Academia.eduAcademia.edu

IoT edge based framework for sybil and buffer overflow detection

The Internet of Things (IoT) is gradually spreading across the globe, offering a wide variety of opportunities across every part of our lives. Unfortunately, the Internet of Things comes with several information technology flaws and exploits. As the number of security vulnerabilities continues to rise, cybersecurity remains a serious problem for every business in cyberspace. In recent times thousands of zero-day attacks are known to exist. As a result, the addition of new attacks emerges regularly several protocols, mostly from the IoT. There are minor modifications to previously reported cyberattacks. This suggests that even advanced mechanisms like basic machine learning systems have a hard time identifying anomalies. IoT applications pose various threats to businesses, according to security experts. Because of the widespread acceptance of IoT devices, their variety, standardization challenges, and inherent versatility, businesses need an intelligent mechanism capable of the detec...

IoT edge based framework for sybil and buffer over ow detection Utpal Pandey Indian Institute of Information Technology, Lucknow Brijesh Kumar Chaurasia (  [email protected] ) Indian Institute of Information Technology, Lucknow Research Article Keywords: IoT, IoT attacks, Cyber Security, ML, CNN, CRV (Composite Reputation Value) Posted Date: June 2nd, 2022 DOI: https://doi.org/10.21203/rs.3.rs-1693583/v1 License:   This work is licensed under a Creative Commons Attribution 4.0 International License. Read Full License IoT edge based framework for sybil and buffer overflow detection Utpal Pandey1, Brijesh Kumar Chaurasia2 1,2Indian Institute of Information Technology, Lucknow, UP, INDIA [email protected] 1 and [email protected] 2 Corresponding author Orchid ID: 0000-0003-3708-7819 Abstract The Internet of Things (IoT) is gradually spreading across the globe, offering a wide variety of opportunities across every part of our lives. Unfortunately, the Internet of Things comes with several information technology flaws and exploits. As the number of security vulnerabilities continues to rise, cybersecurity remains a serious problem for every business in cyberspace. In recent times thousands of zero-day attacks are known to exist. As a result, the addition of new attacks emerges regularly several protocols, mostly from the IoT. There are minor modifications to previously reported cyberattacks. This suggests that even advanced mechanisms like basic machine learning systems have a hard time identifying anomalies. IoT applications pose various threats to businesses, according to security experts. Because of the widespread acceptance of IoT devices, their variety, standardization challenges, and inherent versatility, businesses need an intelligent mechanism capable of the detecting unauthorized IoT devices automatically and connected to their networks. In this study, a machine learning approach is used to identify unauthorized IoT devices by detection of sybil and buffer overflow attack among IoT devices infrastructure. The CNN technique focuses on detecting the attack or activity of any malicious node, as well as attempting to resolve the problem. In this research, CNN, a deep learning technique, was applied for extracting features from the network traffic data to accurately identify malicious IoT devices. Index Terms— IoT, IoT attacks, Cyber Security, ML, CNN, CRV (Composite Reputation Value). 1. Introduction The IoT is a concept that describes the connection of all types of things and gadgets to the Internet, whether wired or wirelessly. The IoT, has gain popularity as these technologies are employed for a various reason such as transportation, communication, commercial development, and education [1]. Here, this paper considers the inherent computational weaknesses of IoT devices, as well as their traditional vulnerabilities, it is easy to locate them by the hackers, and their projected global propagation. In every modern environment, both the dangers and the projected global effect of attaching IoT gadgets to the network become clear. [2] The IoT is rapidly gaining popularity in 1 everyday life due to its ability to connect physically exist things with the cybernetic world as phenomenon, i.e., the Internet [3]. Not only cameras, smart computers, and the intelligent lighting are being connected to Internet, but also daily basis appliances such as washers, refrigerators, and house doors, can be connected, resulting in a diverse IoT ecosystem. [4]. Since the last era, production technology of sensor has enabled the quick growth and large acceptance of the stuff. By 2018, 11.8 billion objects are projected to be linked through the Internet. [5] IoT has facilitated the managing, communication, and collection of data in smart applications as an emerging technology [6]. These features have attracted the attention of all the users of the world that can be from variety of field, as the IoT gains widespread acceptance at the network's edge for real-time applications [7]. The increase in the range and complexity of not known cyber-attacks, however, has cast the shadow over the implementation of the smart services. This is since the diversity and delivery of IoT applications it makes IoT protection difficult and complex. [8]. Furthermore, because of the unique characteristics of IoT, which cannot be met by a cloud that is centralized, attack detection in IoT is drastically distinct from current mechanisms: low latency, resource constraints, mobility, distribution, and scalability, to name a few. [9]. As a result, neither cloudbased nor stand-alone attack detection solutions can address IoT security issues. As a result, fog computing, a new form of distributed intelligence that has recently arisen, should be explored as a means of bridging gap. Fog computing is extended of CC to the network edge, allowing for the continuity of cloud-things services. It is founded on the idea that data handling and the communication should be provided nearer to the data sources [10]. The theory helps to mitigate the difficulty of resource shortage in IoT by offloading computation, expensive storage, and power, as well as networking, to nearby fog nodes. As a result, the efficacy and reliability of smart applications improves. As any services, protection measures in IoT could be introduced and implemented at various fog layer level, having proxy as a fog node, to offload costly computations and storage from IoT gadgets. As a result, fog nodes provide a one-of-a-kind ability for the IoT to deploy distributed and shared security frameworks. The current study concentrates on the dangers that IoT gadgets present towards the large corporations. Enterprise IoT protection is linked to both the organization's and employees' actions. Self-deployed IoT systems can be used to support a large variety of business requests. cameras and alarms smoke, for example, improve safety; smart light bulbs, smart thermostats, and sockets, for example, help to save energy; and so on. Given this, caution should be exercised to ensure that such enabled Web devices that does not lead to an increase in the organization's cyberattack surface. Smart TVs, which are commonly used in conference rooms, are a good example. A widget can use the Skype app to gain elevated privileges, as defined in [11] the Skype app. It can then root the computer, generate pictures of the entire storage, and send them to a remote FTP server. While the monitor is turned off, an embedded malware is still too able record nearby sounds and unethically convey them to 3rd parties via a Wireless connection in [12] a "Fake-Off mode." Additional smart TV exploits are described in [13,14] as a result, corporate enterprises should reconsider allowing smart TVs to connect to their networks. The concern in designing solutions for security IoT devices, stems from the fact that these devices have weaker security and are becoming more common today. [15]. For e.g., according to the report of Symantec’s 2019 Internet Security Threat [16], cameras and routers are those devices which were most affected, respectively accounting for 2 high percent of IoT attacks. E.g., of famous IoT malware consist of VPN Filter and Mirai distributed denial of service (DDoS) worm, where the latter is allegedly armed with powerful payloads, counting targeted for the credential theft, etc. Likewise, Cisco's 2018 study is similar [17] revealed that network-based ransomware does not require individual intervention to affect gadgets. WannaCry and Nyetya are two examples of ransomware that took advantage of the “Eternal Blue” vulnerability. WannaCry used the ransom component as the smokescreen to hide its true goal of the wiping data from affected users, according to the US government and other security organizations. Nyetya was also hidden as ransomware to erase information from its sufferers. The Nyeta attack was aided by leveraging the "Eternal Blue" susceptibility, the remote code execution susceptibility known as "Eternal Romance" and credential harvesting vectors. It is difficult to go up with a low-weight, high-security approach because IoT systems are typically constrained in terms of resources and processing capacity. The IoT security domain faces several challenges, including integrity, encryption capability, general security, patching, automation, a standard architecture, and privacy concerns. The scientific field in this area is brimming with possibilities, and no single project or study can possibly address all of them at once. The paper is distributed into sections as will be mentioned. Section 2 will go through related work information regarding security in IoT environment, IoT attacks and related works in the literature. Section 3 will be discussing the background and process flow behind the research approach in details. Section 4 will go through the methodology; The findings of our experiment are presented in Section 5, along with comments on the outcome. Finally, we conclude our work in Section 6. 2. Related Work IoT systems has received a lot of notice in current years. When examine the literature, a lot of similarities find out with current IDS efforts for WSN; however, only look at efforts that are specifically related to IoT systems. Also divided the efforts into classifications based on the type of intrusion detection device used, such as signature, anomaly, or hybrid. [4]. Median et al. [18] showed how the supervised machine learning can be used to evaluate web traffic data to reliably identify unauthorized IoT gadgets. Authors obtained and manually labelled network traffic data from the Seventeen IoT gadgets on behalf of 9 gadget types to train and test a multi-class classifier; to determine the ability of their system to notice a range of unauthorized IoT gadgets, they trained a classifier for each gadgets type on the residual 8 gadgets types, and verified that classification accuracy through majority voting over the categories of <20 successive sessions, the qualified classifiers achieved 96 percent accuracy in detecting unauthorized IoT system types on a test range. Six of the nine unauthorized system forms had accuracy of 99-100 percent. Simultaneously, whitelisted IoT system forms were assigned to their respective types with an average precision of nearly 99%. Diro et al. [19] designed an attack detection framework for distributed DL based IoT/Fog network. The experiment demonstrated the efficient application of AI to cybersecurity, as well as the implementation and design 3 of a framework for detection attack in IoT application distributed architecture. Execution system of measurement like as detection rate, accuracy, and incorrect alarm rate were used in the evaluation process to demonstrate the efficacy of deep models compare to the shallow models. Due to factor sharing, which prevent local minima in the training, distributed attack detect cyber-attacks more accurately than the centralized approach. For the classification of network data into normal and attack, our deep model outperformed traditional ML systems such as SoftMax when tested on previously unseen test data. Bhunia et al. [20] suggested IoT systems are vulnerable to cyber-attacks. By using the capabilities of SDN, able to resolve the challenges posed by such attacks. Soft Stuff was proposed which is an SD-based system for detecting and minimizing anomalies in IoT traffic. The aim of the system is to detect traffic anomalies closer to network's edge rather than at higher levels of the network. This assists in the rapid IoT system attacks detection and the execution of effective mitigation procedures. ML methods were used to identify traffic irregularities. To test their architecture and techniques for various attack scenarios, mininet-based emulation experiments were used. Their discoveries show that methods is able to detect and mitigate attacks with high value of precision and recall in a matter of seconds. To provide more information in the event of real-world implementation situations, author currently working on a hardware prototype using IoT devices and switches. Christropher et al. [21] provides a method for detecting botnet behavior on user IoT gadgets. DDoS attacks focused on the IoT have increased as the IoT has grown in popularity. A model that is used for the detection based on the Bidirectional Long Short-Term Memory based Recurrent Neural Network (BLSTM-RNN) is developed using a novel DL application. For botnet detection, the BLSTM-RNN is used in the conjunction with the Word Embedding to implement DL. The model is equated to the unidirectional Long Short-Term Memory based to see whether the BLSTM-RNN might send back improved efficiency or loss metrics for the dataset captured by accumulating contextual knowledge from the past and future. For the 4 attack vectors used by the mirai malware botnet, both models returned low loss and high accuracy metrics. Moreover, although bidirectional technique improves overhead to every epoch and increases the processing time, it is the progressive model that is going to be better as the time passes. As the Internet of Things has risen in popularity, so has the number of DDoS attacks targeting it. It gives users a way to detect botnet behavior on their IoT gadgets, networks, and devices. Using a novel DP application, a detection based model on a BLSTMRNN is developed (BLSTM-RNN). The BLSTM-RNN is applied in combination with the Word Embedding to introduce the deep learning for the detection botnet. By collecting contextual information from the future and past, the BLSTM-RNN was contrasted to the unidirectional LSTM-RNN to see whether it might return loss metrics or better accuracy for the captured dataset. Both the models produced low loss and high accuracy metrics for 4 attack vectors used by Mirai malware botnet. Golomb et al [22] showed in paper about IoT devices have become a core part of our daily lives because of their rapid growth and deployment. They do, however, have a lot of flaws that an intruder can take advantage of. Anomaly detection and other unsupervised techniques may assist in the protection of IoT devices. However, to catch all benign habits, an anomaly detection model should be trained for lengthy time. Since all findings are presumed to be benign when training the anomaly detection model, this method is susceptible to attacks. CIoTA is a solution based on blockchain for collaborative anomaly detection among several IoT devices. Although remaining immune to adversarial assaults, CIoTA continuously trains an anomaly detection model. CIoTA is also differentiate between unusual innocuous incidents and harmful acts by using the wisdom of the crowd. One 4 downside of CIoTA is that each IoT model/firmware must have its own chain released. As a result, CIoTA is best fitted to smart cities and vast industrial settings in its current form. Author plan to expand CIoTA in the future to help a variety of frameworks and develop its detection capabilities, for example, by investigating API flows rather than lower-level control-flows. Sudhakaran et el. [23] showed in his paper that the IoT produces vast quantities of data from connections among people, gadgets and security is a major concern. The majority of IoT anomaly detection techniques rely on supervised machine learning, which has high false positive rate. It was discovered that the magnitude of the attack response was not considered when designing the AAA system for IoT devices. Initially, the TCA collects data at the packet and flow levels for a defined time. Then, using the M-class SVM algorithm, DA examines the collected data and determines the type of attack. When the RA receives the attack type from the DA, it measures the attack frequency over various time windows to estimate the intensity of the attack and takes appropriate action. The proposed AAA system was developed in C++ and compared to the DADM approach. Experiments have shown that their proposed AAA system can minimize unauthorized access by 13 percent and false positives by 19 percent. Additionally, energy consumption is decreased by twenty percent. Yu et al. [24] paper looks at how certain security assurances can be accomplished even though the attacker has gained the access to all keys in a system, for example by exploiting software flaws. Encryption is only useful if the decryption key has not been revealed to adversaries; it necessitates the absence of malware on the computer conducting the crypto operations. This research submitted a novel messaging protocol that ensures protection even though an intruder has access to a user's device's secret keys. In specific, (a) Since an attacker is only read the messages sent in same epoch without being noticed, the protocol bounds the impact of a violation, and (b) If an attacker uses long-term keys compromised to impersonate users, the protocol assists participants in detecting this and taking appropriate action. Our procedure supports several gadgets per user, and the variety of devices aids in the detection of attacks by providing users with intuitive indications of which keys have been active recently. The methods it will teach you are not supposed to be a substitute for the methods you have been using to keep your keys secure. Existing technologies for securing keys include TPMs, smart cards, and the ARM Trust Zone. None of these technologies, however, are fully stable. Malware, for example, can be able to cause key usages not having the ability to copy the key, even though hardware protection is used. Sharmila et al. [25] paper describe how to detect attacks at the sinkhole and was found to be very vulnerable to collisions. To identify the sinkhole attack, the WSN used a lightweight detection system. The digest message technique was created, the methods for data digestion are broadcasted using the trusted route to detect sinkhole attacks, and the protocol followed differs from the system's actual design. As the given method considers the active trust mechanism, different forms of the attacks, such as blackhole and the selective forwarding attacks, are observed.Alajmi et al. [26] introduced a discovery strategy for selective forwarding attacks and explored various network monitoring techniques. To discover and observe the many attacks in the WSN like selective forwarding attack. The established technique can detect attacks at the network layer without putting forth a significant amount of effort. The compromised nodes start acting like every other node in the system is in the form of attack described in the paper, and the malicious node will drop some of the personal information before sharing it with the destination node. Geethu et al. [27] suggested the method for the transmission of multipath. As a defensive tactic, against selective forwarding attacks, the built-up approach was used. In this scheme, if a node detects a packet drop 5 during routing, the packet is sent over an alternate path. The routing method's efficiency was enhanced thanks to the resending strategy. The method described protects the network from a variety of threats, including black hole attacks and tiny, active trust-based for-warding attacks. 3. Problem Formulation Security threats are rising in lockstep by the IoT's expansion. To identify attacks in IoT, several attack documentation systems have been developed, in which the attack discovery system is to be deployed at network's point and collects data before classifying it as "attack" or "normal" using a supervised ML algorithm. These mechanisms, however, have struggled to yield substantial outcomes due to specific needs of an IoT devices, like as supply, scalability, resource limitations, and low latency. Owing to the manual assignment of cluster numbers, unsupervised learning has the downside of having lower classification accuracy. In terms of discovering another attack, it outperforms supervised ML, and it is more effective for IoT attack detection. A semi-supervised ML method, on the other hand, has been suggested, which combines unsupervised and supervised ML techniques. It trains on both labelled and unlabeled data extracts the dataset's intra-structure. A fog-based attack recognition system is developed based on the fog computing model and afresh offered ESFCM model to enable real-time attack distributed discovery in IoT. Fog processing distributes the detection load across many fog nodes at the fog layer, improving exposure performing. The planned ESFCM solution also resolves the issue of real-time detection and labelled data unavailability by merging the ELM and SFCM algorithms. By gathering data from a range of IoT devices, the framework can be used as a recognition unit in smart IoT networks, like as smart cities and homes, to detect attacks. The ELM could, however, perform poorly due to framework's random assignment of the weights and the input bias. Because of the unpredictable input bias and weights, the classification problem can be ill-posed, yielding several solutions. The study suggests that a DL (deep learning) algorithm be used to solve the ill-posed problem by eliminating the need for manual feature engineering and offering compression resulting in higher accuracy and quicker processing [28]. Here in this paper we studied performance of CNN against proposed frame work and other conventional machine learning algorithms and also extended this problem to wireless sensor network and devised an edge based algorithm to detect intruders in a cluster. 4. System Model The standard architecture of the IoT-WSN model comprises of framework, end-user layers, and cloud. The system layer comprises of a network of the wireless sensor modules, communication protocols, and data acquisition circuitry that sends data and information to the local storage for processing. All these devices are allowed users to gather information in real time at various acquisition rates. The data from sensors is processed in the cloud layer for 6 additional management, highlight extraction, noise reduction, and data manipulating. This information is then fed into a decision-making system that makes decisions based on advanced data analysis and artificial intelligence. Model considered focuses on randomly deployed wireless sensor network as subset of heterogeneous IoT scenario shown in Fig.3. Clustering is performed by well-known LEACH [29] protocol. Then composite reputation values are calculated for every cluster, the entire set of nodes are differentiated in three different categories: Cluster Head (CH), Member Nodes (MN), and Inspector Node (IN), where the IN is expected to track every activity of the CH and member nodes. IN keeps track of all ongoing contact and the malicious party that is attacking the node. Model is trained with Packet Delivery Ratio, Packet Dropping Ratio and Delay as features. Figure1: System Model 4.1 Attacks in WSN When time progresses in the mechanism, the device becomes more vulnerable to multiple attacks as the attack surface for the attackers expands and the device's complications grow, giving rise to a variety of attacks. As a result, it is difficult to create a safe and stable application or system. The need for encryption is just as crucial as the need for the information system. The attacker is mostly concerned with the functionality, confidentiality and credibility of infrastructure [30]. In this research work two types of attacks are considered. First and most popular attacks is the Sybil assault, in which a malicious node generates Sybil nodes using altered identities. Sybil nodes can gain an authorized node identity and misbehave by altering routing information, causing communication line and storage interruptions. Second one is buffer overflow attack in which, the amount of data in a memory buffer exceeds the storage space available, a buffer overload (or buffer overflow) occurs. The software may behave unpredictably if the transaction overwrites executable code, causing inaccurate results, memory access issues, or even crashing. 4.2 Low-Energy Adaptive Clustering Hierarchy (LEACH) 7 LEACH [29] is a hierarchical routing algorithm for WSNs running in distinct rounds [31] that is energetically efficient. In LEACH, each round is divided into 2 stages: setup and steady state. During the setup phase, sensor nodes form clusters, and during the steady process, the sensor nodes communicate data messages with their respective CHs, who are accountable for interactive with base station (BS). 4.3 Composite reputation value The accessible nodes in a cluster network are distributed into three types: CH, IN, and MN, all of which are isomorphic. The cluster's radius is nearly half of network's communication range, allowing two nodes from the same network to connect with one another. 𝑟0 = 𝑅0 /2 where 𝑟0 denotes the cluster's radius and 𝑅0 denotes the network's established transmission range.The CH and IN in the network are determined by the CRV[32], in which the device with the highest CRV acts as the CH and next node acts as an IN, is formulated as follows: 𝐶𝑅𝑉𝑠𝑒𝑛𝑠𝑜𝑟 𝑖𝑑 = 𝑎𝑃𝑟 + 𝑏 ∗ 𝐸𝑠𝑢𝑟 /𝐸0 Where a and b are constants with values ranging from 0 to 1 and a+b=1. The early energy level of node is 𝐸0 , while surplus strength of the nodes is 𝐸𝑠𝑢𝑟 and 𝑃𝑟 is the forwarding rate for the designated node. 5. Proposed Methodology This proposed work employs a lightweight convolutional neural network to detect compromised cluster head. The technique focuses on detecting the attack or malicious node, as well as attempting to resolve the problem. Clustering is done using LEACH protocol and CRV is also computed for each cluster. The device having highest CRV is selected as CH, and the next highest CRV node is IN. Training of Inspector Node is done using Convolutional Neural Network for Packet Delivery Ratio, Packet Dropping Ratio and Delay. Source node share request service to the Cluster Head and then act for the same. Compute the Round trip time (RTT) after getting the feedback packet from the next node and add to dataset. Following the request and feedback process of the packets travels towards to its destination, the Inspector nodes perform a training-based scan for any malicious behaviors by testing the sybil attack and buffer overflow attack. If any malicious behavior detected, then route will be changed, incase of normal condition, then communication goes as decided. 8 Figure2: Proposed Algorithm 5. Results and Discussion 5.1 Simulation Setup The effectiveness of CNN-model is compared with the different machine learning algorithms on NSL-KDD dataset as shown in Fig. 15 and 16 respectively. The result of the proposed methodology shows better accuracy in comparison with another machine learning classifier. Additionally extended WSN scenario is simulated using dataset generated with the help of the Network Simulator 2 (NS2). The dataset is divided into three parts i.e., 70 percent training, 15 percent testing, and 15 percent for validation. In the given model IoT infrastructure is formed where nodes are created, and the cluster is formed. The work presented here detects unauthorized IoT devices. Implementation is done using the MATLAB tool. We simulate 9 detection model for sybil and buffer over flow attack and investigate the efficacy of the proposed model over various performance matrices 1. confusion matrices 2. Receiver operator characteristics 3. Cross entropy analysis Table 1 depicts the CNN specifications that are used in the implementation. Parameters Value Input, output, hidden layers (1,1,1) Stride length (2,2) Conv filter size (5,5) Pooling layer size (2,2) Output layer activation function Softmax Hidden layer activation function Relu 5.2 Model Implementation and Results Firstly, CNN-model is compared with the different machine learning algorithms on NSL-KDD as shown in Figure 3 and 4 respectively, accuracy of CNN model is around 97% . The result of the CNN model shows better accuracy in comparison with another machine learning classifiers. Further attack detection time for centralized and distributed frameworks are also analyzed in Figure 5, whose mean detection time is well below 5ms. Figure3: Accuracy on KDDTest+ Figure4: Accuracy on KDDTest-21 Figure5: Detection time Then for extended WSN scenario entire set of nodes is distinguished as MNs, CH, and IN. Each cluster has a single node that serves as the CH, accountable for all communication both within and outside the cluster. With the help of a learning process, the Inspector node is expected to overhear every communication in the cluster and be 10 accountable for the malicious activity of CH and MNs. As shown in Figure 6 and 7 CRV for each node is calculated, node with highest CRV is chosen as a CH and the second-highest CRV value chosen as Inspector node . Figure6: Computation of CRV Figure7: CH-IN selection Communication is established via two paths viz path A containing N2, N6, N1, N8, N3, and N7 nodes and path B containing nodes N2, N5, N9, N10, and N7 as illustrated in Figure 8 and 9. Figure8: Illustrates communication through path A Figure9: Illustrates communication through path B Figure 10, shows the detection of Sybil attack in a network path from source node N2 to N7 . Nodes N3,N8,N9 and N10 are detected malicious under Sybil attack. Figure 11, shows detection of buffer overflow attack caused by malicious code injection in node N9. Figure10: Illustrates sybill attack Figure11: Illustrates buffer flow attack Figure 12, depicts the confusion matrix of the training, testing, validation, and the overall results of the proposed model. The accuracy of the training is 97.9 percent, the accuracy of the validation is 99.3 percent. After validation, 11 the accuracy of the testing is 95.4 percent. Lastly, the overall accuracy of the model is 97.7 percent. The training accuracy is always better than the testing accuracy because if the model trained well then, it gives a perfect output in the testing, else if the training of the model is not good then the model does not give a perfect output that is the reason behind the higher accuracy of the training. The ROC curve is plotted between a true positive rate against a false positive rate. The four different ROC curve of training, testing, validation, and the overall of the model is shown in the Figure 13. Figure 12: Confusion Matrix Figure13: ROC curve Figure 14: Cross-Entropy Curve Figure15: Gradient Measure and validation The “Cross-Entropy” as a performance parameter is calculated as shown in Figure14. Performance of the training, testing, and validation dataset is depicted with best performance validation is 0.040394 at epoch 10. Gradient measures the change in all weights with regards to change in error. The Figure 15, shows the gradient = 0.045054 and validation checks =6 at 16 epochs. Figure16: Error Histogram 12 Figure 16, shows the results of the error values at 0.0401 with 20 bins. Training dataset shows the error values at approximately 600 instances, validation dataset at approximately 750 instances, and the testing dataset at approximately 850 instances. 6. Conclusion This research work is mainly focuses on to detection of the unauthorized IoT device in the distributed IoT architecture. Because of the widespread acceptance of IoT devices, their variety, standardization challenges, and inherent versatility, businesses need an intelligent mechanism capable of detecting suspicious IoT devices automatically and connected to their networks. In this research work, CRV is calculated for each node to decide the CH and IN. Deep learning-based CNN framework is used in order to train the IN and the CNN is applied for extracting the features from the network traffic in order to detect the malicious IoT device. In the current research attacks naming sybil attack and buffer overrun is detected among the IoT devices. Furthermore, the cross entropy is calculated as a performance parameter with gradient measures the change in all weights with regards to change in error. The model is running for 16 iterations and achieves an overall accuracy of 97.7 percent. There is a pressing need to standardize the methodology for detecting the IoT devices on non-homogeneous platforms like non homogeneous sensor networks, such standards will limit the number of unanticipated vulnerabilities and accompanying attacks. 13 Funding declaration The authors are not received funding from any of the sources. Conflict of interest The work is not submitted in any other journal. There is no conflict of interest between the authors that are relevant to the content of the manuscript. Author contribution The idea and problem formulation along with proposed solution is covered by corresponding author. The simulation and result analysis work done by the other author. Data availability statement The data set generated during and / or analyzed during the current study are available from the corresponding author on reasonable request. However, for extended WSN scenario dataset is generated through ns2 tool. NSL KDD is used in research work- https://www.unb.ca/cic/datasets/nsl.html References 1. Tawalbeh, Lo’ai, Muheidat, F., Tawalbeh, M., and Quwaider, M.: IoT Privacy and security: Challenges and solutions. Applied Sciences. 10 (12). 4102 (2020) Doi:10.3390/app10124102 14 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. Meidan, Y., Bohadana, M., Shabtai, A., Ochoa, M., Tippenhauer, N. O., Guarnizo, J. D., & Elovici, Y.: Detection of Unauthorized IoT Devices Using Machine Learning Techniques. (CoRR). (2017) Peña-López, I. (2005). ITU Internet report 2005: the internet of things. Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), 1645-1660. Gartner report, “Forecast: IoT Security, Worldwide,” 2016 Frahim, J., Pignataro, C., Apcar, J., & Morrow, M. (2015). Securing the internet of things: A proposed framework. Cisco White Paper, 15. Ibrahim, M. H. (2016). OCTOPUS: An edge-fog mutual authentication scheme. Int. J. Netw. Secur., 18(6), 1089-1101. Stojmenovic, I., & Wen, S. (2014, September). The fog computing paradigm: Scenarios and security issues. In 2014 federated conference on computer science and information systems (pp. 1-8). IEEE. Alrawais, A., Alhothaily, A., Hu, C., & Cheng, X. (2017). Fog computing for the internet of things: Security and privacy issues. IEEE Internet Computing, 21(2), 34-42. Yi, S., Qin, Z., & Li, Q. (2015, August). Security and privacy issues of fog computing: A survey. In International conference on wireless algorithms, systems, and applications (pp. 685-695). Springer, Cham. Boztas, A., Riethoven, A. R. J., & Roeloffs, M. (2015). Smart TV forensics: Digital traces on televisions. Digital Investigation, 12, S72-S80. Sam Biddle. 2017. WikiLeaks Dump Shows CIA Could Turn Smart TVs into Listening Devices. (2017). https://theintercept.com/2017/03/07/ wikileaks-dump-shows-cia-could-turn-smart-tvs-into-listening-devices Grattafiori, A., & Yavor, J. (2013). The outer limits: hacking the Samsung smart TV, Blackhat briefing 2013. Lee, S. J., & Kim, S. (2013). Hacking, surveilling and deceiving victims on smart tv. Blackhat USA. Pour, M. S., Bou-Harb, E., Varma, K., Neshenko, N., Pados, D. A., & Choo, K. K. R. (2019). Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns. Digital Investigation, 28, S40-S49. O’Gorman, Brigid, Candid Wueest, Dick O’Brien, Gillian Cleary, Hon Lau, J. Power, Mayee Corpin, Orla Cox, Paul Wood, and Scott Wallace. "Internet security threat report." A Report published by SYMANTEC (2019). Szigeti, T., Zacks, D., Falkner, M., & Arena, S. (2018). Cisco Digital Network Architecture: Intent-based Networking for the Enterprise. Cisco Press. Meidan, Y., Bohadana, M., Shabtai, A., Ochoa, M., Tippenhauer, N. O., Guarnizo, J. D., & Elovici, Y. (2017). Detection of unauthorized IoT devices using machine learning techniques. arXiv preprint arXiv:1709.04647. Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems, 82, 761-768. Bhunia, S. S., & Gurusamy, M. (2017, November). Dynamic attack detection and mitigation in IoT using SDN. In 2017 27th International telecommunication networks and applications conference (ITNAC) (pp. 16). IEEE. McDermott, C. D., Majdani, F., & Petrovski, A. V. (2018, July). Botnet detection in the internet of things using deep learning approaches. In 2018 international joint conference on neural networks (IJCNN) (pp. 18). IEEE Golomb, T., Mirsky, Y., & Elovici, Y. (2018). CIoTA: Collaborative IoT anomaly detection via blockchain. arXiv preprint arXiv:1803.03807. Sudhakaran, P., & Malathy, C. (2020). Authorisation, attack detection and avoidance framework for IoT devices. IET Networks, 9(5), 209-214. Yu, J., Ryan, M., & Cremers, C. (2015). How to detect unauthorised usage of a key. IACR Cryptol. ePrint Arch., 2015, 486. 15 25. Sharmila, S., & Umamaheswari, G. (2011, July). Detection of sinkhole attack in wireless sensor networks using message digest algorithms. In 2011 International Conference on Process Automation, Control and Computing (pp. 1-6). IEEE.. 26. Alajmi, N. M., & Elleithy, K. (2016, April). A new approach for detecting and monitoring of selective forwarding attack in wireless sensor networks. In 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT) (pp. 1-6). IEEE. 27. Geethu, P. C., & Mohammed, A. R. (2013, July). Defense mechanism against selective forwarding attack in wireless sensor networks. In 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT) (pp. 1-4). IEEE. 28. Rathore, S., & Park, J. H. (2018). Semi-supervised learning based distributed attack detection framework for IoT. Applied Soft Computing, 72, 79-89. 29. Krontiris, I., Giannetsos, T., & Dimitriou, T. (2008, October). Launching a sinkhole attack in wireless sensor networks; the intruder side. In 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (pp. 526-531). IEEE. 30. Mann, P., Tyagi, N., Gautam, S., & Rana, A. (2020, September). Classification of Various Types of Attacks in IoT Environment. In 2020 12th International Conference on Computational Intelligence and Communication Networks (CICN) (pp. 346-350). IEEE. 31. Newsome, J., Shi, E., Song, D., & Perrig, A. (2004, April). The sybil attack in sensor networks: analysis & defenses. In Third international symposium on information processing in sensor networks, 2004. IPSN 2004 (pp. 259-268). IEEE. 32. Zhou, H., Wu, Y., Feng, L., & Liu, D. (2016). A security mechanism for cluster-based WSN against selective forwarding. Sensors, 16(9), 1537. 16