Abstract
The Internet of Things (IoT) is a promising area in day-to-day lives, like homes, health, military, and agriculture. The expansion of IoT technology has gained the attention of hackers to acquire the benefits of their communication abilities for performing various kinds of attacks. The main issue is devices of IoT pose various susceptibilities which simply exploit the IoT botnets. This paper devises an optimization-aware deep model for detecting and mitigating attacks in IoT. Here, the first step is a simulation of IoT nodes. In addition, the authentication with privacy preserved data encryption is performed with autoregressive poor and rich optimization (APRO) algorithm. Thereafter, the feature selection is performed with Jaro–Winkler distance for obtaining imperative features. After determining the optimum features, the attack detection is performed with autoregressive poor and rich spider monkey optimization-based deep Q network (APRSMO-based deep Q network). Here, the deep Q network training is done with developed APRSMO, which is devised by combining conditional autoregressive value at risk by regression quantiles (CAViaR), and poor and rich optimization (PRO) algorithm, and spider monkey optimization (SMO). The mitigation of attack is performed using data rates if the output generated by the proposed APRSMO-based deep Q network is an intruder. The proposed APRSMO-based deep Q network provided enhanced efficiency with elevated precision of 90.1%, recall of 89.1%, and F1-score of 89.6%.
Similar content being viewed by others
References
Al-Duwairi, B., Al-Kahla, W., AlRefai, M.A., Abdelqader, Y., Rawash, A., Fahmawi, R.: SIEM-based detection and mitigation of IoT-botnet DDoS attacks. Int. J. Electr. Comput. Eng. 10(2), 2088–8708 (2020)
Aman, M.N., Basheer, M.H., Sikdar, B.: Data provenance for IoT with light weight authentication and privacy preservation. IEEE Internet Things J. 6(6), 10441–10457 (2019)
Bansa, J.C., Sharma, H., Jadon, S.S., Clerc, M.: Spider Monkey Optimization algorithm for numerical optimization. Memet. Comput. 6(1), 31–47 (2014)
Bawany, N.Z., Shamsi, J.A., Salah, K.: DDoS attack detection and mitigation using SDN: methods, practices, and solutions. Arab. J. Sci. Eng. 42(2), 425–441 (2017)
Bharot, N., Verma, P., Sharma, S., Suraparaju, V.: Distributed denial-of-service attack detection and mitigation using feature selection and intensive care request processing unit. Arab. J. Sci. Eng. 43(2), 959–967 (2018)
Choi, I.S., Hong, J., Kim, T.W.: Multi-agent based cyber attack detection and mitigation for distribution automation system. IEEE Access 8, 183495–183504 (2020)
Cristin, R., Cyril Raj, V., Marimuthu, R.: Face image forgery detection by weight optimized neural network model. Multimed. Res. 2(2), 19–27 (2019)
Da Silva Cardoso, A.M., Lopes, R.F., Teles, A.S., Magalhaes Fernando, B.V.: Real-time DDoS detection based on complex event processing for IoT. In: Proceedings—ACM/IEEE International Conference on Internet of Things Design and Implementation, IoTDI, pp. 273–274 (2018)
Duraisami, A., Subramaniam, M., Rene Robin, C.R.: An optimized deep learning based security enhancement and attack detection on IoT using IDS and KH-AES for smart cities. Stud. Inform. Control 30(2), 121–131 (2021)
Engle, R.F., Manganelli, S.: CAViaR: conditional autoregressive value at risk by regression quantiles. J. Bus. Econ. Stat. 22(4), 367–381 (2004)
Fung, C.J., McCormick, B.: VGuard: a distributed denial of service attack mitigation method using network function virtualization. In: 11th International Conference on Network and Service Management (CNSM), pp. 64–70 (2015)
Gelenbe, E., Fröhlich, P., Nowak, M., Papadopoulos, S., Protogerou, A., Drosou, A., Tzovaras, D.: IoT network attack detection and mitigation. In: 9th Mediterranean Conference on Embedded Computing (MECO), pp. 1–6 (2020).
Jararweh, Y., Al-Ayyoub, M., Benkhelifa, E., Vouk, M., Rindos, A.: SDIoT: a software defined based Internet of Things framework. J. Ambient Intell. Humaniz. Comput. 6(4), 453–461 (2015)
Kan, X., Fan, Y., Fang, Z., Cao, L., **ong, N.N., Yang, D., Li, X.: A novel IoT network intrusion detection approach based on Adaptive Particle Swarm Optimization Convolutional Neural Network. Inf. Sci. 568, 147–162 (2021)
Kasinathan, P., Pastrone, C., Spirito, M.A., Vinkovits, M.: Denial-of-service detection in 6LoWPAN based Internet of Things. In: Proceedings of International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 600–607 (2013).
Lawal, M.A., Shaikh, R.A., Hassan, S.R.: A DDoS attack mitigation framework for IoT networks using fog computing. Procedia Comput. Sci. 182, 13–20 (2021)
Lee, T.-H., Wen, C.-H., Chang, L.-H., Chiang, H.S., Ming, C.H.: A lightweight intrusion detection scheme based on energy consumption analysis in 6LoWPAN. In: Advanced Technologies, Embedded and Multimedia for Human-Centric Computing, pp. 1257–1268 (2014)
Lee, Y., Yoon, J., Choi, J., Hwang, E.: A novel cross-layer authentication protocol for the Internet of Things. IEEE Access 8, 196135–196150 (2020)
Moosavi, S.H., Bardsiri, V.K.: Poor and rich optimization algorithm: a new human-based and multi populations algorithm. Eng. Appl. Artif. Intell. 86, 165–181 (2019)
Ojajuni, O.P., Ismail, Y., Lawson, A.: Distributed denial-of-service attack detection and mitigation for the Internet of Things. Int. J. Technol. Diffus. 11(2), 18–32 (2020)
Sadhukhan, D., Ray, S., Biswas, G.P., Khan, M.K., Dasgupta, M.: A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography. J. Supercomput. 77(2), 1114–1151 (2021)
Sasaki, H., Horiuchi, T., Kato, S.: A study on vision-based mobile robot learning by deep Q-network. In: Proceedings of 56th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE), pp. 799–804 (2017)
Sedjelmaci, H., Senouci, S.M., Al-Bahri, M.: A lightweight anomaly detection technique for low resource IoT devices: a game-theoretic methodology. In: IEEE International Conference on Communications, pp. 1–6. IEEE (2016)
Sonar, K., Upadhyay, H.: An approach to secure Internet of Things against DDoS. In: International Conference on ICT for Sustainable Development. Springer (2016)
Steinberger, J., Sperotto, A., Baier, H., Pras, A.: Collaborative attack mitigation and response: a survey. In: IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 910–913 (2015)
Thakur, N.: Increased soil–microbial–eco-physiological interactions and microbial food safety in tomato under organic strategies. In: Probiotics and Plant Health, pp. 215–232. Springer, Singapore (2017)
Thakur, N.: In silico modulation techniques for upgrading sustainability and competitiveness in agri-food sector. In: In Silico Approach for Sustainable Agriculture, pp. 161–167. Springer, Singapore (2018).
The BoT–IoT Dataset. https://ieee-dataport.org/documents/bot-iot-dataset. Accessed June 2021
Valdovinos, I.A., Pérez-Díaz, J.A., Choo, K.-K.R., Botero, J.F.: Emerging DDoS attack detection and mitigation strategies in software-defined networks: taxonomy, challenges and future directions. J. Netw. Comput. Appl. 187, 103093 (2021)
Vasudevan, V.A., Gupta, B.B.: A DDoS attack mitigation framework for Internet of Things. In: International Conference on Communication and Signal Processing, pp. 2036–2041 (2017)
Wang, Y., Liu, H., Zheng, W., **a, Y., Li, Y., Chen, P., Guo, K., **e, H.: Multi-objective workflow scheduling with deep-Q-network-based multi-agent reinforcement learning. IEEE Access 7, 39974–39982 (2019)
Yamin, M., Alsaawy, Y., Alkhodre, B.A., Sen, A., Ahmed, A.: An innovative method for preserving privacy in Internet of Things. Sensors 19(15), 3355 (2019)
Yin, D., Zhang, L., Yang, K.: A DDoS attack detection and mitigation with software-defined Internet of Things framework. IEEE Access 6, 24694–24705 (2018)
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Palekar, S., Radhika, Y. IoT authentication model with optimized deep Q network for attack detection and mitigation. Int J Intell Robot Appl 6, 350–364 (2022). https://doi.org/10.1007/s41315-022-00227-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41315-022-00227-1