Fuzzy Intrusion Detection Method and Zero-Knowledge Authentication for Internet of Things Networks

Authors

  • Elangovan Muniyandy, Iratus Glenn A. Cruz, Mansoor Farooq, Yeruva. Jaipalreddy, Rakesh Kumar, Vivek Kumar Pandey

Keywords:

Internet of Things (IoT), Intrusion Detection, fuzzy logic. Networks

Abstract

One of the encouraging trends that has contributed to the exponential rise in human progress over the last decade is the Internet of Things (IoT). Interconnection of physical objects for the purpose of data exchange is the next frontier of the internet, known as the Internet of Things (IoT). Everything from household appliances to cars to buildings to animals is part of the Internet of Things (IoT). The Internet of Things (IoT) has become the de facto standard because to its many useful uses in business, medicine, agriculture, and other fields. The Internet of Things (IoT) integrates wireless, pervasive, and ubiquitous technology to solve problems. Things with sensors implanted in them and linked over the internet make it up. Data is collected and shared by these networked devices. Many applications rely on the monitoring and analysis of data originating from heterogeneous devices. Fuzzy logic is used in this study to create a new, lightweight intrusion detection system (IDS) for Internet of Things (IoT) applications based on the MQTT protocol. Using fuzzy variables, the IDS detects network irregularities.  In conclusion, this study offers a fresh security framework to solve the problems with current algorithms in an Internet of Things setting. This study also provides an application layer security that smart environments may use to avoid DoS attacks

Downloads

Download data is not yet available.

References

Kaushik, A., Al-Raweshidy, H. A novel intrusion detection system for internet of things devices and data. Wireless Netw 30, 285–294 (2024). https://doi.org/10.1007/s11276-023-03435-0

Rui, K., Pan, H. & Shu, S. Secure routing in the Internet of Things (IoT) with intrusion detection capability based on software-defined networking (SDN) and Machine Learning techniques. Sci Rep 13, 18003 (2023). https://doi.org/10.1038/s41598-023-44764-6

Alexey Finogeev, Michael Deev, Danila Parygin & Аnton Finogeev (2022) Intelligent SDN Architecture With Fuzzy Neural Network and Blockchain for Monitoring Critical Events, Applied Artificial Intelligence, 36:1, DOI: 10.1080/08839514.2022.2145634

Kavitha, S, Alphonse, PJA & Reddy, YV 2019, ‘An Improved Authentication and Security on Efficient Generalized Group Key Agreement Using Hyper Elliptic Curve Based Public Key Cryptography for IoT Health Care System’, Journal of medical systems, vol. 43, no. 8, p. 260.

Lee, J, Yu, S, Park, K, Park, Y & Park, Y 2019, ‘Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments’, Sensors, vol. 19, no.10, pp. 2358-2362

Mohammed, AJ & Yassin, AA 2019, ‘Efficient and Flexible MultiFactor Authentication Protocol Based on Fuzzy Extractor of Administrator’s Fingerprint and Smart Mobile Device’, Cryptography, vol. 3, no. 3, pp. 24.

Qikun, Z, Yongjiao, L, Yong, G, Chuanyang, Z, Xiangyang, L & Jun, Z 2019, ‘Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication’, IEEE Access, vol. 7, pp. 87085-87096

Yaqoob, I, Hashem, IAT, Ahmed, A, Kazmi, SA & Hong, CS 2019, ‘Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges’, Future Generation Computer Systems, vol. 92, no. 2019, 265-275

Cuka, M, Elmazi, D, Bylykbashi, K, Spaho, E, Ikeda, M & Barolli, L 2019, ‘Implementation and performance evaluation of two fuzzy-based systems for selection of IoT devices in opportunistic networks’, Journal of Ambient Intelligence and Humanized Computing, vol. 10, no. 2, pp. 519-529.

Kavitha, S, Alphonse, PJA & Reddy, YV 2019, ‘An Improved Authentication and Security on Efficient Generalized Group Key Agreement Using Hyper Elliptic Curve Based Public Key Cryptography for IoT Health Care System’, Journal of medical systems, vol. 43, no. 8, p. 260

Ammar, M, Giovanni, R & Bruno, C 2018, ‘Internet of Things: A survey on the security of IoT frameworks’, Journal of Information Security and Applications, vol. 38, no. 2018, pp. 8-27.

Arain, QA, Memon, I, Deng, Memon, MH, Mangi, FA & Zubedi 2018, ‘A Location monitoring approach: multiple mix-zones with location privacy protection based on traffic flow over road networks’, Multimedia Tools and Applications, vol. 77, no. 5, pp. 5563-5607.

Chien, HY 2018, ‘Group-Oriented Range-Bound Key Agreement for Internet of Things Scenarios’, IEEE Internet of Things Journal, vol. 5, no. 3, pp. 1890-1903

Choi, W, Jo, HJ, Woo, S, Chun, JY, Park, J & Lee, DH 2018, ‘Identifying ecus using inimitable characteristics of signals in controller area networks’, IEEE Transactions on Vehicular Technology, vol. 67, no. 6, pp. 4757-4770.

Dhillon, PK & Kalra, S 2018, ‘Multi-factor user authentication scheme for IoT-based healthcare services’, Journal of Reliable Intelligent Environments, vol. 4, no. 3, pp. 141-160

Alaba, FA, Othman, M, Hashem, IAT & Alotaibi, F 2017, ‘Internet of Things security: A survey’, Journal of Network and Computer Applications, vol. 88, no. 2017, pp. 10-28.

Bilal, M & Kang, SG 2017, ‘A secure key agreement protocol for dynamic group’, Cluster Computing, vol. 20, no. 3, pp. 2779-2792

Chen, CH, Lin, MY & Guo, XC 2017, ‘High-level modeling and synthesis of smart sensor networks for Industrial Internet of Things’, Computers & Electrical Engineering, vol. 61, no. 2017, pp. 48-66.

Downloads

Published

26.03.2024

How to Cite

Elangovan Muniyandy, Iratus Glenn A. Cruz, Mansoor Farooq, Yeruva. Jaipalreddy, Rakesh Kumar, Vivek Kumar Pandey. (2024). Fuzzy Intrusion Detection Method and Zero-Knowledge Authentication for Internet of Things Networks. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 584–591. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5454

Issue

Section

Research Article