Log in

IoT authentication model with optimized deep Q network for attack detection and mitigation

  • Regular Paper
  • Published:
International Journal of Intelligent Robotics and Applications Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) is a promising area in day-to-day lives, like homes, health, military, and agriculture. The expansion of IoT technology has gained the attention of hackers to acquire the benefits of their communication abilities for performing various kinds of attacks. The main issue is devices of IoT pose various susceptibilities which simply exploit the IoT botnets. This paper devises an optimization-aware deep model for detecting and mitigating attacks in IoT. Here, the first step is a simulation of IoT nodes. In addition, the authentication with privacy preserved data encryption is performed with autoregressive poor and rich optimization (APRO) algorithm. Thereafter, the feature selection is performed with Jaro–Winkler distance for obtaining imperative features. After determining the optimum features, the attack detection is performed with autoregressive poor and rich spider monkey optimization-based deep Q network (APRSMO-based deep Q network). Here, the deep Q network training is done with developed APRSMO, which is devised by combining conditional autoregressive value at risk by regression quantiles (CAViaR), and poor and rich optimization (PRO) algorithm, and spider monkey optimization (SMO). The mitigation of attack is performed using data rates if the output generated by the proposed APRSMO-based deep Q network is an intruder. The proposed APRSMO-based deep Q network provided enhanced efficiency with elevated precision of 90.1%, recall of 89.1%, and F1-score of 89.6%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  • Al-Duwairi, B., Al-Kahla, W., AlRefai, M.A., Abdelqader, Y., Rawash, A., Fahmawi, R.: SIEM-based detection and mitigation of IoT-botnet DDoS attacks. Int. J. Electr. Comput. Eng. 10(2), 2088–8708 (2020)

    Google Scholar 

  • Aman, M.N., Basheer, M.H., Sikdar, B.: Data provenance for IoT with light weight authentication and privacy preservation. IEEE Internet Things J. 6(6), 10441–10457 (2019)

    Article  Google Scholar 

  • Bansa, J.C., Sharma, H., Jadon, S.S., Clerc, M.: Spider Monkey Optimization algorithm for numerical optimization. Memet. Comput. 6(1), 31–47 (2014)

    Article  Google Scholar 

  • Bawany, N.Z., Shamsi, J.A., Salah, K.: DDoS attack detection and mitigation using SDN: methods, practices, and solutions. Arab. J. Sci. Eng. 42(2), 425–441 (2017)

    Article  Google Scholar 

  • Bharot, N., Verma, P., Sharma, S., Suraparaju, V.: Distributed denial-of-service attack detection and mitigation using feature selection and intensive care request processing unit. Arab. J. Sci. Eng. 43(2), 959–967 (2018)

    Article  Google Scholar 

  • Choi, I.S., Hong, J., Kim, T.W.: Multi-agent based cyber attack detection and mitigation for distribution automation system. IEEE Access 8, 183495–183504 (2020)

    Article  Google Scholar 

  • Cristin, R., Cyril Raj, V., Marimuthu, R.: Face image forgery detection by weight optimized neural network model. Multimed. Res. 2(2), 19–27 (2019)

    Google Scholar 

  • Da Silva Cardoso, A.M., Lopes, R.F., Teles, A.S., Magalhaes Fernando, B.V.: Real-time DDoS detection based on complex event processing for IoT. In: Proceedings—ACM/IEEE International Conference on Internet of Things Design and Implementation, IoTDI, pp. 273–274 (2018)

  • Duraisami, A., Subramaniam, M., Rene Robin, C.R.: An optimized deep learning based security enhancement and attack detection on IoT using IDS and KH-AES for smart cities. Stud. Inform. Control 30(2), 121–131 (2021)

    Article  Google Scholar 

  • Engle, R.F., Manganelli, S.: CAViaR: conditional autoregressive value at risk by regression quantiles. J. Bus. Econ. Stat. 22(4), 367–381 (2004)

    Article  MathSciNet  Google Scholar 

  • Fung, C.J., McCormick, B.: VGuard: a distributed denial of service attack mitigation method using network function virtualization. In: 11th International Conference on Network and Service Management (CNSM), pp. 64–70 (2015)

  • Gelenbe, E., Fröhlich, P., Nowak, M., Papadopoulos, S., Protogerou, A., Drosou, A., Tzovaras, D.: IoT network attack detection and mitigation. In: 9th Mediterranean Conference on Embedded Computing (MECO), pp. 1–6 (2020).

  • Jararweh, Y., Al-Ayyoub, M., Benkhelifa, E., Vouk, M., Rindos, A.: SDIoT: a software defined based Internet of Things framework. J. Ambient Intell. Humaniz. Comput. 6(4), 453–461 (2015)

    Article  Google Scholar 

  • Kan, X., Fan, Y., Fang, Z., Cao, L., **ong, N.N., Yang, D., Li, X.: A novel IoT network intrusion detection approach based on Adaptive Particle Swarm Optimization Convolutional Neural Network. Inf. Sci. 568, 147–162 (2021)

    Article  MathSciNet  Google Scholar 

  • Kasinathan, P., Pastrone, C., Spirito, M.A., Vinkovits, M.: Denial-of-service detection in 6LoWPAN based Internet of Things. In: Proceedings of International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 600–607 (2013).

  • Lawal, M.A., Shaikh, R.A., Hassan, S.R.: A DDoS attack mitigation framework for IoT networks using fog computing. Procedia Comput. Sci. 182, 13–20 (2021)

    Article  Google Scholar 

  • Lee, T.-H., Wen, C.-H., Chang, L.-H., Chiang, H.S., Ming, C.H.: A lightweight intrusion detection scheme based on energy consumption analysis in 6LoWPAN. In: Advanced Technologies, Embedded and Multimedia for Human-Centric Computing, pp. 1257–1268 (2014)

  • Lee, Y., Yoon, J., Choi, J., Hwang, E.: A novel cross-layer authentication protocol for the Internet of Things. IEEE Access 8, 196135–196150 (2020)

    Article  Google Scholar 

  • Moosavi, S.H., Bardsiri, V.K.: Poor and rich optimization algorithm: a new human-based and multi populations algorithm. Eng. Appl. Artif. Intell. 86, 165–181 (2019)

    Article  Google Scholar 

  • Ojajuni, O.P., Ismail, Y., Lawson, A.: Distributed denial-of-service attack detection and mitigation for the Internet of Things. Int. J. Technol. Diffus. 11(2), 18–32 (2020)

    Article  Google Scholar 

  • Sadhukhan, D., Ray, S., Biswas, G.P., Khan, M.K., Dasgupta, M.: A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography. J. Supercomput. 77(2), 1114–1151 (2021)

    Article  Google Scholar 

  • Sasaki, H., Horiuchi, T., Kato, S.: A study on vision-based mobile robot learning by deep Q-network. In: Proceedings of 56th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE), pp. 799–804 (2017)

  • Sedjelmaci, H., Senouci, S.M., Al-Bahri, M.: A lightweight anomaly detection technique for low resource IoT devices: a game-theoretic methodology. In: IEEE International Conference on Communications, pp. 1–6. IEEE (2016)

  • Sonar, K., Upadhyay, H.: An approach to secure Internet of Things against DDoS. In: International Conference on ICT for Sustainable Development. Springer (2016)

  • Steinberger, J., Sperotto, A., Baier, H., Pras, A.: Collaborative attack mitigation and response: a survey. In: IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 910–913 (2015)

  • Thakur, N.: Increased soil–microbial–eco-physiological interactions and microbial food safety in tomato under organic strategies. In: Probiotics and Plant Health, pp. 215–232. Springer, Singapore (2017)

  • Thakur, N.: In silico modulation techniques for upgrading sustainability and competitiveness in agri-food sector. In: In Silico Approach for Sustainable Agriculture, pp. 161–167. Springer, Singapore (2018).

  • The BoT–IoT Dataset. https://ieee-dataport.org/documents/bot-iot-dataset. Accessed June 2021

  • Valdovinos, I.A., Pérez-Díaz, J.A., Choo, K.-K.R., Botero, J.F.: Emerging DDoS attack detection and mitigation strategies in software-defined networks: taxonomy, challenges and future directions. J. Netw. Comput. Appl. 187, 103093 (2021)

    Article  Google Scholar 

  • Vasudevan, V.A., Gupta, B.B.: A DDoS attack mitigation framework for Internet of Things. In: International Conference on Communication and Signal Processing, pp. 2036–2041 (2017)

  • Wang, Y., Liu, H., Zheng, W., **a, Y., Li, Y., Chen, P., Guo, K., **e, H.: Multi-objective workflow scheduling with deep-Q-network-based multi-agent reinforcement learning. IEEE Access 7, 39974–39982 (2019)

    Article  Google Scholar 

  • Yamin, M., Alsaawy, Y., Alkhodre, B.A., Sen, A., Ahmed, A.: An innovative method for preserving privacy in Internet of Things. Sensors 19(15), 3355 (2019)

    Article  Google Scholar 

  • Yin, D., Zhang, L., Yang, K.: A DDoS attack detection and mitigation with software-defined Internet of Things framework. IEEE Access 6, 24694–24705 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Supriya Palekar.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Palekar, S., Radhika, Y. IoT authentication model with optimized deep Q network for attack detection and mitigation. Int J Intell Robot Appl 6, 350–364 (2022). https://doi.org/10.1007/s41315-022-00227-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41315-022-00227-1

Keywords

Navigation