A voting-based trustworthy distributed IoT attack detection model

Priya Sharma,Sanjay Kumar Sharma,Diksha Dani
DOI: https://doi.org/10.1007/s00779-024-01836-2
2024-11-17
Personal and Ubiquitous Computing
Abstract:Besides the enhancement of the Internet of Things (IoT) distributed environment, anomalous activities are also escalating rapidly. Therefore, improving the trustworthiness of distributed networks is required for the extensive adoption of IoT infrastructure. Establishing a security mechanism in IoT networks is a challenging task as communication links are lossy and connected devices are resource-dependent. Conventional security techniques such as intrusion detection systems (IDS) are insufficient to shelter the IoT-distributed environment due to less computational capacity, restricted upgraded devices, and mismatched protocols. This paper proposes a novel machine learning-based trustworthy model for IoT attack detection. The proposed system combines the capability of Ada-boost and Gradient-boost to classify anomalous activities with low computational capacity proficiently and within a minimum time frame. Experiments were conducted on Distributed Smart Space Orchestration System (DS2OS) IoT dataset to assess the significance of the novel attack detection model. The demonstration shows that the proposed model obtains 98.28% training accuracy, 98.26% testing accuracy, and 99.25% AUC score. A confusion matrix has also been calculated to check the authenticity of the results—a comparison of the proposed model with individual learners and existing models proves that the proposed model outperformed.
computer science, information systems,telecommunications
What problem does this paper attempt to address?