Visible to the public Detection of Adversary Nodes in Machine-To-Machine Communication Using Machine Learning Based Trust Model

TitleDetection of Adversary Nodes in Machine-To-Machine Communication Using Machine Learning Based Trust Model
Publication TypeConference Paper
Year of Publication2019
AuthorsEziama, Elvin, Ahmed, Saneeha, Ahmed, Sabbir, Awin, Faroq, Tepe, Kemal
Conference Name2019 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)
Date PublishedDec. 2019
PublisherIEEE
ISBN Number978-1-7281-5341-4
KeywordsAdversary Models, advsersary node detection, binary particle swarm optimization, Computational modeling, Entropy, entropy based feature engineering, extreme gradient boosting model, false trust, feature extraction, Human Behavior, Internet of Things (IoTs), Internet of Vehi-cles(IoVs), learning (artificial intelligence), machine learning, Machine Learning Based Trust (MLBT), machine learning based trust evaluation model, machine-to-machine (M2M), machine-to-machine communication, machine-to-machine communications, malicious activity detection, Metrics, MLBT evaluation model, particle swarm optimisation, Peer-to-peer computing, policy-based governance, Policy-Governed Secure Collaboration, pubcrawl, resilience, Resiliency, Scalability, security, security solutions, security threats, Supervisory Control and Data Supervisory Acquisition (SCADA), telecommunication security, Trusted Computing, VBM2M-C network, vehicular ad hoc networks, vehicular based M2M-C network, XGBoost model
Abstract

Security challenges present in Machine-to-Machine Communication (M2M-C) and big data paradigm are fundamentally different from conventional network security challenges. In M2M-C paradigms, "Trust" is a vital constituent of security solutions that address security threats and for such solutions,it is important to quantify and evaluate the amount of trust in the information and its source. In this work, we focus on Machine Learning (ML) Based Trust (MLBT) evaluation model for detecting malicious activities in a vehicular Based M2M-C (VBM2M-C) network. In particular, we present an Entropy Based Feature Engineering (EBFE) coupled Extreme Gradient Boosting (XGBoost) model which is optimized with Binary Particle Swarm optimization technique. Based on three performance metrics, i.e., Accuracy Rate (AR), True Positive Rate (TPR), False Positive Rate (FPR), the effectiveness of the proposed method is evaluated in comparison to the state-of-the-art ensemble models, such as XGBoost and Random Forest. The simulation results demonstrates the superiority of the proposed model with approximately 10% improvement in accuracy, TPR and FPR, with reference to the attacker density of 30% compared with the start-of-the-art algorithms.

URLhttps://ieeexplore.ieee.org/document/9001743
DOI10.1109/ISSPIT47144.2019.9001743
Citation Keyeziama_detection_2019