Fuzzy Intrusion Detection Method and Zero-Knowledge Authentication for Internet of Things Networks
Keywords:
Internet of Things (IoT), Intrusion Detection, fuzzy logic, NetworksAbstract
One of the encouraging trends that has contributed to the exponential rise in human progress over the last decade is the Internet of Things (IoT). Interconnection of physical objects for the purpose of data exchange is the next frontier of the internet, known as the Internet of Things (IoT). Everything from household appliances to cars to buildings to animals is part of the Internet of Things (IoT). The Internet of Things (IoT) has become the de facto standard because to its many useful uses in business, medicine, agriculture, and other fields. The Internet of Things (IoT) integrates wireless, pervasive, and ubiquitous technology to solve problems. Things with sensors implanted in them and linked over the internet make it up. Data is collected and shared by these networked devices. Many applications rely on the monitoring and analysis of data originating from heterogeneous devices. Fuzzy logic is used in this study to create a new, lightweight intrusion detection system (IDS) for Internet of Things (IoT) applications based on the MQTT protocol. Using fuzzy variables, the IDS detects network irregularities. In conclusion, this study offers a fresh security framework to solve the problems with current algorithms in an Internet of Things setting. This study also provides an application layer security that smart environments may use to avoid DoS attacks.
Downloads
References
Kaushik, A., Al-Raweshidy, H. A novel intrusion detection system for internet of things devices and data. Wireless Netw 30, 285–294 (2024). https://doi.org/10.1007/s11276-023-03435-0
Rui, K., Pan, H. & Shu, S. Secure routing in the Internet of Things (IoT) with intrusion detection capability based on software-defined networking (SDN) and Machine Learning techniques. Sci Rep 13, 18003 (2023). https://doi.org/10.1038/s41598-023-44764-6
Alexey Finogeev, Michael Deev, Danila Parygin & Аnton Finogeev (2022) Intelligent SDN Architecture With Fuzzy Neural Network and Blockchain for Monitoring Critical Events, Applied Artificial Intelligence, 36:1, DOI: 10.1080/08839514.2022.2145634
Kavitha, S, Alphonse, PJA & Reddy, YV 2019, ‘An Improved Authentication and Security on Efficient Generalized Group Key Agreement Using Hyper Elliptic Curve Based Public Key Cryptography for IoT Health Care System’, Journal of medical systems, vol. 43, no. 8, p. 260.
Lee, J, Yu, S, Park, K, Park, Y & Park, Y 2019, ‘Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments’, Sensors, vol. 19, no.10, pp. 2358-2362
Mohammed, AJ & Yassin, AA 2019, ‘Efficient and Flexible MultiFactor Authentication Protocol Based on Fuzzy Extractor of Administrator’s Fingerprint and Smart Mobile Device’, Cryptography, vol. 3, no. 3, pp. 24.
Qikun, Z, Yongjiao, L, Yong, G, Chuanyang, Z, Xiangyang, L & Jun, Z 2019, ‘Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication’, IEEE Access, vol. 7, pp. 87085-87096
Yaqoob, I, Hashem, IAT, Ahmed, A, Kazmi, SA & Hong, CS 2019, ‘Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges’, Future Generation Computer Systems, vol. 92, no. 2019, 265-275
Cuka, M, Elmazi, D, Bylykbashi, K, Spaho, E, Ikeda, M & Barolli, L 2019, ‘Implementation and performance evaluation of two fuzzy-based systems for selection of IoT devices in opportunistic networks’, Journal of Ambient Intelligence and Humanized Computing, vol. 10, no. 2, pp. 519-529.
Kavitha, S, Alphonse, PJA & Reddy, YV 2019, ‘An Improved Authentication and Security on Efficient Generalized Group Key Agreement Using Hyper Elliptic Curve Based Public Key Cryptography for IoT Health Care System’, Journal of medical systems, vol. 43, no. 8, p. 260
Ammar, M, Giovanni, R & Bruno, C 2018, ‘Internet of Things: A survey on the security of IoT frameworks’, Journal of Information Security and Applications, vol. 38, no. 2018, pp. 8-27.
Arain, QA, Memon, I, Deng, Memon, MH, Mangi, FA & Zubedi 2018, ‘A Location monitoring approach: multiple mix-zones with location privacy protection based on traffic flow over road networks’, Multimedia Tools and Applications, vol. 77, no. 5, pp. 5563-5607.
Chien, HY 2018, ‘Group-Oriented Range-Bound Key Agreement for Internet of Things Scenarios’, IEEE Internet of Things Journal, vol. 5, no. 3, pp. 1890-1903
Choi, W, Jo, HJ, Woo, S, Chun, JY, Park, J & Lee, DH 2018, ‘Identifying ecus using inimitable characteristics of signals in controller area networks’, IEEE Transactions on Vehicular Technology, vol. 67, no. 6, pp. 4757-4770.
Dhillon, PK & Kalra, S 2018, ‘Multi-factor user authentication scheme for IoT-based healthcare services’, Journal of Reliable Intelligent Environments, vol. 4, no. 3, pp. 141-160
Alaba, FA, Othman, M, Hashem, IAT & Alotaibi, F 2017, ‘Internet of Things security: A survey’, Journal of Network and Computer Applications, vol. 88, no. 2017, pp. 10-28.
Bilal, M & Kang, SG 2017, ‘A secure key agreement protocol for dynamic group’, Cluster Computing, vol. 20, no. 3, pp. 2779-2792
Chen, CH, Lin, MY & Guo, XC 2017, ‘High-level modeling and synthesis of smart sensor networks for Industrial Internet of Things’, Computers & Electrical Engineering, vol. 61, no. 2017, pp. 48-66.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.