Skip to main content
Log in

Detection and prevention of DDoS attacks on edge computing of IoT devices through reinforcement learning

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

A Correction to this article was published on 28 December 2023

This article has been updated

Abstract

The limited resource and computation capacity of an IoT device always being a target vector for intruders to use to steal sensitive data from the device. Computational problems were later solved by the engineers by introducing an edge server near the IoT device network boundary. But still, it is not secure from the hands of intruders. IoT device vulnerabilities still can allow the Edge server to give the control of the device to the intruders. Hence both the Edge server and the connected IoT device may fall under the control of an intruder. Many security algorithms have been proposed after visualizing these security gaps, but none of them still promises full security to the IoT devices. In this paper, we will show how a very efficient machine learning method which is known as reinforcement learning can provide a better security solution on IoT Edge Computing, which is the most proficient and cost-efficient. We proposed the novel reinforcement learning approach which we termed as “Message Driven based Reinforcement Learning security of IoT-Edge computing (MD-RL)” and used the NS-2.35 simulator to experimentally validate this approach. In our experimental setup, we created a simulated wireless sensor network where different types of virtual nodes are set up. We intended to create the nodes which include the IoT node (s), where fewer and limited resources are assigned, whereas the node which is assigned with rich resources capabilities is taken as an Edge node. Various types of malware attacks malfunction the IoT network. But out of those Distributed Denial-of-Service (DDoS) attacks is found steadily increasing in the last few years and increased by almost one-third each year. Hence, we again simulated DDoS attacks over an IoT Edge computing network and generated a real-time-based scenario of data communication between an IoT device and the linked Edge server to validate and compare our proposed security solution for such a victim IoT network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Change history

References

  1. Lin F, Zhou Y, An X, You I, Choo KKR (2018) Fair resource allocation in an intrusion-detection system for edge computing: ensuring the security of internet of things devices. IEEE Consum Electron Mag 7(6):45–50. https://doi.org/10.1109/MCE.2018.2851723

    Article  Google Scholar 

  2. Hsu R, Lee J, Quek TQS, Chen J (2018) Reconfigurable security: edge-computing-based framework for IoT. IEEE Netw 32(5):92–99. Third IEEE international conference on fog and mobile edge computing (FMEC 2018) at Spain, September/October 2018. https://doi.org/10.1109/MNET.2018.1700284

  3. Aggarwal C, Srivastava K (2016) Securing IOT devices using SDN and edge computing. In: 2016 2nd international conference on next generation computing technologies (NGCT), 2016, pp 877–882. https://doi.org/10.1109/NGCT.2016.7877534

  4. Almajali S, Salameh HB, Ayyash M, Elgala H (2018) a framework for efficient and secured mobility of IoT devices in mobile edge computing. In: Third IEEE international conference on fog and mobile edge computing (FMEC 2018) at Spain. https://doi.org/10.1109/FMEC.2018.8364045.

  5. Xiao Y, Jia Y, Liu C, Cheng X, Yu J, Lv W (2019) Edge computing security: state of the art and challenges. Proc IEEE 107(8):1608–1631. https://doi.org/10.1109/JPROC.2019.2918437

    Article  Google Scholar 

  6. Achar S (2022) Science gateways: accelerating research for cloud infrastructure. Int J Inf Technol (IJIT) 3(1):1–8

  7. Arfaoui A, Kribeche A, Senouci S-M (2019) Context-aware anonymous authentication protocols in the internet of things dedicated to e-health applications. Comput Netw 159:23–36. https://doi.org/10.1016/j.comnet.2019.04.031

    Article  Google Scholar 

  8. Mohamed Shakeel P, Baskar S, Sarma Dhulipala VR, Mishra S, Jaber M (2018) Maintaining security and privacy in health care system using learning based deep-Q-networks. J Med Syst. https://doi.org/10.1007/s10916-018-1045-z

    Article  PubMed  Google Scholar 

  9. Sun Z, Liu Y, Tao L (2018) Attack localization task allocation in wireless sensor networks based on multi-objective binary particle swarm optimization. J Netw Comput Appl. https://doi.org/10.1016/j.jnca.2018.03.023

    Article  Google Scholar 

  10. Singh S, Saini HS (2021) Learning-based security technique for selective forwarding attack in clustered WSN. Wireless Pers Commun 118:789–814. https://doi.org/10.1007/s11277-020-08044-0

    Article  Google Scholar 

  11. Gbadouissa JEZ, Ari AAA, Titouna C, Gueroui AM, Thiare O (2020) HGC: HyperGraph based clustering scheme for power aware wireless sensor networks. Future Gener Comput Syst 105:175–183. https://doi.org/10.1016/j.future.2019.11.043

    Article  Google Scholar 

  12. Narayanan K, Santhana R, Julie G, Robinson H, Shanmuganthan V (2021) Machine learning based detection and a novel EC-BRTT algorithm based prevention of DoS attacks in wireless sensor networks. Wirel Pers Commun. https://doi.org/10.1007/s11277-021-08277-7

    Article  Google Scholar 

  13. Li X, Ibrahim MH, Kumari S et al (2018) Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors. Telecommun Syst 67:323–348. https://doi.org/10.1007/s11235-017-0340-1

    Article  Google Scholar 

  14. Rawat R (2023) Logical concept mapping and social media analytics relating to cyber criminal activities for ontology creation. Int J Inf Technol 15:893–903. https://doi.org/10.1007/s41870-022-00934-9

    Article  Google Scholar 

  15. Sun Z, Wei M, Zhang Z, Qu G (2019) Secure routing protocol based on multi-objective ant-colony-optimization for wireless sensor networks. Appl Soft Comput 77:366–375. https://doi.org/10.1016/j.asoc.2019.01.034

    Article  Google Scholar 

  16. Singh R, Singh J, Singh R (2016) Attacks in wireless sensor networks: a survey. Int J Comput Sci Mob Comput 5(5):10–16

    Google Scholar 

  17. Saleem S, Ullah S, Kwak KS (2011) A study of IEEE 802154 security framework for wireless body area networks. Sensors (Basel, Switzerland) 11(2):1383–1395. https://doi.org/10.3390/s110201383Schwartz

    Article  ADS  PubMed  Google Scholar 

  18. Watkins CJ, Dayan P (1992) Q-learning. Mach Learn 8(3–4):279–292

    Article  Google Scholar 

  19. Cynthia J, Parveen Sultana H, Saroja MN, Senthil J (2019) Security protocols for IoT. Springer, Cham. https://doi.org/10.1007/978-3-030-01566-4_1

    Book  Google Scholar 

  20. Hussain F, Abbas SG, Husnain M, Fayyaz UU, Shahzad F, Shah GA (2020) IoT DoS and DDoS attack detection using ResNet. In: 2020 IEEE 23rd international multitopic conference (INMIC), pp 1–6, https://doi.org/10.1109/INMIC50486.2020.9318216

  21. Bhattacharyya S (2016) Research on edge computing: a detailed study. Int J Inf Technol (IJIT) 2(6):9–12

  22. Xiao L, Li Y, Han G, Liu G, Zhuang W (2016) PHY-layer spoofing detection with reinforcement learning in wireless networks. IEEE Trans Veh Technol 65(12):10037–10047

    Article  Google Scholar 

  23. Wong YK (2021) Understanding the features of machine learning for internet of things (IOT). Int J Inf Technol (IJIT) 7(5):6–10

  24. Que X, Y Sun, J Taraba, M Chang (2022) A data-driven machine learning system to make predictions of the cryptocurrency popularity and trend. Int J Inf Technol (IJIT) 1(7):1–9

  25. Wasid A, Sobirin R, Azis AL (2022) Design and development of RFID security system and automatication of flash lights in car using microcontroller ATMega8535. ADRI Int J Inf Technol 6(1):1–10

    Google Scholar 

  26. https://www.comparitech.com/blog/information-security/ddos-statistics-facts/. Accessed 16 Aug 2023

  27. Chaudhary P, Gupta BB (2019) DDoS detection framework in resource constrained internet of things domain. In: 2019 IEEE 8th global conference on consumer electronics (GCCE). IEEE

  28. Li B, Chen T, Giannakis GB (2019) Secure mobile edge computing in IoT via collaborative online learning. IEEE Trans Signal Process 67(23):5922–5935. https://doi.org/10.1109/TSP.2019.2949504

    Article  ADS  MathSciNet  Google Scholar 

  29. Zhang P, Wang Y, Kumar N, Jiang C, Shi G (2022) A security- and privacy-preserving approach based on data disturbance for collaborative edge computing in social IoT systems. IEEE Trans Comput Soc Syst 9(1):97–108. https://doi.org/10.1109/TCSS.2021.3092746

    Article  Google Scholar 

  30. Xue Z, Zhou P, Xu Z, Wang X, Xie Y, Ding X, Wen S (2021) A resource-constrained and privacy-preserving edge-computing-enabled clinical decision system: a federated reinforcement learning approach. IEEE Internet of Things J 8(11):9122–9138. https://doi.org/10.1109/JIOT.2021.3057653

    Article  Google Scholar 

  31. Elgendy IA, Zhang WZ, Zeng Y, He H, Tian YC, Yang Y (2020) Efficient and secure multi-user multi-task computation offloading for mobile-edge computing in mobile IoT networks. IEEE Trans Netw Serv Manag 17(4):2410–2422. https://doi.org/10.1109/TNSM.2020.3020249

    Article  Google Scholar 

  32. Verma VK, Singh S, Pathak NP (2014) Analysis of scalability for AODV routing protocol in wireless sensor networks. Optik 125(2):748–750

    Article  ADS  Google Scholar 

  33. Zhang P, Jiang C, Pang X, Qian Y (2020) STEC-IoT: a security tactic by virtualizing edge computing on IoT. IEEE Internet Things J 8(4):2459–2467

    Article  Google Scholar 

  34. Shafi S, Mounika S, Velliangiri S (2023) Machine learning and trust based AODV routing protocol to mitigate flooding and blackhole attacks in MANET. Procedia Comput Sci 218:2309–2318

    Article  Google Scholar 

  35. Singh SK, Shukla SK, Pandey S (2021) Performance evaluation of AODV and DSR routing protocols in mobile ad hoc networks. In: 2021 International conference on advanced computing and communication systems (ICACCS), pp 1–5

  36. Gopi AP, Jyothi RNS, Narayana VL et al (2023) Classification of tweets data based on polarity using improved RBF kernel of SVM. int J Inf Technol 15:965–980. https://doi.org/10.1007/s41870-019-00409-4

    Article  Google Scholar 

  37. Ayoub NS, Alqahtani MS (2020) AODV routing protocol optimization using artificial bee colony algorithm in mobile ad hoc networks. In: 2020 10th International conference on computer science and information technology (ICCSIT), pp 165–168

  38. Ioannou C, Vassiliou V (2019) Classifying security attacks in IoT networks using supervised learning. In: 2019 15th International conference on distributed computing in sensor systems (DCOSS). IEEE

  39. Khatun MA, Chowdhury N, Uddin MN (2019) Malicious nodes detection based on artificial neural network in IoT environments. In: 2019 22nd International conference on computer and information technology (ICCIT). IEEE

  40. Vazeer SM, Deekshitulu BL, Murthy KVR (2021) Enhancing AODV routing protocol using ant colony optimization for mobile ad-hoc networks. In: 2021 International conference on advances in computing, communications and informatics (ICACCI), pp 2569–2575

  41. https://www.postnetwork.co/install-and-run-ns-2-35-on-ubuntu-16-04/. Accessed 28 May 2022

  42. https://medium.com/nerd-for-tech/aodv-routing-protocol-network-simulation-53f3a23918aa. Accessed 28 May 2022

  43. https://mcfp.felk.cvut.cz/publicDatasets/IoT-23-Dataset/IndividualScenarios/CTU-IoT-Malware-Capture-34-1/. Accessed 23 Oct 2022

  44. Wireshark tool—https://www.wireshark.org/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anit Kumar.

Ethics declarations

Conflict of interest

The author has no conflicts of interest to disclose.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, A., Singh, D. Detection and prevention of DDoS attacks on edge computing of IoT devices through reinforcement learning. Int. j. inf. tecnol. 16, 1365–1376 (2024). https://doi.org/10.1007/s41870-023-01508-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-023-01508-z

Keywords

Navigation