Comparison of IoT Communication Protocols Using Anomaly Detection with Security Assessments of Smart Devices

Author:

Bhardwaj AkashdeepORCID,Kaushik KeshavORCID,Bharany SalilORCID,Elnaggar Mohamed F.ORCID,Mossad Mohamed I.ORCID,Kamel SalahORCID

Abstract

The authors implemented an attack scenario that involved simulating attacks to compromise node and sensor data. This research proposes a framework with algorithms that generates automated malicious commands which conform to device protocol standards and bypass compromise detection. The authors performed attack-detection testing with three different home setup simulations and referred to Accuracy of Detection, Ease of Precision, and Attack Recall, with the F1-Score as the parameter. The results obtained for anomaly detection of IoT logs and messages used K-Nearest Neighbor, Multilayer Perceptron, Logistic Regression, Random Forest, and linear Support Vector Classifier models. The attack results presented false-positive responses with and without the proposed framework and false-negative responses for different models. This research calculated Precision, Accuracy, F1-Score, and Recall as attack-detection performance models. Finally, the authors evaluated the performance of the proposed IoT communication protocol attack framework by evaluating a range of anomalies and compared them with the maliciously generated log messages. IoT Home #1 results in which the model involving an IP Camera and NAS device traffic displayed 97.7% Accuracy, 96.54% Precision, 97.29% Recall, and 96.88% F1-Score. This demonstrated that the model classified the Home #1 dataset consistently.

Funder

Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia

Publisher

MDPI AG

Subject

Process Chemistry and Technology,Chemical Engineering (miscellaneous),Bioengineering

Reference35 articles.

1. How Many IoT Devices Are There in 2021? [More than Ever!] https://techjury.net/blog/how-many-iot-devices-are-there/

2. Connect Devices to IoT Platform over CoAP—Device Connection https://partners-intl.aliyun.com/help/doc-detail/57697.htm

3. All the Internet of Things—Episode Two: Protocols|Adafruit https://learn.adafruit.com/alltheiot-protocols?view=all

4. Bosch IoT Hub: Deprecation of AMQP Specific Message Header https://bosch-iot-suite.com/news/bosch-iot-hub-deprecation-of-amqp-specific-message-header/

5. How to Deploy Cassia’s Bluetooth (BLE) Gateways over Cellular https://www.cassianetworks.com/blog/how-to-deploy-cassias-bluetooth-ble-gateways-over-cellular-networks-with-soracom/

Cited by 7 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Enhancing IoT Data Analysis with Machine Learning: A Comprehensive Overview;LatIA;2024-07-17

2. Evolving Threat Landscape in IoT and IIoT Environments;Advances in Information Security, Privacy, and Ethics;2024-06-30

3. Leveraging Deep Learning Techniques for Securing the Internet of Things in the Age of Big Data;Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection;2024-03-22

4. Wi-Fi HaLow: Literature Review About Potential Use Of Technology In Agriculture And Smart Cities in Indonesia;2024 International Conference on Green Energy, Computing and Sustainable Technology (GECOST);2024-01-17

5. Safeguarding the IoT: Taxonomy, security solutions, and future research opportunities;SECURITY AND PRIVACY;2023-11-20

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3