Abstract
The limited resource and computation capacity of an IoT device always being a target vector for intruders to use to steal sensitive data from the device. Computational problems were later solved by the engineers by introducing an edge server near the IoT device network boundary. But still, it is not secure from the hands of intruders. IoT device vulnerabilities still can allow the Edge server to give the control of the device to the intruders. Hence both the Edge server and the connected IoT device may fall under the control of an intruder. Many security algorithms have been proposed after visualizing these security gaps, but none of them still promises full security to the IoT devices. In this paper, we will show how a very efficient machine learning method which is known as reinforcement learning can provide a better security solution on IoT Edge Computing, which is the most proficient and cost-efficient. We proposed the novel reinforcement learning approach which we termed as “Message Driven based Reinforcement Learning security of IoT-Edge computing (MD-RL)” and used the NS-2.35 simulator to experimentally validate this approach. In our experimental setup, we created a simulated wireless sensor network where different types of virtual nodes are set up. We intended to create the nodes which include the IoT node (s), where fewer and limited resources are assigned, whereas the node which is assigned with rich resources capabilities is taken as an Edge node. Various types of malware attacks malfunction the IoT network. But out of those Distributed Denial-of-Service (DDoS) attacks is found steadily increasing in the last few years and increased by almost one-third each year. Hence, we again simulated DDoS attacks over an IoT Edge computing network and generated a real-time-based scenario of data communication between an IoT device and the linked Edge server to validate and compare our proposed security solution for such a victim IoT network.
Similar content being viewed by others
Change history
28 December 2023
A Correction to this paper has been published: https://doi.org/10.1007/s41870-023-01704-x
References
Lin F, Zhou Y, An X, You I, Choo KKR (2018) Fair resource allocation in an intrusion-detection system for edge computing: ensuring the security of internet of things devices. IEEE Consum Electron Mag 7(6):45–50. https://doi.org/10.1109/MCE.2018.2851723
Hsu R, Lee J, Quek TQS, Chen J (2018) Reconfigurable security: edge-computing-based framework for IoT. IEEE Netw 32(5):92–99. Third IEEE international conference on fog and mobile edge computing (FMEC 2018) at Spain, September/October 2018. https://doi.org/10.1109/MNET.2018.1700284
Aggarwal C, Srivastava K (2016) Securing IOT devices using SDN and edge computing. In: 2016 2nd international conference on next generation computing technologies (NGCT), 2016, pp 877–882. https://doi.org/10.1109/NGCT.2016.7877534
Almajali S, Salameh HB, Ayyash M, Elgala H (2018) a framework for efficient and secured mobility of IoT devices in mobile edge computing. In: Third IEEE international conference on fog and mobile edge computing (FMEC 2018) at Spain. https://doi.org/10.1109/FMEC.2018.8364045.
Xiao Y, Jia Y, Liu C, Cheng X, Yu J, Lv W (2019) Edge computing security: state of the art and challenges. Proc IEEE 107(8):1608–1631. https://doi.org/10.1109/JPROC.2019.2918437
Achar S (2022) Science gateways: accelerating research for cloud infrastructure. Int J Inf Technol (IJIT) 3(1):1–8
Arfaoui A, Kribeche A, Senouci S-M (2019) Context-aware anonymous authentication protocols in the internet of things dedicated to e-health applications. Comput Netw 159:23–36. https://doi.org/10.1016/j.comnet.2019.04.031
Mohamed Shakeel P, Baskar S, Sarma Dhulipala VR, Mishra S, Jaber M (2018) Maintaining security and privacy in health care system using learning based deep-Q-networks. J Med Syst. https://doi.org/10.1007/s10916-018-1045-z
Sun Z, Liu Y, Tao L (2018) Attack localization task allocation in wireless sensor networks based on multi-objective binary particle swarm optimization. J Netw Comput Appl. https://doi.org/10.1016/j.jnca.2018.03.023
Singh S, Saini HS (2021) Learning-based security technique for selective forwarding attack in clustered WSN. Wireless Pers Commun 118:789–814. https://doi.org/10.1007/s11277-020-08044-0
Gbadouissa JEZ, Ari AAA, Titouna C, Gueroui AM, Thiare O (2020) HGC: HyperGraph based clustering scheme for power aware wireless sensor networks. Future Gener Comput Syst 105:175–183. https://doi.org/10.1016/j.future.2019.11.043
Narayanan K, Santhana R, Julie G, Robinson H, Shanmuganthan V (2021) Machine learning based detection and a novel EC-BRTT algorithm based prevention of DoS attacks in wireless sensor networks. Wirel Pers Commun. https://doi.org/10.1007/s11277-021-08277-7
Li X, Ibrahim MH, Kumari S et al (2018) Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors. Telecommun Syst 67:323–348. https://doi.org/10.1007/s11235-017-0340-1
Rawat R (2023) Logical concept mapping and social media analytics relating to cyber criminal activities for ontology creation. Int J Inf Technol 15:893–903. https://doi.org/10.1007/s41870-022-00934-9
Sun Z, Wei M, Zhang Z, Qu G (2019) Secure routing protocol based on multi-objective ant-colony-optimization for wireless sensor networks. Appl Soft Comput 77:366–375. https://doi.org/10.1016/j.asoc.2019.01.034
Singh R, Singh J, Singh R (2016) Attacks in wireless sensor networks: a survey. Int J Comput Sci Mob Comput 5(5):10–16
Saleem S, Ullah S, Kwak KS (2011) A study of IEEE 802154 security framework for wireless body area networks. Sensors (Basel, Switzerland) 11(2):1383–1395. https://doi.org/10.3390/s110201383Schwartz
Watkins CJ, Dayan P (1992) Q-learning. Mach Learn 8(3–4):279–292
Cynthia J, Parveen Sultana H, Saroja MN, Senthil J (2019) Security protocols for IoT. Springer, Cham. https://doi.org/10.1007/978-3-030-01566-4_1
Hussain F, Abbas SG, Husnain M, Fayyaz UU, Shahzad F, Shah GA (2020) IoT DoS and DDoS attack detection using ResNet. In: 2020 IEEE 23rd international multitopic conference (INMIC), pp 1–6, https://doi.org/10.1109/INMIC50486.2020.9318216
Bhattacharyya S (2016) Research on edge computing: a detailed study. Int J Inf Technol (IJIT) 2(6):9–12
Xiao L, Li Y, Han G, Liu G, Zhuang W (2016) PHY-layer spoofing detection with reinforcement learning in wireless networks. IEEE Trans Veh Technol 65(12):10037–10047
Wong YK (2021) Understanding the features of machine learning for internet of things (IOT). Int J Inf Technol (IJIT) 7(5):6–10
Que X, Y Sun, J Taraba, M Chang (2022) A data-driven machine learning system to make predictions of the cryptocurrency popularity and trend. Int J Inf Technol (IJIT) 1(7):1–9
Wasid A, Sobirin R, Azis AL (2022) Design and development of RFID security system and automatication of flash lights in car using microcontroller ATMega8535. ADRI Int J Inf Technol 6(1):1–10
https://www.comparitech.com/blog/information-security/ddos-statistics-facts/. Accessed 16 Aug 2023
Chaudhary P, Gupta BB (2019) DDoS detection framework in resource constrained internet of things domain. In: 2019 IEEE 8th global conference on consumer electronics (GCCE). IEEE
Li B, Chen T, Giannakis GB (2019) Secure mobile edge computing in IoT via collaborative online learning. IEEE Trans Signal Process 67(23):5922–5935. https://doi.org/10.1109/TSP.2019.2949504
Zhang P, Wang Y, Kumar N, Jiang C, Shi G (2022) A security- and privacy-preserving approach based on data disturbance for collaborative edge computing in social IoT systems. IEEE Trans Comput Soc Syst 9(1):97–108. https://doi.org/10.1109/TCSS.2021.3092746
Xue Z, Zhou P, Xu Z, Wang X, Xie Y, Ding X, Wen S (2021) A resource-constrained and privacy-preserving edge-computing-enabled clinical decision system: a federated reinforcement learning approach. IEEE Internet of Things J 8(11):9122–9138. https://doi.org/10.1109/JIOT.2021.3057653
Elgendy IA, Zhang WZ, Zeng Y, He H, Tian YC, Yang Y (2020) Efficient and secure multi-user multi-task computation offloading for mobile-edge computing in mobile IoT networks. IEEE Trans Netw Serv Manag 17(4):2410–2422. https://doi.org/10.1109/TNSM.2020.3020249
Verma VK, Singh S, Pathak NP (2014) Analysis of scalability for AODV routing protocol in wireless sensor networks. Optik 125(2):748–750
Zhang P, Jiang C, Pang X, Qian Y (2020) STEC-IoT: a security tactic by virtualizing edge computing on IoT. IEEE Internet Things J 8(4):2459–2467
Shafi S, Mounika S, Velliangiri S (2023) Machine learning and trust based AODV routing protocol to mitigate flooding and blackhole attacks in MANET. Procedia Comput Sci 218:2309–2318
Singh SK, Shukla SK, Pandey S (2021) Performance evaluation of AODV and DSR routing protocols in mobile ad hoc networks. In: 2021 International conference on advanced computing and communication systems (ICACCS), pp 1–5
Gopi AP, Jyothi RNS, Narayana VL et al (2023) Classification of tweets data based on polarity using improved RBF kernel of SVM. int J Inf Technol 15:965–980. https://doi.org/10.1007/s41870-019-00409-4
Ayoub NS, Alqahtani MS (2020) AODV routing protocol optimization using artificial bee colony algorithm in mobile ad hoc networks. In: 2020 10th International conference on computer science and information technology (ICCSIT), pp 165–168
Ioannou C, Vassiliou V (2019) Classifying security attacks in IoT networks using supervised learning. In: 2019 15th International conference on distributed computing in sensor systems (DCOSS). IEEE
Khatun MA, Chowdhury N, Uddin MN (2019) Malicious nodes detection based on artificial neural network in IoT environments. In: 2019 22nd International conference on computer and information technology (ICCIT). IEEE
Vazeer SM, Deekshitulu BL, Murthy KVR (2021) Enhancing AODV routing protocol using ant colony optimization for mobile ad-hoc networks. In: 2021 International conference on advances in computing, communications and informatics (ICACCI), pp 2569–2575
https://www.postnetwork.co/install-and-run-ns-2-35-on-ubuntu-16-04/. Accessed 28 May 2022
https://medium.com/nerd-for-tech/aodv-routing-protocol-network-simulation-53f3a23918aa. Accessed 28 May 2022
https://mcfp.felk.cvut.cz/publicDatasets/IoT-23-Dataset/IndividualScenarios/CTU-IoT-Malware-Capture-34-1/. Accessed 23 Oct 2022
Wireshark tool—https://www.wireshark.org/
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The author has no conflicts of interest to disclose.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Kumar, A., Singh, D. Detection and prevention of DDoS attacks on edge computing of IoT devices through reinforcement learning. Int. j. inf. tecnol. 16, 1365–1376 (2024). https://doi.org/10.1007/s41870-023-01508-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-023-01508-z