• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种用于检测物联网 RPL 协议上克隆 ID 攻击的密集神经网络方法。

A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT.

机构信息

Instituto Politecnico Nacional, ESIME Culhuacan, Mexico City 04440, Mexico.

Department of Computer Science, University of Warwick, Coventry CV4 7AL, UK.

出版信息

Sensors (Basel). 2021 May 3;21(9):3173. doi: 10.3390/s21093173.

DOI:10.3390/s21093173
PMID:34063577
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8124991/
Abstract

At present, new data sharing technologies, such as those used in the Internet of Things (IoT) paradigm, are being extensively adopted. For this reason, intelligent security controls have become imperative. According to good practices and security information standards, particularly those regarding security in depth, several defensive layers are required to protect information assets. Within the context of IoT cyber-attacks, it is fundamental to continuously adapt new detection mechanisms for growing IoT threats, specifically for those becoming more sophisticated within mesh networks, such as identity theft and cloning. Therefore, current applications, such as Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and Security Information and Event Management Systems (SIEM), are becoming inadequate for accurately handling novel security incidents, due to their signature-based detection procedures using the matching and flagging of anomalous patterns. This project focuses on a seldom-investigated identity attack-the Clone ID attack-directed at the Routing Protocol for Low Power and Lossy Networks (RPL), the underlying technology for most IoT devices. Hence, a robust Artificial Intelligence-based protection framework is proposed, in order to tackle major identity impersonation attacks, which classical applications are prone to misidentifying. On this basis, unsupervised pre-training techniques are employed to select key characteristics from RPL network samples. Then, a Dense Neural Network (DNN) is trained to maximize deep feature engineering, with the aim of improving classification results to protect against malicious counterfeiting attempts.

摘要

目前,新的数据共享技术,如物联网 (IoT) 范例中使用的技术,正在被广泛采用。因此,智能安全控制变得势在必行。根据良好实践和安全信息标准,特别是关于深度安全的标准,需要几个防御层来保护信息资产。在物联网网络攻击的背景下,持续适应新的检测机制来应对不断增长的物联网威胁至关重要,特别是针对那些在网状网络中变得越来越复杂的威胁,如身份盗窃和克隆。因此,由于基于签名的检测程序使用异常模式的匹配和标记,当前的应用程序(如入侵检测系统 (IDS)、入侵防御系统 (IPS) 和安全信息和事件管理系统 (SIEM))已经不足以准确处理新的安全事件。

这个项目专注于一种很少被研究的身份攻击——克隆 ID 攻击,该攻击针对低功耗和有损网络的路由协议 (RPL),这是大多数物联网设备的基础技术。因此,提出了一个强大的基于人工智能的保护框架,以解决经典应用程序容易误识别的主要身份仿冒攻击。在此基础上,使用无监督预训练技术从 RPL 网络样本中选择关键特征。然后,训练一个密集神经网络 (DNN) 以最大限度地进行深度特征工程,旨在提高分类结果,以防范恶意伪造尝试。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2909/8124991/5c60ec1b95fd/sensors-21-03173-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2909/8124991/b5891773df0b/sensors-21-03173-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2909/8124991/a5d14d59c28f/sensors-21-03173-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2909/8124991/6f451dadc1ca/sensors-21-03173-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2909/8124991/8b67c0b2b172/sensors-21-03173-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2909/8124991/f5ddf176403c/sensors-21-03173-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2909/8124991/b7acf6fd972a/sensors-21-03173-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2909/8124991/121268d13815/sensors-21-03173-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2909/8124991/86e483b572b9/sensors-21-03173-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2909/8124991/922a799bb25c/sensors-21-03173-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2909/8124991/e207e8f8de19/sensors-21-03173-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2909/8124991/4e3c7f020325/sensors-21-03173-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2909/8124991/5c60ec1b95fd/sensors-21-03173-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2909/8124991/b5891773df0b/sensors-21-03173-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2909/8124991/a5d14d59c28f/sensors-21-03173-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2909/8124991/6f451dadc1ca/sensors-21-03173-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2909/8124991/8b67c0b2b172/sensors-21-03173-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2909/8124991/f5ddf176403c/sensors-21-03173-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2909/8124991/b7acf6fd972a/sensors-21-03173-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2909/8124991/121268d13815/sensors-21-03173-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2909/8124991/86e483b572b9/sensors-21-03173-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2909/8124991/922a799bb25c/sensors-21-03173-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2909/8124991/e207e8f8de19/sensors-21-03173-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2909/8124991/4e3c7f020325/sensors-21-03173-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2909/8124991/5c60ec1b95fd/sensors-21-03173-g012.jpg

相似文献

1
A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT.一种用于检测物联网 RPL 协议上克隆 ID 攻击的密集神经网络方法。
Sensors (Basel). 2021 May 3;21(9):3173. doi: 10.3390/s21093173.
2
Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID.基于机器学习算法的工业物联网异构网络的定制入侵检测,称为 FTL-CID。
Sensors (Basel). 2022 Dec 28;23(1):321. doi: 10.3390/s23010321.
3
Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things.迈向基于深度学习驱动的物联网入侵检测
Sensors (Basel). 2019 Apr 27;19(9):1977. doi: 10.3390/s19091977.
4
Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning.基于机器学习的物联网 RPL 中等级和虫洞攻击检测模型。
Sensors (Basel). 2022 Sep 7;22(18):6765. doi: 10.3390/s22186765.
5
A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things.一种基于信任的物联网中抵御RPL攻击的安全路由模型
Sensors (Basel). 2022 Sep 17;22(18):7052. doi: 10.3390/s22187052.
6
THC-RPL: A lightweight Trust-enabled routing in RPL-based IoT networks against Sybil attack.THC-RPL:一种基于 RPL 的物联网网络中的轻量级信任启用路由,用于防范 Sybil 攻击。
PLoS One. 2022 Jul 28;17(7):e0271277. doi: 10.1371/journal.pone.0271277. eCollection 2022.
7
Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security.多移动代理信任框架,用于减轻内部攻击并增强 RPL 安全性。
Sensors (Basel). 2022 Jun 16;22(12):4539. doi: 10.3390/s22124539.
8
FL-DSFA: Securing RPL-Based IoT Networks against Selective Forwarding Attacks Using Federated Learning.FL-DSFA:使用联邦学习保护基于RPL的物联网网络免受选择性转发攻击
Sensors (Basel). 2024 Sep 8;24(17):5834. doi: 10.3390/s24175834.
9
Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP.物联网中 RPL 等级和版本号攻击的检测与缓解:SRPL-RP。
Sensors (Basel). 2020 Oct 22;20(21):5997. doi: 10.3390/s20215997.
10
Trust and Mobility-Based Protocol for Secure Routing in Internet of Things.基于信任和移动性的物联网安全路由协议
Sensors (Basel). 2022 Aug 18;22(16):6215. doi: 10.3390/s22166215.

引用本文的文献

1
A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities.工业物联网安全综述:需求、攻击、基于人工智能的解决方案及边缘计算机遇
Sensors (Basel). 2023 Aug 28;23(17):7470. doi: 10.3390/s23177470.
2
A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things.基于机器和深度学习方法的物联网 RPL 基础 6LoWPAN 攻击检测的系统文献综述。
Sensors (Basel). 2022 Apr 29;22(9):3400. doi: 10.3390/s22093400.

本文引用的文献

1
Data-Driven Cervical Cancer Prediction Model with Outlier Detection and Over-Sampling Methods.基于数据驱动的宫颈癌预测模型,包含异常值检测和过采样方法。
Sensors (Basel). 2020 May 15;20(10):2809. doi: 10.3390/s20102809.
2
Self-Supervised Visual Feature Learning With Deep Neural Networks: A Survey.基于深度神经网络的自监督视觉特征学习:综述
IEEE Trans Pattern Anal Mach Intell. 2021 Nov;43(11):4037-4058. doi: 10.1109/TPAMI.2020.2992393. Epub 2021 Oct 1.
3
Routing Protocols for Low Power and Lossy Networks in Internet of Things Applications.
物联网应用中低功耗有损网络的路由协议
Sensors (Basel). 2019 May 9;19(9):2144. doi: 10.3390/s19092144.
4
Social Sentiment Sensor in Twitter for Predicting Cyber-Attacks Using ₁ Regularization.推特中用于使用₁正则化预测网络攻击的社会情感传感器。
Sensors (Basel). 2018 Apr 29;18(5):1380. doi: 10.3390/s18051380.
5
A mixed-scale dense convolutional neural network for image analysis.一种用于图像分析的混合尺度密集卷积神经网络。
Proc Natl Acad Sci U S A. 2018 Jan 9;115(2):254-259. doi: 10.1073/pnas.1715832114. Epub 2017 Dec 26.
6
Simulation of Attacks for Security in Wireless Sensor Network.无线传感器网络安全攻击模拟
Sensors (Basel). 2016 Nov 18;16(11):1932. doi: 10.3390/s16111932.
7
On the complexity of neural network classifiers: a comparison between shallow and deep architectures.神经网络分类器的复杂性研究:浅层结构与深层结构的比较。
IEEE Trans Neural Netw Learn Syst. 2014 Aug;25(8):1553-65. doi: 10.1109/TNNLS.2013.2293637.
8
Design and evaluation of a wireless sensor network based aircraft strength testing system.基于无线传感器网络的飞机强度测试系统的设计与评估。
Sensors (Basel). 2009;9(6):4195-210. doi: 10.3390/s90604195. Epub 2009 Jun 3.