Revolutionising IoT Network Security By Assessing ML Localisation Techniques Against Jamming Attacks

Ioannou, Iacovos, Savva, Michael, Raspopoulos, Marios orcid iconORCID: 0000-0003-1513-6018, Christophorou, Christophoros and Vassiliou, Vasos (2024) Revolutionising IoT Network Security By Assessing ML Localisation Techniques Against Jamming Attacks. In: 2024 22nd Mediterranean Communication and Computer Networking Conference (MedComNet). Mediterranean Communication and Computer Networking Conference . Institute of Electrical and Electronics Engineers (IEEE), pp. 1-10. ISBN 979-8-3503-9047-6

[thumbnail of AAM] PDF (AAM) - Accepted Version
Restricted to Repository staff only

6MB

Official URL: https://doi.org/10.1109/MedComNet62012.2024.105782...

Abstract

The Internet of Things (IoT) revolutionises data flow management by interconnecting various devices, from sim-ple sensors to complex systems, for varied applications, including smart homes and industrial automation. However, this extensive integration also renders IoT networks vulnerable to cyber threats, mainly jamming attacks, which can disrupt wireless communications and risk total network failure, significantly impacting critical sectors such as healthcare and industrial au-tomation. This research introduces a novel approach to IoT network security, transitioning from conventional detection meth-ods to a refined strategy emphasising the accurate localisation of jamming sources. Integrating machine learning with network security to counter jamming attacks establishes a foundation for future exploration. It effectively utilises Fuzzy Logic-based Intrusion Detection Systems (FLIDS) for the initial detection of jamming threats, addressing a vital need for heightened security in IoT networks. Central to our research is adopting advanced machine learning models, including Recurrent Neural Network - Bidirectional Long Short-Term Memory (RNN-B-LSTM), Temporal Convolutional Network (TCN), Recurrent Neural Network (RNN) and Convolutional Neural Network (CNN). These models are carefully selected for their capacity to process complex data patterns and suitability for real-time IoT environments. We conduct a thorough evaluation of these models using various metrics. Consequently, the RNN-B-LSTM model, in particular, demonstrates exceptional accuracy in jammer localisation.


Repository Staff Only: item control page