A vulnerability detection method for IoT protocol based on parallel fuzzy algorithm
The Internet of Things communication protocol is prone to security vulnerabilities when facing increasing types and scales of network attacks, which can affect the communication security of the Internet of Things. It is crucial to effectively detect these vulnerabilities in order to improve the secu...
Saved in:
| Published in: | Heliyon Vol. 10; no. 12; p. e31846 |
|---|---|
| Main Authors: | , , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
England
Elsevier Ltd
30.06.2024
Elsevier |
| Subjects: | |
| ISSN: | 2405-8440, 2405-8440 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | The Internet of Things communication protocol is prone to security vulnerabilities when facing increasing types and scales of network attacks, which can affect the communication security of the Internet of Things. It is crucial to effectively detect these vulnerabilities in order to improve the security of IoT communication protocols and promptly fix them. Therefore, this study proposes a distributed IoT communication protocol vulnerability detection method based on an improved parallelized fuzzy testing algorithm. Firstly, based on design principles and by comparing different communication protocols, a communication architecture for the distribution network's Internet of Things was constructed, and the communication protocols were formalized and decomposed. Next, preprocess the vulnerability detection samples, and then use genetic algorithm to improve the parallelized fuzzy testing algorithm to perform vulnerability detection. Through this improved algorithm, the missed detection rate and false detection rate can be effectively reduced, thereby improving the security of IoT communication protocols. The experimental results show that the highest missed detection rate of this method is only 4.0 %, and the false detection rate is low, with high detection efficiency. This indicates that the method has good performance and reliability in detecting vulnerabilities in IoT communication protocols. |
|---|---|
| Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
| ISSN: | 2405-8440 2405-8440 |
| DOI: | 10.1016/j.heliyon.2024.e31846 |