11]. In such scenarios, we assume of the IoT devices and at the same time considerably slow
that at least one sentinel node is in the range of every down the network. With a growing number of delay sensitive
IoT device. The placement of these nodes is out of the applications, increasing the system latency can have severe
scope of this paper and therefore not discussed in detail. consequences [30]. A few examples where additional delay
Before the IoT device associates itself with the trusted node, can lead to serious repercussions are smart grid, factory
it will disassociate itself from its relay R. The network model automation, process automation and healthcare. For instance,
is illustrated in Figure 1. The dashed lines represent links in a healthcare application, if packets containing personal
between IoT devices and the trusted node and the solid lines health information are delayed, wrong or even fatal treatment
represent the link via R. The wireless channel between any two decisions could be made.
devices in the network is assumed to be memoryless. For any Note that, in the presence of such an attack, a packet can be
network in normal operation, there is a non-zero probability of dropped either due to the network non-idealities or the action
decoding the bits in a packet in error due to various naturally of the relay. Such attacks are therefore difficult to detect. All
occurring channel and network non-idealities, and/or protocol of the following packets may be subjected to such attacks:
level behavior. In such a case, the following possibilities exist: • Unicast uplink packets: This refers to the packets trans-
• When a packet (transmitted by an IoT device) is dropped mitted by an IoT device to the relay. In this case we
by the relay, a retransmission request is sent by the relay assume that the probability that the relay requests the
to the IoT device, hence making the IoT device transmit device Dj to re-transmit a successfully received packet
it again. In this paper, the packet drop probability (PDP) is δuj (> 0).
of the Dj → R link is assumed to be known and denoted • Unicast downlink packets: This refers to the packets
by αuj (i.e. uplink PDP). transmitted by the relay to an IoT device. In this case,
• When a packet (transmitted by the relay) is dropped by we assume that the probability that the relay corrupts a
the IoT device, the IoT device sends a retransmission packet to be forwarded to the device Dj is δdj (> 0).
request to the relay. In this paper, the average PDP on • Broadcast packets: This refers to the packets transmitted
the R → Dj link is assumed to be known and denoted by the relay to all the IoT devices. In this case, we assume
by αdj (i.e. downlink PDP). that the probability that the relay corrupts a packet to be
One of the possible ways to estimate the natural or normal PDP forwarded to the devices is δb (> 0).
is by measurements when the network is operating normally,
and therefore the above assumptions are not impractical. III. I NTRUSION D ETECTION S YSTEM
In this section, we present the details of our hybrid intrusion
B. Adversary Model detection system (IDS) that is deployed at the trusted node. It
We now describe the strategy employed by an adversary can be seen from Section II-B that the packet drop probability
who has compromised the relay R. A compromised relay of all the types of packets increases in the presence of the
may be used to steal data and credentials of the IoT devices. described attacks. Hence, we use the measured PDP to classify
However, such attacks require the attackers to possess addi- the relay as malicious or not. The proposed IDS performs a
tional knowledge of the system parameters. For instance, when binary hypothesis test with the following hypotheses:
encryption is employed by higher layers, the eavesdropper • Hypothesis H1 : Relay is compromised and is affecting
requires access to the private key of the server in order to steal the packets.
confidential information. In this paper, we describe a lower • Hypothesis H0 : Relay is not compromised and is in
level attack that is easy to implement and has considerable normal operation.
impact on the performance of the network. It is assumed We now proceed to derive the detection rules required to detect
that the adversary’s objective is to disrupt the communication an adversary targeting the various types of packets.
between the access point and IoT devices connected to R by
implementing the following strategies:
A. Intrusion Detection System - Unicast Uplink Packets
• On the uplink, the adversary can deliberately ask an IoT
device to retransmit a successfully received packet. The To detect attacks on unicast uplink packets, the IDS requires
attacked relay can choose to forward the packet to the the following features to be enabled in the network:
AP in order to avoid having the application layer report • Each IoT device Dj has to track the number of packets
a session failure, in order to evade detection. (Nuj ), out of the past Ku packets transmitted (including
• On the downlink, the adversary can deliberately corrupt retransmitted packets), for which a NACK is received
a packet which needs to be forwarded to the IoT device. from the gateway either explicitly or implicitly.
This can be achieved by corrupting the channel pilots • All the IoT devices will regularly update the trusted node
which are used for equalization and/or flipping some of about Nuj .

1556-6013 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2019.2922262, IEEE
Transactions on Information Forensics and Security
4

Symbol Description
αuj Uplink PDP of Dj under H0
probability distribution under H0 is now defined below, where
αdj Downlink PDP of Dj under H0 Nu = [Nu1 , · · · , NuM ] and nu = [nu1 , · · · , nuM ].
δuj Uplink unicast attack probability for Dj
M
δdj Downlink unicast attack probability for Dj Y
δb Broadcast attack probability P (Nu = nu |H0 ) = P (Nuj = nuj |H0 ). (4)
βuj Uplink PDP of Dj under H1 j=1
βdj Downlink PDP of Dj under H1
Ku Uplink unicast packet window size Similarly, the joint probability distribution under H1 is
Kd Downlink unicast packet window size M
Kb Broadcast packet window size Y
δ̂uj Estimated value of δuj P (Nu = nu |H1 ) = P (Nuj = nuj |H1 ). (5)
δ̂dj Estimated value of δdj j=1
δ̂b Estimated value of δd 2) Detection Algorithm: The likelihood ratio test (LRT)
Nuj Packet retransmitted by device Dj
Ndj Packet dropped by device Dj [31], which is known to maximize the probability of detection
Bij Feedback reported by device Dj about broadcast packet i for any given probability of false alarm, is the optimum
µuj Mean of δ̂uj detection rule. The LRT decides in favor of H1 if and only if
µdj Mean of δ̂dj the following holds:
µb Mean of δ̂b
σuj Standard deviation of δ̂uj P (Nu = nu |H1 )
> γu . (6)
σdj Standard deviation of δ̂dj P (Nu = nu |H0 )
σb Standard deviation of δ̂b
Su Simplified Likelihood ratio of the unicast uplink scenario Since (6) involves parameters δuj , j ∈ {1, · · · , M } which are
Sd Simplified Likelihood ratio of the unicast downlink scenario assumed unknown at the detector, we use the Generalized LRT
Sb Simplified Likelihood ratio of the broadcast scenario (GLRT) [31] where the unknown parameters are replaced with
Γu Threshold for the unicast uplink scenario
their maximum likelihood estimates (MLE) [32]. This will be
Γd Threshold for the unicast downlink scenario
Γb Threshold for the broadcast scenario further elaborated on in Section III-A3. Assuming that δ̂uj , j ∈
αu Γ Shape parameter of the distribution of Su under H0 {1, · · · , M } are the MLEs of δuj , j ∈ {1, · · · , M }, we now
αdΓ Shape parameter of the distribution of Sd under H0 proceed to derive the detection algorithm as follows where
αbΓ Shape parameter of the distribution of Sb under H0 βuj is replaced by β̂uj , δ̂uj + (1 − δ̂uj )αuj . The detection
Nua Average number of packets retransmitted by the IoT devices
Γa Threshold for the scheme used for comparison algorithm decides in favor of H1 when
M
TABLE I: List of symbols used in the paper Y (β̂uj )nuj (1 − β̂uj )Ku −nuj
> γu (7)
j=1
(αuj )nuj (1 − αuj )Ku −nuj
M
n
Y
1) Conditional Probability Distributions of Decision Statis- ⇒ aujuj (1 − δ̂uj )Ku > γu (8)
tics: In the absence of attack, we can assume that the packet j=1
drops of different devices are independent. When there is no M
X
attack, packets are dropped with probability αuj (i.e. uplink ⇒ Su = Suj > log(γu ) = Γu (9)
PDP in the absence of attack), and hence the probability j=1
distribution of the variables Nuj , j ∈ {1, · · · , M } under H0
are given as follows: where Suj = nuj log(auj ) + Pu log(1 − δ̂uj ) and auj =
β̂uj
  αuj (1−δ̂uj )
.
Ku
P (Nuj = k|H0 ) = (αuj )k (1 − αuj )Ku −k (1) 3) Probability Estimation: In this section, we derive the
k MLEs of the probabilities δuj , j ∈ {1, · · · , M }. This is
for k ∈ {1, · · · , Ku }. When the relay is compromised, the obtained by maximizing (5) over δuj , j = {1, . . . , M }. It
uplink PDPs increase to βuj , j ∈ {1, · · · , M } which are given can be observed that the values of the probabilities which
by: maximize (5) are the same values which maximize their
individual probability distributions. Hence, the MLE of δuj
βuj = δuj + (1 − δuj )αuj (2)
is obtained by setting the derivative of P (Nuj = nuj |H1 )
where δuj , j ∈ {1, · · · , M } are unknown random vari- with respect to δuj to zero, under the constraint that δuj ≥ 0,
ables. Using this, the probability distribution of the variables i.e.,
nuj
!
Nuj , j ∈ {1, · · · , M } under H1 are given as follows: Pu − αuj
δ̂uj = max 0, . (10)
  1 − αuj
Ku
P (Nuj = k|H1 ) = (βuj )k (1 − βuj )Ku −k (3)
k We now provide an upper bound on the variance of the
estimate δ̂uj . Since estimating the mean (µ̂uj ) and the variance
for k ∈ {1, · · · , Ku }. We can assume that the wireless (σˆ2 uj ) of the estimate of δj (6= 0) is difficult, we calculate
channels used by the IoT devices in the network are inde- nuj
−αuj
pendent since they will likely be placed more than a few bounds on both the mean and variance. Say, δˆ0 uj = Pu 1−αuj
wavelengths apart from each other. Using this assumption, which implies that δ̂uj = max(0, δˆ0 uj ). It can be seen that
variables Nuj , j ∈ {1, · · · , M } are independent. The joint δˆ0 uj ≤ δ̂uj which implies that E[δˆ0 uj ] ≤ E[δ̂uj ]. Also,

1556-6013 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2019.2922262, IEEE
Transactions on Information Forensics and Security
5

2 2
δˆ0 uj ≥ δ̂uj
2
which implies that E[δˆ0 uj ] ≥ E[δ̂uj
2
]. Using these Similarly, the joint probability distribution under H1 is
observations, the following can be inferred:
M
2
Y
2
E[δ̂uj ] − (E[δ̂uj ]) ≤ E[δˆ0 uj ] − (E[δˆ0 uj ])2 .
2
(11) P (Nd = nd |H1 ) = P (Ndj = ndj |H1 ). (19)
j=1
Hence, the bounds on the mean and the variance of δˆj are as
follows: 2) Detection Algorithm: Since the probability distribution
of Nd under H1 involves unknown random variables δ̂dj , j ∈
µ̂uj ≥ µ0uj (12) {1, · · · , M }, we now derive the detection algorithm using
σˆ2 uj ≤ σ 02 uj (13) GLRT where the unknown variables are replaced by their
βuj (1−δuj )
MLEs δ̂dj , j ∈ {1, · · · , M }. This will be further elaborated
where µ0uj , δuj is the mean of δˆ0 uj and σuj
02
, Ku (1−αuj ) on in Section III-B3. Since the probability distributions of Nd
is the variance of δ̂uj . Using (13) we get under both the hypotheses are similar to Nu , the detection
algorithm obtained using GLRT decides in favor of H1 when
βuj (1 − δuj )
σˆ2 uj ≤ . (14)
Ku (1 − αuj ) M
X
Sd = Sdj > log(γd ) = Γd (20)
It can be seen from (14) that the variance decreases as we
j=1
increase Ku . Hence, for a higher Ku , a more accurate estimate
is obtained, which is to be expected. where Sdj = ndj log(adj ) + Kd log(1 − δ̂dj ) and adj =
β̂dj
αdj (1−δ̂dj )
. βˆdj , δ̂dj + (1 − δ̂dj )αdj is the MLE of βdj .
B. Intrusion Detection System Unicast - Downlink Packets
3) Probability Estimation: The MLE of the probabilities
In this part of the section, we present the IDS for detecting δdj , j ∈ {1, · · · , M } are obtained by maximizing (19) over
an adversary affecting the unicast downlink packets. The δdj , j ∈ {1, · · · , M }. The MLE of δdj is obtained by setting
intrusion detection system requires the IoT devices to execute the derivative of P (Ndj = ndj |H1 ) with respect to δdj to zero,
the following additional tasks: under the constraint that δdj ≥ 0, i.e.,
• Each IoT device Dj tracks the number of packets dropped
ndj
!
Kd − αdj
(Ndj ), out of the past Kd packets, due to a CRC check
fail. δ̂dj = max 0, . (21)
1 − αdj
• All the IoT devices will regularly update the trusted node
about Ndj . for j ∈ {1, · · · , M }. Since the expression in (21) is similar to
1) Conditional Probability Distributions of Decision Statis- (10), the bounds on the mean (µ̂dj ) and the variance (σˆ2 dj ) of
tics: We can assume the packet drops to be independent δ̂dj , j ∈ {1, · · · , M } can be obtained and are as follows:
in the absence of an attack. When there is no attack, the
packets are dropped with probability αdj , j ∈ {1, · · · , M } µ̂dj ≥ δdj (22)
(i.e. the downlink PDP in the absence of attack), and hence the βdj (1 − δdj )
probability distribution of the variables Ndj , j ∈ {1, · · · , M } σˆ2 dj ≤ . (23)
Ku (1 − αdj )
under H0 are given as follows:
  It can be seen from (23) that the variance decreases as we
Kd
P (Ndj = k|H0 ) = (αdj )k (1 − αdj )Kd −k (15) increase Kd . Hence, for a higher Kd , a more accurate estimate
k can be expected, as in the unicast uplink case.
for k ∈ {1, · · · , Pj }. When the relay is compromised, the
PDPs of the devices increase to βdj , j ∈ {1, · · · , M } which
are given by: C. Intrusion Detection System - Broadcast Packets
βdj = δdj + (1 − δdj )αdj (16) In this part of the section, we present the IDS for detecting
where δdj , j ∈ {1, · · · , M } are unknown random variables. an adversary affecting the broadcast packets. The Intrusion De-
Using this, the probability distribution of the variables Ndj , i ∈ tection System requires the network to possess the following
{1, · · · , M } under H1 are given as follows: features:
 
Kd • At regular intervals, to detect the presence of a malicious
P (Ndj = k|H1 ) = (βdj )k (1 − βdj )Kd −k (17) relay, each device Dj is required to send the feedback
k
sequence Bij , i = {1, 2, . . . , Kb } about every packet
for k ∈ {1, · · · , Pj }. Similar to the uplink case, we can assume received. If the ith packet is received successfully by Dj ,
that the variables Ndj , j ∈ {1, · · · , M } are independent. then Bij = 0, otherwise Bij = 1.
Hence, the joint probability distribution under H0 and H1 • All the IoT devices will regularly update the trusted node
is now defined below, where Nd = [Nd1 , · · · , NdM ] and about the observed number of packets dropped out of the
nd = [nd1 , · · · , ndM ]. past Kb packets. Therefore, the feedback received from
M
Y the devices about the ith packet is given by:
P (Nd = nd |H0 ) = P (Ndj = ndj |H0 ). (18)
j=1
Bi = {Bi1 , · · · , BiM }

1556-6013 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2019.2922262, IEEE
Transactions on Information Forensics and Security
6

1) Conditional Probability Distributions of Decision Statis- to define the detection statistics, the probability distribution of
tics: The probability distribution of Bij , in the absence of an nb is required. The same under H0 is defined as follows:
attack, is given as follows: • The probability that a specific packet is dropped by all
QM
the devices, under H0 , is equal to j=1 αj (, αb )
P (Bij = k|H0 ) = (αdj )k (1 − αdj )(1−k) (24)
• The probability that Nb packets are dropped by all the
for i ∈ {1, · · · Kb }, j ∈ {1, · · · M } and k ∈ {0, 1}. In the devices (out of the past Kb packets) is given as follows:
absence of an attack, we can assume that the packet drops by  
Kb
different devices are independent. Hence, the variables Bij , i ∈ P (Nb = k|H0 ) = (αb )k (1 − αb )Kb −k (29)
k
{1, · · · Kb } and j ∈ {1, · · · M } are independent and the joint
probability distribution under H0 is: Similarly, under H1 , the probability distribution of Nb is given
as follows:
P Y
M  
Y Kb
P (B = b|H0 ) = (αj )bij (1 − αj )1−bij P (Nb = k|H1 ) = (βb )k (1 − βb )Kb −k (30)
i=1 j=1
k

where B = {B1 , · · · , BKb } and b = {b1 , · · · , bKb }. In the where βb , δb + (1 − δb )αb is the probability that a specific
presence of an attack, if the ith packet is corrupted by the packet is dropped by all the devices under H1 .
adversary, it will be dropped by all the devices. Hence, the 3) Probability Estimation: The MLE of the probability δb
variables Bij , j ∈ {1, · · · , M } cannot be independent. How- is obtained by maximizing (26) over δb . Hence, the MLE of
ever, Bi , i ∈ {1, · · · , Kb } can be assumed to be independent δb is obtained by setting the derivative of P (B = b|H1 ) with
from the assumption that the wireless channel is memoryless respect to δb to zero, under the constraint that δb ≥ 0, i.e.,
 nb
Kb − α
over time. Hence, the joint probability distribution under H1

ˆ
δb = max 0, . (31)
is given as follows: 1 − αb
• Firstly, we define the probability distribution of Bi . When
Since the expression in (31) is similar to (10), the bounds on
the adversary does not corrupt the packet, the probability
the mean (µˆb ) and the variance (σˆb2 ) of δ̂dj can be obtained
we observe Bi is given by the product of individual prob-
and are as follows:
ability distributions of Bij , j ∈ {1, · · · , M }. However,
when the adversary corrupts the packet, the packet will µˆb ≥ δb (32)
be dropped by all devices. Hence, the probability mass βb (1 − δb )
function of Bi is given as follows: σˆb2 ≤ . (33)
Kb (1 − αb )
M
Y It can be seen from (33) that the variance decreases as we
P (Bi = bi |H1 ) =(1 − δb ) (αdj )bij (1 − αdj )1−bij increase Kb . Hence, for a higher Kb , a more accurate estimate
j=1
can be expected.
M
Y
+ δb bij (25)
j=1
D. Performance Characteristics of the Algorithms
To evaluate the performance of the algorithm in (9), we
• Since Bi , i ∈ {1, · · · , Kb } are independent, the joint use the false alarm and missed detection probabilities. The
probability distribution is given as follows: probability that the detection system decides on H1 in the
P
Y absence of an attack is defined as the false alarm probability
P (B = b|H1 ) = P (Bj = bj |H1 ) (26) (PFk A ). The probability that the detection system decides on
i=1 H0 in the presence of an attack is defined as the missed
k
where B = {B1 , · · · , BKb } and B = {b1 , · · · , bKb }. detection probability (PM D ). We therefore have

2) Detection Algorithm: Since the probability distribution PFk A = P (Sk > Γk |H0 ) (34)
of B under H1 involves an unknown random variable δb , we k
use the GLRT to obtain the decision rule. The parameter δb is
PM D = P (Sk ≤ Γk |H1 ). (35)
now replaced with its MLE, δ̂b . This will be further elaborated for k ∈ {u, d, b}.
on in Section III-C3. The detection algorithm decides in favor Firstly, we consider the unicast case. Using the expressions
of H1 when obtained for the estimated attack probabilities, the expressions
P (B = b|H1 ) obtained for the variables Sdj , j ∈ {1, · · · , M } and Suj , j ∈
> γb . (27)
P (B = b|H0 ) {1, · · · , M } are of the following form:

This can be simplified as follows:   
n log nt (1−αt ) + K log Kt −nt , if nt > α

t αt (Kt −nt ) t Kt (1−αt ) Kt t
F =
Sb = Kb log(1 − δ̂b ) + nb log (ab ) > log(γb ) = Γb (28) 0, if nt
≤ αt Kt
β̂b QP
where ab = α (1− δ̂b )
, αb = j=1 αdj , β̂b = δ̂b + (1 − δ̂b )αb We know that the probability distribution of nt is binomial
b
and Nb = nb is the number of packets dropped by all the (B(αt , Kt )) but finding the distribution of F is not trivial.
devices. To obtain the probability distribution for Sb required Hence, it is difficult to find distribution of the variables

1556-6013 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2019.2922262, IEEE
Transactions on Information Forensics and Security
7

(a)
1 0.2

0.9
0.15

g( t )
0.8
0.1
0.7 Estimated Value
Approximated Value
0.05
0.6 0 0.05 0.1 0.15 0.2 0.25
CDF

t
0.5 (b)
2.2

0.4 2

1.8
0.3

h( t )
1.6

0.2 Actual CDF


1.4
Gamma Approximated CDF
Half Normal Approximated CDF 1.2
0.1
Exponential Approximated CDF 1
0 0.05 0.1 0.15 0.2 0.25
0
t
0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2
F
Fig. 3: (a) Shape parameter, g(αt ), variation with αt . (b)
Fig. 2: Distribution Fitting Comparison Inverse scale parameter, h(αt ) variation with αt .

Sdj , j ∈ {1, · · · , M } and Suj , j ∈ {1, · · · , M } and therefore The values of g(αt ) and h(αt ) obtained as we vary αt are
Su and Sd . Exact analytical expressions for the detection shown in the Figures 3(a) and 3(b). It can be observed from
statistics are thus unavailable. Note that the attack probabilities the plots that h(αt ) does not change much with varying αt .
are zero under H0 , and so PFuA and PFd A are independent of Hence, we propose the value of h(αt ) to be constant (over
the adversary parameters. However, for the threshold chosen to αt ) and equal to 1.25 (the mean obtained) for Kt = 100. The
meet the desired false alarm probability value, the correspond- expression for g(αt ) as a function of αt is as follows:
ing missed detection probability is a function of the attack
probabilities. The proposed IDS’s performance in terms of the g(αt ) = 0.1777e0.4565αt − 0.189e−786.1αt (36)
missed detection probability will still be acceptable as long as Using (36), we now approximate Sdj , j ∈ {1, · · · , M } and
attack probabilities are not too small, which we can assume Suj , j ∈ {1, · · · , M } as Gamma random variables (in the
to be true since otherwise, the attack would not be effective. absence of attack i.e. under H0 ) as shown below:
Therefore, to find the thresholds, we need the expressions for
false alarm probability for which the probability distributions Suj ∼ Γ(g(αuj ), 1.25) (37)
of the variables Su and Sd under H0 are required. Sdj ∼ Γ(g(αdj ), 1.25) (38)
Since the closed form distribution of F (under H0 ) cannot
be found, we approximate it with a Gamma distribution. The for j ∈ {1, · · · , M }. Using the expressions obtained for Su
Gamma distribution can be a good fit because by adjusting its and Sd in (9) and (20) and the distributions obtained for
two parameters (shape parameter and inverse scale parameter), Sdj , j ∈ {1, · · · , M } and Suj , j ∈ {1, · · · , M } under H0 ,
we can get PDFs of many different shapes for non-negative the distributions for Su and Sd under H0 are as follows:
random variables, which F is. The same can be observed in Su ∼ Γ(αΓu , 1.25) (39)
Figure 2, for αt = 0.05, where the discrepancy between the
cumulative distribution function (CDF) of Gamma distribution Sd ∼ Γ(αΓd , 1.25) (40)
fit and the actual CDF of F is less as compared to the other PM
where αΓu = j=1 g(αuj ) and αΓd = j=1 g(αdj ).
PM
distributions. Therefore, once we find the parameters of the For the broadcast case, it can be seen that the expression for
best fit Gamma distribution for F , we can then derive PFuA Sb is similar to F . Hence, we approximate Sb with a Gamma
and PFd A , and hence the thresholds Γu and Γd necessary to distribution in the absence of attack as shown below:
achieve a desired false alarm probability.
We now numerically obtain the expressions for the parame- Sb ∼ Γ(αΓb , 1.25) (41)
ters of the Gamma distribution of F , the shape parameter given
where αΓu = g(αb ).
by g(αt ) and the inverse scale parameter h(αt ). We followed
the below procedure for the same:
7
• For every possible value of αk generate 10 values of nt
E. Threshold Design
for a fixed Kt (= 100). To obtain the threshold for the IDSs presented in (9), (20)
• Evaluate the corresponding value of F using the above and (28), the following procedure can be used:
values. 1) For any given detection system, either the false alarm
7
• For each αt , using the generated 10 values of F , we probability or the missed detection probability is fixed to
fit it to Gamma distribution and obtain the corresponding obtain the parameters. Since we do not have the analytical
parameters. expressions for the missed detection probability, we use

1556-6013 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2019.2922262, IEEE
Transactions on Information Forensics and Security
8

Device D1 D2 D3 D4 D5 D6 D7 D8
αuj 0.06 0.24 0.13 0.97 0.09 0.07 0.02 0.12 10
-3 (a)
δuj 0.2 0 0 0 0.1 0 0 0.2
2.5
TABLE II: Parameters of the Devices - Unicast
2

Device αj
D1 0.2547 1.5
D2 0.2374 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5 0.55 0.6
D3 0.1272
10 -3 (b)
2.5
TABLE III: Parameters of the Devices - Broadcast
2

1.5
the false alarm probability expressions for setting the
threshold. 1
2) The desired false alarm probability, equal to ρ, is fixed 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5 0.55 0.6

and is user defined, i.e., PFk A = ρ, k ∈ {u, b, d}.


3) Using (39), (40) and (41) we can now obtain the thresh- Fig. 4: (a) Sample Variance and Upper Bound of the Variance
olds Γu , Γd and Γb by using the cumulative distribution of attack probability δ̂u1 (vs) δu1 (b) Sample Variance and
function of the Gamma distribution such that Upper Bound of the Variance of attack probability δ̂b (vs) δb .
P (Sk > Γk |H0 ) = ρ, k ∈ {u, b, d}. (42)
A. Variance of the MLE Estimates
The expressions for PF A in (39), (40) and (41) depend on
the number of devices reporting the feedback about the relay. If To demonstrate that the variance of the MLE estimate is
only the set A ⊂ D of devices have reported, the expressions close to the upper bound on its variance, for the unicast case,
can be changed in negligible time and a new threshold can we ran the following steps:
be estimated. Therefore, the IDS presented in this paper can • For a given value of δu1 , we determine the number of
automatically adapt to the received feedback. packets dropped for the IoT Device D1 .
• We then calculate δ̂u1 using (10).

Similarly, for the broadcast case, we ran the following steps


IV. R ESULTS
to obtain the simulated variance of the MLE estimate of δb :
It can be observed from (9) and (20) that the detection • For a given value of δb , we determine the number of
algorithms for unicast uplink and downlink packets are similar. packets dropped by all the IoT Devices.
Hence, we present the results for the unicast uplink and • We then calculate δ̂b using (31).
broadcast cases only. We demonstrate the following, using The sample variances of δ̂b and δ̂u1 , for a given δb and δu1 ,
simulations performed in MATLAB, in this section: are calculated using the estimates obtained from 107 Monte
1) The upper bound to the variance of the estimated attack Carlo simulations. The results obtained are plotted in Figure
probabilities and the simulated variance are compared. 4. It can be seen that the upper bound calculated is very close
2) The expressions obtained for the false alarm probabilities to the real estimated value for both the cases.
are validated.
3) The impact of the adversary parameters on the perfor-
B. Performance Characteristics
mance of the proposed IDSs.
4) The performance of the IDSs proposed in the presence Firstly, we validate the expressions obtained for PFuA and
of compromised IoT devices. PFb A .For the same, we calculate PFuA and PFb A using the
5) The performance of the IDS in (9) is compared against Gamma approximation (we term these as approximate PFuA
a benchmark scheme based on the number of packets and PFb A ) and also using simulations (we term these as
retransmitted. The same can be extended to the IDSs in simulated PFuA and PFb A ). To calculate the simulated PFuA ,
(20) and (28) and therefore not discussed. the following steps were followed:
For the unicast scenario, we use a network setup with one • We setup the network using H0 , i.e., all the values of

access point, one relay and eight IoT devices associated with δuj , j ∈ {1, · · · , M } are equal to zero. In every iteration,
the relay. The value of Ku is 100. The simulated natural PDPs using simulations, we determine the number of packets
and attack probabilities on every device are given in Table II. dropped for every IoT Device and then calculate δ̂uj , j ∈
For the broadcast scenario, we use a network setup with one {1, · · · , M } using (10).
access point, one relay and three IoT devices associated with • We then plug in the values in (9) and compare with a

the relay. The value of Kb is 100. The device PDPs used for pre-defined threshold (Γu ) to decide H0 or H1 .
generating the results are available in Table III. The MATLAB To calculate the simulated PFb A , the following steps were
code is available and may be downloaded from [33]. followed:

1556-6013 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2019.2922262, IEEE
Transactions on Information Forensics and Security
9

(a) (a)
100

-2
10

10 -4 10-5

2 4 6 8 10 12 14 16
10-6 10-5 10-4 10-3 10-2 10-1 100

(b)
(b)
10-3

10 -4
10-4

10-5
10 -6

4 5 6 7 8 9 10 11 12 10-6
10-7 10-6 10-5 10-4 10-3

Fig. 5: (a) Approximated and Simulated PFuA (b) Approxi-


u u b b
mated and Simulated PFb A . Fig. 6: (a) PM D (vs) PF A for different δu1 (b) PM D (vs) PF A
for different δb .

•We setup the network using H0 , i.e., the value of δb is


D1 D1
equal to zero. In every iteration, using simulations, we D2
determine the number of packets dropped by all devices. D3
D2

• The values of δ̂b is calculated using (31). D8 D3


• We then plug in the values in (9) and compare with a
Compromised Compromised Compromised
IoT Device AP IoT Device Relay AP
pre-defined threshold (Γb ) to decide H0 or H1 . IoT Device Relay IoT Device

(a) (b)
The simulated PFuA and PFb A values are obtained by averaging
over 107 such Monte Carlo simulations. The results obtained Fig. 7: (a) Adversary - Unicast (b) Adversary - Broadcast.
are shown in Figure 5. It can be observed from Figure 5(a) that
the discrepancy between the simulated PFuA and approximated
PFuA is very small. The discrepancy observed between the 1) Unicast IDS: Consider the network in Figure 7(a) where
approximated PFb A and the simulated PFb A , as can be observed the adversary has compromised the relay R and devices D2
in Figure 5(b), at a few threshold (Γb ) values is because and D3 . The adversary can now use the compromised relay
we approximated a discrete random variable Sb with Gamma to compromise the performance and use the compromised
distribution. devices to send favourable readings about the relay and try to
A similar approach was carried out for obtaining the sim- influence the IDS. In such a scenario, the feedback received
u b
ulated PM D and PM D values with the only difference being from the devices is stated below:
that the network is setup using H1 . For the unicast case, to • The set of IoT devices which are not compromised
u
demonstrate the effect of the attack probability on PM D , we {D1 , D4 , · · · , D8 } transmit the readings observed at their
varied δu1 . For the broadcast case, we varied δb . The results respective end to the IDS computer.
obtained, shown in Figure 6, depict that missed detection prob- • The set of IoT devices which are compromised {D2 , D3 }
ability decreases with increasing attack probability for both falsify their feedback to indicate that the relay is not ma-
the cases. Hence, there is a trade-off between the adversary’s licious. This can be achieved by generating the feedback
choice of attack probabilities and the probability of the attack using their individual probability distribution obtained
being discovered. It can be observed that, the values of Sb under H0 i.e. using (1).
and Su increase in the presence of attack with an increase in
To demonstrate the performance of the IDS in (9), we used
the values of the attack probabilities. Hence, the gap between
the scenarios in Table IV. The performance characteristics
the values of Sb and Su in the presence of attack and absence
obtained for the IDS in (9) are plotted in Figure 8. It can
of attack increases. Therefore, for the same threshold, we can
be seen that the IDS is able to detect the attack even in the
expect a better performance.
scenario 1 where only one affected device, D1 , is sharing
honest feedback, with a detection probability almost equal to
C. Performance in the presence of compromised IoT devices one. Therefore, the IDSs presented in (9) can be used to detect
In this section, we demonstrate the performance of the IDSs an adversary who has compromised the relay and a subset of
for possible adversary models other than the one mentioned IoT devices.
in Section II-B. For the unicast case, we present the results 2) Broadcast IDS: Consider the network in Figure 7(b)
for the uplink packets since the same can be extended for the where the adversary has compromised the device D3 but not
downlink packets (due to the similarities in the IDSs). the relay. The adversary can now use the compromised device

1556-6013 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2019.2922262, IEEE
Transactions on Information Forensics and Security
10

δu1 δu4 δu5 δu6 δu7 δu8


Scenario 1 0.2 0 0 0 0 0 (a)
10 0
Scenario 2 0.2 0 0.1 0 0 0

Probability of False Alarm


Scenario 3 0.2 0 0.1 0 0 0.2
10 -2

TABLE IV: Attack Probabilities


10 -4
Actual
mb
= 0.4
= 0.5
10 -6 mb

4 5 6 7 8 9 10 11 12
Threshold ( b )
(b)
10-2 10 0

Probability of False Alarm


10 -2

10-3
10 -4
P MD

10 -6 Actual
10-4 One Compromised Device
Two Compromised Devices
10 -8
4 5 6 7 8 9 10 11 12
10-5 Threshold

Fig. 9: (a) Simulated False Alarm Probability for varying δmb


10-6 Scenario 1
Scenario 2 (b) Simulated False Alarm Probability for increasing number
Scenario 3
of compromised devices where δmb = 0.5.
10-7
10-3 10-2
P FA

u u
Fig. 8: Simulated PM D (vs) PF A for different scenarios Average
10-1 GLRT

to send false readings about the relay and try to influence 10-2
the IDS. To obtain the simulated false alarm probability, the
following steps were followed: 10-3
PMD

• The devices D1 and D2 are transmitting the actual (and


authentic) reading and D3 is transmitting false readings. 10-4

The false readings are generated in order to influence


the IDS to classify the relay as malicious. The feedback 10-5

is generated to make it appear that the device D3 is


10-6
experiencing a packet drop rate equal to δmb .
• In every iteration, using simulations, we determine the
10-7
number of packets dropped by all IoT devices. 10-5 10-4 10-3 10-2 10-1
• The values of δ̂b is calculated using (31). PFA
• We then plug in the values in (9) and compare with a
Fig. 10: Comparison with the scheme in (43)
pre-defined threshold (Γb ) to decide H0 or H1 .
The results obtained are plotted in Figure 9(a). Let us consider
another scenario where the device D2 is also compromised the IoT devices. The most common aggregation operator that
along with D3 . To obtain the false alarm probability for this can be used when such feedback is available is the average
scenario we followed similar approach with the only difference operator. In such a case the detection algorithm is implemented
being that the device D2 also generates false readings similar as follows:
to D3 . The results obtained are plotted in Figure 9(b). From
both the scenarios it can be concluded that the performance 1) We first determinePthe average number of packets retrans-
1 M
of the detection algorithm degrades with increasing number mitted Nua = M j=1 Nuj .
of compromised devices and/or increasing δmb . However, the 2) We then compare Nua obtained in the previous step
performance will be reasonably good unless the number of with a preset threshold (Γa ) to determine if the relay is
compromised devices exceeds the number of the authentic malicious or not, i.e., we decide H1 if and only if
devices and/or the value of δmb is large.
Nua > Γa (43)
D. Comparison The performance characteristics of our detection scheme in
In this part of the section, we compare the detection algo- (9) and the detection scheme in (43) are plotted in Figure 10.
rithm obtained in (9) against a scheme based on the average The device PDPs used are available in Table II. It can be seen
number of packets retransmitted. The detection algorithm can from Figure 10 that our detection scheme outperforms the one
be perceived as an aggregation of the feedback received from presented in (43).

1556-6013 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2019.2922262, IEEE
Transactions on Information Forensics and Security
11

V. C ONCLUSION AND F UTURE W ORK R EFERENCES


A. Conclusion [1] S. Chen, H. Xu, D. Liu, B. Hu, and H. Wang, “A vision of IoT:
Applications, challenges, and opportunities with china perspective,”
A novel approach for detecting an adversary who has IEEE Internet of Things journal, vol. 1, no. 4, pp. 349–359, 2014.
[2] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things
compromised the relay and corrupting the communication (IoT): A vision, architectural elements, and future directions,” Future
between an IoT device and the access point was presented. The generation computer systems, vol. 29, no. 7, pp. 1645–1660, 2013.
detection method was derived using the generalized likelihood [3] M. M. Hossain, M. Fotouhi, and R. Hasan, “Towards an analysis of
ratio test. To detect an adversary affecting unicast uplink security issues, challenges, and open problems in the Internet of Things,”
in Services, 2015 IEEE World Congress on. IEEE, 2015, pp. 21–28.
packets, the detection rule was based on the number of unicast [4] A.-R. Sadeghi, C. Wachsmann, and M. Waidner, “Security and privacy
packets re-transmitted by the IoT devices and dropped at challenges in industrial Internet of Things,” in Design Automation
the relay. To detect an adversary affecting unicast downlink Conference (DAC), 2015 52nd ACM/EDAC/IEEE. IEEE, 2015.
[5] D. Evans, “The Internet of Things: How the Next Evolution
packets, the detection rule was based on the number of unicast of the Internet Is Changing Everything,” 2011. [Online].
packets dropped by the IoT devices. To detect an adversary Available: https://www.cisco.com/c/dam/en us/about/ac79/docs/innov/
affecting broadcast packets, the detection rule was based on IoT IBSG 0411FINAL.pdf
[6] A. A. Abbasi and M. Younis, “A survey on clustering algorithms for
the number of broadcast packets dropped by all IoT devices. wireless sensor networks,” Computer communications, vol. 30, no. 14,
The adversary parameters (i.e. the attack probabilities) were pp. 2826–2841, 2007.
obtained using maximum likelihood estimation. Results pre- [7] K. T. Nguyen, M. Laurent, and N. Oualha, “Survey on secure communi-
cation protocols for the Internet of Things,” Ad Hoc Networks, vol. 32,
sented demonstrated the performance of the detection systems. pp. 17–31, 2015.
We are able to achieve a negligible false alarm and missed [8] M. Hossain, S. R. Islam, F. Ali et al., “An Internet of Things-based
detection probability for most cases. The tightness of the upper health prescription assistant and its security system design,” Future
Generation Computer Systems, vol. 82, pp. 422–439, 2018.
bound variance (of the MLEs) to the simulated variance (of [9] D. Azariadi, V. Tsoutsouras, S. Xydis, and D. Soudris, “ECG signal
the MLEs) was presented. The expressions obtained for the analysis and arrhythmia detection on IoT wearable medical devices,”
false alarm probabilities were validated using simulations. It in 2016 5th International conference on modern circuits and systems
technologies (MOCAST). IEEE, 2016, pp. 1–4.
was observed that the expressions obtained differed from the [10] M. Collotta, L. L. Bello, and G. Pau, “A novel approach for dynamic
simulated values only very slightly. The performance of the traffic lights management based on Wireless Sensor Networks and
IDSs for the case of adversaries who have compromised a multiple fuzzy logic controllers,” Expert Systems with Applications,
vol. 42, no. 13, pp. 5403 – 5415, 2015.
subset of the IoT devices was also presented. [11] A. Tandon, T. J. Lim, and U. Tefek, “Sentinel Based Malicious Relay
Detection Scheme for Wireless IoT Networks,” in 2018 IEEE Globecom
Workshops (GC Wkshps), Dec 2018, pp. 1–6.
B. Directions for Future work [12] M. Miettinen, S. Marchal, I. Hafeez, N. Asokan, A.-R. Sadeghi, and
S. Tarkoma, “IoT Sentinel: Automated device-type identification for se-
The unicast IDSs can be influenced when a situation similar curity enforcement in IoT,” in Distributed Computing Systems (ICDCS),
2017 IEEE 37th International Conference on. IEEE, 2017, pp. 2177–
to Figure 7(b) (where a subset of IoT devices are compro- 2184.
mised) is considered. This can be done by generating the [13] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing
feedback using the probability distributions in (3) and (17). misbehavior in mobile ad hoc networks,” in Proceedings of the 6th
In such a case, the unicast IDSs presented in this paper would annual international conference on Mobile computing and networking.
ACM, 2000, pp. 255–265.
be misguided and hence would classify the relay as malicious. [14] B. B. Zarpelão, R. S. Miani, C. T. Kawakani, and S. C. de Alvarenga, “A
The broadcast IDS can be influenced when a situation similar Survey of Intrusion Detection in Internet of Things,” Journal of Network
to Figure 7(a) (where a subset of IoT and the relay are and Computer Applications, 2017.
[15] M. Zamani and M. Movahedi, “Machine learning techniques for Intru-
compromised) is considered. The compromised IoT devices sion Detection,” arXiv preprint arXiv:1312.2177, 2013.
are transmitting favorable feedback in order to influence the [16] S. Raza, L. Wallgren, and T. Voigt, “SVELTE: Real-time intrusion
decision of the IDS. In such a case, the IDS presented in this detection in the Internet of Things,” Ad hoc networks, vol. 11, no. 8,
pp. 2661–2674, 2013.
paper has a good chance that it would be misguided and hence [17] J. Ren, Y. Zhang, K. Zhang, and X. Shen, “Adaptive and channel-aware
would classify the relay as authentic. Therefore, an interesting detection of selective forwarding attacks in wireless sensor networks,”
future work would be to identify an alternate approach to IEEE Transactions on Wireless Communications, vol. 15, no. 5, pp.
3718–3731, 2016.
detect such attacks. Another strategy for an adversary to drain [18] S. Lim and L. Huie, “Hop-by-Hop cooperative detection of selective
the batteries of the IoT devices, is by making the IoT devices forwarding attacks in energy harvesting wireless sensor networks,” in
transmit redundant packets at a high rate. By doing so, the Computing, Networking and Communications (ICNC), 2015 Interna-
tional Conference on. IEEE, 2015, pp. 315–319.
awake time of the IoT devices increases and thus their battery [19] C. Tumrongwittayapak and R. Varakulsiripunth, “Detecting sinkhole
life is adversely impacted. Therefore, another interesting future attack and selective forwarding attack in wireless sensor networks,” in
work would be to detect such adversaries using feedback based Information, Communications and Signal Processing, 2009. ICICS 2009.
7th International Conference on. IEEE, 2009, pp. 1–5.
on the channel access time. [20] C. Pu and S. Lim, “A light-weight countermeasure to forwarding mis-
behavior in wireless sensor networks: design, analysis, and evaluation,”
IEEE Systems Journal, 2016.
ACKNOWLEDGMENT [21] F. Gara, L. B. Saad, and R. B. Ayed, “An intrusion detection system for
selective forwarding attack in IPv6-based mobile WSNs,” in Wireless
This research is supported by the National Research Foun- Communications and Mobile Computing Conference (IWCMC), 2017
dation, Prime Minister’s Office, Singapore under its Corporate 13th International. IEEE, 2017, pp. 276–281.
[22] L. Wallgren, S. Raza, and T. Voigt, “Routing Attacks and Countermea-
Laboratory@University Scheme, National University of Sin- sures in the RPL-based Internet of Things,” International Journal of
gapore, and Singapore Telecommunications Ltd. Distributed Sensor Networks, vol. 9, no. 8, p. 794326, 2013.

1556-6013 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2019.2922262, IEEE
Transactions on Information Forensics and Security
12

[23] W. Meng, “Intrusion Detection in the Era of IoT: Building Trust via Teng Joon (T.J.) Lim (S92-M95-SM02-F17) ob-
Traffic Filtering and Sampling,” Computer, vol. 51, no. 7, pp. 36–43, tained the B.Eng. degree in Electrical Engineering
July 2018. with first-class honours from the National University
[24] N. Sehatbakhsh, M. Alam, A. Nazari, A. Zajic, and M. Prvulovic, of Singapore (NUS) in 1992, and the Ph.D. degree
“Syndrome: Spectral analysis for anomaly detection on medical IoT from the University of Cambridge in 1996. From
and embedded devices,” in 2018 IEEE International Symposium on September 1995 to November 2000, he was a re-
Hardware Oriented Security and Trust (HOST), April 2018, pp. 1–8. searcher at the Centre for Wireless Communications
[25] H. Haddad Pajouh, R. Javadian, R. Khayami, A. Dehghantanha, R. Choo in Singapore, one of the predecessors of the Institute
et al., “A two-layer dimension reduction and two-tier classification for Infocomm Research (I2R). From December 2000
model for anomaly-based intrusion detection in IoT backbone networks,” to May 2011, he was Assistant Professor, Associate
IEEE Transactions on Emerging Topics in Computing, 2016. Professor, then Professor at the University of Toron-
[26] D. H. Summerville, K. M. Zach, and Y. Chen, “Ultra-lightweight deep tos Edward S. Rogers Sr. Department of Electrical and Computer Engineering.
packet anomaly detection for Internet of Things devices,” in 2015 Since June 2011, he has been a Professor at the Electrical & Computer
IEEE 34th International Performance Computing and Communications Engineering Department of NUS, where he served as a Deputy Head from
Conference (IPCCC), Dec 2015, pp. 1–8. July 2014 to August 2015. Since September 2015, he has served as Vice-Dean
[27] N. V. Abhishek, T. J. Lim, B. Sikdar, and A. Tandon, “An Intrusion De- (Graduate Programs) in the NUS Faculty of Engineering.
tection System for Detecting Compromised Gateways in Clustered IoT Professor Lim was an Area Editor of the IEEE Transactions on Wireless
Networks,” in 2018 IEEE International Workshop Technical Committee Communications from September 2013 to September 2018, and previously
on Communications Quality and Reliability. IEEE, 2018, pp. 1–6. served as an Associate Editor for the same journal. He has also served
[28] N. V. Abhishek, A. Tandon, T. J. Lim, and B. Sikdar, “Detecting as an Associate Editor for IEEE Wireless Communications Letters, Wiley
Forwarding Misbehavior in Clustered IoT Networks,” in 14th ACM Transactions on Emerging Telecommunications Technologies (ETT), IEEE
International Symposium on QoS and Security for Wireless and Mobile Signal Processing Letters and IEEE Transactions on Vehicular Technology.
Networks (ACM Q2SWinet 2018), Montreal, Canada, Oct. 2018. He has volunteered on the organizing committee of a number of IEEE
[29] R. Ratasuk, N. Mangalvedhe, and A. Ghosh, “Extending lte coverage for conferences, including serving as the TPC co-chair of IEEE Globecom 2017.
machine type communications,” in Internet of Things (WF-IoT), 2015 He was the chair of the Singapore chapter of the IEEE Communications
IEEE 2nd World Forum on. IEEE, 2015, pp. 193–197. Society for 2017 and 2018.
[30] P. Schulz, M. Matthe, H. Klessig, M. Simsek, G. Fettweis, J. Ansari, His research interests span many topics within wireless communications,
S. A. Ashraf, B. Almeroth, J. Voigt, I. Riedel et al., “Latency critical including cyber-security in the Internet of Things, heterogeneous networks,
IoT applications in 5G: Perspective on the design of radio interface and cooperative transmission, energy-optimized communication networks, multi-
network architecture,” IEEE Communications Magazine, vol. 55, no. 2, carrier modulation, MIMO, cooperative diversity, cognitive radio, and stochas-
pp. 70–78, 2017. tic geometry for wireless networks, and he has published widely in these
[31] S. M. Kay, “Fundamentals of statistical signal processing: Detection areas.
theory, vol. 2,” 1998.
[32] S. M. Kay, “Fundamentals of statistical signal processing. Vol 1,
Estimation theory,” 1993.
[33] Matlab code. [Online]. Available: https://www.ece.nus.edu.sg/stfpage/
bsikdar/scripts/tifs glrt/

Nalam Venkata Abhishek received his bachelor


of technology in Electrical Engineering from Indian
Institute of Technology, Mandi, India, in 2014. Be-
tween 2014 and 2016, he worked in the industry
where he was working towards developing efficient
cellular and wireless technology solutions. Nalam Biplab Sikdar (S98-M02-SM09) received the
is currently a doctoral student in the department B.Tech. degree in electronics and communication en-
of Electrical and Computer Engineering at National gineering from North Eastern Hill University, Shil-
University of Singapore (NUS), Singapore. His re- long, India, in 1996, the M.Tech. degree in electrical
search interests include Physical layer cyber security, engineering from the Indian Institute of Technology,
and Vehicular network security. Kanpur, India, in 1998, and the Ph.D. degree in
electrical engineering from the Rensselaer Polytech-
nic Institute, Troy, NY, USA, in 2001. He was on
the faculty of Rensselaer Polytechnic Institute from
2001 to 2013, first as an Assistant and then as an
Associate Professor. He is currently an Associate
Professor with the Department of Electrical and Computer Engineering,
Anshoo Tandon (S’13–M’17) received the B.E. National University of Singapore, Singapore. His research interests include
degree in Computer Science and Engineering from computer networks, and security for IoT and cyber physical systems. Dr.
Kumaun University, Nainital, India, in 1998, the Sikdar is a member of Eta Kappa Nu and Tau Beta Pi. He served as an
M.E. degree in Signal Processing from the Indian Associate Editor for the IEEE Transactions on Communications from 2007 to
Institute of Science, Bangalore, India, in 2000, and 2012 and for the IEEE Transactions on Mobile Computing from 2014-2017.
the Ph.D. degree from the National University of
Singapore (NUS), Singapore, in 2016. Between 2000
and 2011, he worked in different capacities in the
industry towards developing efficient cellular and
wireless connectivity solutions.
Dr. Tandon is currently a Research Fellow in the
department of Electrical and Computer Engineering at NUS, Singapore. His
research interests include information theory, communication theory, and
algebra.

1556-6013 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Anda mungkin juga menyukai