Skip to main content
Erschienen in: International Journal of Information Security 2/2024

02.11.2023 | Regular Contribution

A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks

verfasst von: Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi

Erschienen in: International Journal of Information Security | Ausgabe 2/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Things (IoT) is an expanding field of computer networks where resource-constrained devices connect to the internet through various wireless technologies. IoT systems already cover a broad spectrum, including smart homes, smart hospital systems, and hazard detection systems, with their influence expected to grow in the coming years. However, IoT systems are not without their drawbacks, as security breaches and device malfunctions can lead to severe disruptions in the ecosystem. In this article, we introduce an edge-assisted hybrid intrusion detection system designed to detect and mitigate Sinkhole Attacks (SHAs) within the IoT ecosystem. The unique aspect of our proposed approach is its deployment on edge devices, enabling it to identify SHAs as close as possible to the relevant data sources. Furthermore, we provide a comparative analysis based on simulation results and real-world testbed experiments to support our proposed methodology. Our findings demonstrate considerable improvements in scalability, accuracy, precision, recall, F1 score, packet delivery ratio, per-node power consumption, overall IoT network energy consumption, and end-to-end delay.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hadaya, N.N., Alabady, S.A.: Improved RPL protocol for low-power and lossy network for IoT environment. SN Comput. Sci. 2(5), 341 (2021)CrossRef Hadaya, N.N., Alabady, S.A.: Improved RPL protocol for low-power and lossy network for IoT environment. SN Comput. Sci. 2(5), 341 (2021)CrossRef
2.
Zurück zum Zitat Thakor, V.A., Razzaque, M.A., Khandaker, M.R.: Lightweight cryptography algorithms for resource-constrained IoT devices: a review, comparison and research opportunities. IEEE Access 9, 28177–28193 (2021)CrossRef Thakor, V.A., Razzaque, M.A., Khandaker, M.R.: Lightweight cryptography algorithms for resource-constrained IoT devices: a review, comparison and research opportunities. IEEE Access 9, 28177–28193 (2021)CrossRef
3.
Zurück zum Zitat Quy, V.K., Hau, N.V., Anh, D.V., Ngoc, L.A.: Smart healthcare IoT applications based on fog computing: architecture, applications and challenges. Complex Intell. Syst. 8(5), 3805–3815 (2022)CrossRef Quy, V.K., Hau, N.V., Anh, D.V., Ngoc, L.A.: Smart healthcare IoT applications based on fog computing: architecture, applications and challenges. Complex Intell. Syst. 8(5), 3805–3815 (2022)CrossRef
4.
Zurück zum Zitat Wu, Y., Dai, H.N., Wang, H., Xiong, Z., Guo, S.: A survey of intelligent network slicing management for industrial IoT: integrated approaches for smart transportation, smart energy, and smart factory. IEEE Commun. Surv. Tutor. 24(2), 1175–1211 (2022)CrossRef Wu, Y., Dai, H.N., Wang, H., Xiong, Z., Guo, S.: A survey of intelligent network slicing management for industrial IoT: integrated approaches for smart transportation, smart energy, and smart factory. IEEE Commun. Surv. Tutor. 24(2), 1175–1211 (2022)CrossRef
5.
Zurück zum Zitat Bradley, J., Barbier, J., Handler, D.: Embracing the internet of everything to capture your share of \$14.4 trillion. Technical report, CISCO (2013) Bradley, J., Barbier, J., Handler, D.: Embracing the internet of everything to capture your share of \$14.4 trillion. Technical report, CISCO (2013)
6.
Zurück zum Zitat Das, A., Adhikari, N., Bhale, P.K., Rath, S.: A novel approach to detect rank attack in IoT ecosystem. In: Innovations in Intelligent Computing and Communication: First International Conference, ICIICC 2022, Bhubaneswar, Odisha, India, December 16–17, 2022, Proceedings. Springer, pp. 204–221 (2023) Das, A., Adhikari, N., Bhale, P.K., Rath, S.: A novel approach to detect rank attack in IoT ecosystem. In: Innovations in Intelligent Computing and Communication: First International Conference, ICIICC 2022, Bhubaneswar, Odisha, India, December 16–17, 2022, Proceedings. Springer, pp. 204–221 (2023)
7.
Zurück zum Zitat Bang, A.O., Rao, U.P., Kaliyar, P., Conti, M.: Assessment of routing attacks and mitigation techniques with RPL control messages: a survey. ACM Comput. Surv. (CSUR) 55(2), 1–36 (2022)CrossRef Bang, A.O., Rao, U.P., Kaliyar, P., Conti, M.: Assessment of routing attacks and mitigation techniques with RPL control messages: a survey. ACM Comput. Surv. (CSUR) 55(2), 1–36 (2022)CrossRef
8.
Zurück zum Zitat Bhale, P., Dey, S., Biswas, S., Nandi, S.: Energy efficient approach to detect sinkhole attack using roving IDS in 6LoWPAN network. In: Innovations for Community Services: 20th International Conference, I4CS 2020, Bhubaneswar, India, January 12–14, 2020, Proceedings 20, pp. 187–207. Springer (2020) Bhale, P., Dey, S., Biswas, S., Nandi, S.: Energy efficient approach to detect sinkhole attack using roving IDS in 6LoWPAN network. In: Innovations for Community Services: 20th International Conference, I4CS 2020, Bhubaneswar, India, January 12–14, 2020, Proceedings 20, pp. 187–207. Springer (2020)
9.
Zurück zum Zitat Bang, A.O., Rao, U.P., Visconti, A., Brighente, A., Conti, M.: An IoT inventory before deployment: a survey on IoT protocols, communication technologies, vulnerabilities, attacks, and future research directions. Comput. Secur. 123, 102914 (2022)CrossRef Bang, A.O., Rao, U.P., Visconti, A., Brighente, A., Conti, M.: An IoT inventory before deployment: a survey on IoT protocols, communication technologies, vulnerabilities, attacks, and future research directions. Comput. Secur. 123, 102914 (2022)CrossRef
10.
Zurück zum Zitat Rondon, L.P., Babun, L., Aris, A., Akkaya, K., Uluagac, A.S.: Survey on enterprise internet-of-things systems (E-IoT): a security perspective. Ad Hoc Netw. 125, 102728 (2022)CrossRef Rondon, L.P., Babun, L., Aris, A., Akkaya, K., Uluagac, A.S.: Survey on enterprise internet-of-things systems (E-IoT): a security perspective. Ad Hoc Netw. 125, 102728 (2022)CrossRef
11.
Zurück zum Zitat Kharrufa, H., Al-Kashoash, H.A., Kemp, A.H.: RPL-based routing protocols in IoT applications: a review. IEEE Sens. J. 19(15), 5952–5967 (2019)CrossRef Kharrufa, H., Al-Kashoash, H.A., Kemp, A.H.: RPL-based routing protocols in IoT applications: a review. IEEE Sens. J. 19(15), 5952–5967 (2019)CrossRef
12.
Zurück zum Zitat Yusoff, N.H.M., Zakaria, N.A., Sikora, A., et al.: 6LoWPAN protocol in fixed environment: A performance assessment analysis. In: 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), vol. 2, pp. 1142–1147. IEEE (2019) Yusoff, N.H.M., Zakaria, N.A., Sikora, A., et al.: 6LoWPAN protocol in fixed environment: A performance assessment analysis. In: 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), vol. 2, pp. 1142–1147. IEEE (2019)
13.
Zurück zum Zitat Gandhi, K.K.A., Arumugam, C.: Toward a unified and secure approach for extraction of forensic digital evidence from an IoT device. Int. J. Inf. Secur. 22, 1–15 (2022) Gandhi, K.K.A., Arumugam, C.: Toward a unified and secure approach for extraction of forensic digital evidence from an IoT device. Int. J. Inf. Secur. 22, 1–15 (2022)
14.
Zurück zum Zitat Kureshi, R.R., Mishra, B.K.: A comparative study of data encryption techniques for data security in the IoT device. In: Internet of Things and Its Applications: Select Proceedings of ICIA 2020, pp. 451–460. Springer (2022) Kureshi, R.R., Mishra, B.K.: A comparative study of data encryption techniques for data security in the IoT device. In: Internet of Things and Its Applications: Select Proceedings of ICIA 2020, pp. 451–460. Springer (2022)
15.
Zurück zum Zitat Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the Internet of Things. Ad Hoc Netw. 11(8), 2661–2674 (2013)CrossRef Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the Internet of Things. Ad Hoc Netw. 11(8), 2661–2674 (2013)CrossRef
16.
Zurück zum Zitat Bostani, H., Sheikhan, M.: Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach. Comput. Commun. 98, 52–71 (2017)CrossRef Bostani, H., Sheikhan, M.: Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach. Comput. Commun. 98, 52–71 (2017)CrossRef
17.
Zurück zum Zitat Bilal, A., Hasany, S.M.N., Pitafi, A.H.: Effective modelling of sinkhole detection algorithm for edge-based Internet of Things (IoT) sensing devices. IET Commun. 16(8), 845–855 (2022)CrossRef Bilal, A., Hasany, S.M.N., Pitafi, A.H.: Effective modelling of sinkhole detection algorithm for edge-based Internet of Things (IoT) sensing devices. IET Commun. 16(8), 845–855 (2022)CrossRef
18.
Zurück zum Zitat Zaminkar, M., Fotohi, R.: SoS-RPL: securing internet of things against sinkhole attack using RPL protocol-based node rating and ranking mechanism. Wirel. Pers. Commun. 114, 1287–1312 (2020)CrossRef Zaminkar, M., Fotohi, R.: SoS-RPL: securing internet of things against sinkhole attack using RPL protocol-based node rating and ranking mechanism. Wirel. Pers. Commun. 114, 1287–1312 (2020)CrossRef
19.
Zurück zum Zitat Sangaiah, A.K., Javadpour, A., Ja’fari, F., Pinto, P., Ahmadi, H., Zhang, W.: CL-MLSP: the design of a detection mechanism for sinkhole attacks in smart cities. Microprocess. Microsyst. 90, 104504 (2022)CrossRef Sangaiah, A.K., Javadpour, A., Ja’fari, F., Pinto, P., Ahmadi, H., Zhang, W.: CL-MLSP: the design of a detection mechanism for sinkhole attacks in smart cities. Microprocess. Microsyst. 90, 104504 (2022)CrossRef
20.
Zurück zum Zitat Liu, Y., Ma, M., Liu, X., Xiong, N.N., Liu, A., Zhu, Y.: Design and analysis of probing route to defense sink-hole attacks for Internet of Things security. IEEE Trans. Netw. Sci. Eng. 7(1), 356–372 (2018)CrossRef Liu, Y., Ma, M., Liu, X., Xiong, N.N., Liu, A., Zhu, Y.: Design and analysis of probing route to defense sink-hole attacks for Internet of Things security. IEEE Trans. Netw. Sci. Eng. 7(1), 356–372 (2018)CrossRef
21.
Zurück zum Zitat Prathapchandran, K., Janani, T.: A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest-RFTRUST. Comput. Netw. 198, 108413 (2021)CrossRef Prathapchandran, K., Janani, T.: A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest-RFTRUST. Comput. Netw. 198, 108413 (2021)CrossRef
22.
Zurück zum Zitat Sharma, G., Grover, J., Verma, A.: QSec-RPL: detection of version number attacks in RPL based mobile IoT using Q-learning. Ad Hoc Netw. 142, 103118 (2023)CrossRef Sharma, G., Grover, J., Verma, A.: QSec-RPL: detection of version number attacks in RPL based mobile IoT using Q-learning. Ad Hoc Netw. 142, 103118 (2023)CrossRef
23.
Zurück zum Zitat Nayak, S., Ahmed, N., Misra, S.: Deep learning-based reliable routing attack detection mechanism for industrial Internet of Things. Ad Hoc Netw. 123, 102661 (2021)CrossRef Nayak, S., Ahmed, N., Misra, S.: Deep learning-based reliable routing attack detection mechanism for industrial Internet of Things. Ad Hoc Netw. 123, 102661 (2021)CrossRef
24.
Zurück zum Zitat Yavuz, F.Y., Devrim, Ü., Ensar, G.: Deep learning for detection of routing attacks in the internet of things. Int. J. Comput. Intell. Syst. 12(1), 39 (2018)CrossRef Yavuz, F.Y., Devrim, Ü., Ensar, G.: Deep learning for detection of routing attacks in the internet of things. Int. J. Comput. Intell. Syst. 12(1), 39 (2018)CrossRef
25.
Zurück zum Zitat Adjih, C., Baccelli, E., Fleury, E., Harter, G., Mitton, N., Noel, T., Pissard-Gibollet, R., Saint-Marcel, F., Schreiner, G., Vandaele, J., et al.: FIT IoT-LAB: a large scale open experimental IoT testbed. In: 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), pp. 459–464. IEEE (2015) Adjih, C., Baccelli, E., Fleury, E., Harter, G., Mitton, N., Noel, T., Pissard-Gibollet, R., Saint-Marcel, F., Schreiner, G., Vandaele, J., et al.: FIT IoT-LAB: a large scale open experimental IoT testbed. In: 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), pp. 459–464. IEEE (2015)
26.
Zurück zum Zitat Perez, A.: SSL, TLS and DTLS protocols. In: Network Security, pp. 109–132 (2014) Perez, A.: SSL, TLS and DTLS protocols. In: Network Security, pp. 109–132 (2014)
27.
Zurück zum Zitat Batina, L., Chow, S.S.M., Hancke, G., Liu, Z.: Introduction to the special issue on cryptographic engineering for internet of things: security foundations, lightweight solutions, and attacks. ACM Trans. Embed. Comput. Syst. (2019). https://doi.org/10.1145/3322641CrossRef Batina, L., Chow, S.S.M., Hancke, G., Liu, Z.: Introduction to the special issue on cryptographic engineering for internet of things: security foundations, lightweight solutions, and attacks. ACM Trans. Embed. Comput. Syst. (2019). https://​doi.​org/​10.​1145/​3322641CrossRef
29.
Zurück zum Zitat Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar, B.: A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7, 82721–82743 (2019)CrossRef Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar, B.: A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7, 82721–82743 (2019)CrossRef
30.
Zurück zum Zitat Grammatikis, P.I.R., Sarigiannidis, P.G., Moscholios, I.D.: Securing the internet of things: challenges, threats and solutions. Internet of Things 5, 41–70 (2019)CrossRef Grammatikis, P.I.R., Sarigiannidis, P.G., Moscholios, I.D.: Securing the internet of things: challenges, threats and solutions. Internet of Things 5, 41–70 (2019)CrossRef
31.
Zurück zum Zitat Yibo, C., Hou, K.M., Zhou, H., Shi, H.L., Liu, X., Diao, X., Ding, H., Li, J.J., De Vaulx, C.: 6LoWPAN stacks: a survey. In: 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1–4. IEEE (2011) Yibo, C., Hou, K.M., Zhou, H., Shi, H.L., Liu, X., Diao, X., Ding, H., Li, J.J., De Vaulx, C.: 6LoWPAN stacks: a survey. In: 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1–4. IEEE (2011)
32.
Zurück zum Zitat Pongle, P., Chavan, G.: A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 International Conference on Pervasive Computing (ICPC), pp. 1–6. IEEE (2015) Pongle, P., Chavan, G.: A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 International Conference on Pervasive Computing (ICPC), pp. 1–6. IEEE (2015)
33.
Zurück zum Zitat Verma, A., Ranga, V.: Security of RPL based 6LoWPAN networks in the internet of things: a review. IEEE Sens. J. 20(11), 5666–5690 (2020)CrossRef Verma, A., Ranga, V.: Security of RPL based 6LoWPAN networks in the internet of things: a review. IEEE Sens. J. 20(11), 5666–5690 (2020)CrossRef
34.
Zurück zum Zitat Pasikhani, A.M., Clark, J.A., Gope, P., Alshahrani, A.: Intrusion detection systems in RPL-based 6LoWPAN: a systematic literature review. IEEE Sens. J. 21(11), 12940–12968 (2021) Pasikhani, A.M., Clark, J.A., Gope, P., Alshahrani, A.: Intrusion detection systems in RPL-based 6LoWPAN: a systematic literature review. IEEE Sens. J. 21(11), 12940–12968 (2021)
35.
Zurück zum Zitat Antwarg, L., Miller, R.M., Shapira, B., Rokach, L.: Explaining anomalies detected by autoencoders using Shapley additive explanations. Expert Syst. Appl. 186, 115736 (2021)CrossRef Antwarg, L., Miller, R.M., Shapira, B., Rokach, L.: Explaining anomalies detected by autoencoders using Shapley additive explanations. Expert Syst. Appl. 186, 115736 (2021)CrossRef
37.
Zurück zum Zitat Verma, A., Ranga, V.: RPL-NIDDS17-A data set for intrusion detection in RPL based 6LoWPAN networks (Internet of Things). Int. J. Grid Distrib. Comput. 11(8), 43–56 (2018)CrossRef Verma, A., Ranga, V.: RPL-NIDDS17-A data set for intrusion detection in RPL based 6LoWPAN networks (Internet of Things). Int. J. Grid Distrib. Comput. 11(8), 43–56 (2018)CrossRef
Metadaten
Titel
A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks
verfasst von
Pradeepkumar Bhale
Santosh Biswas
Sukumar Nandi
Publikationsdatum
02.11.2023
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Information Security / Ausgabe 2/2024
Print ISSN: 1615-5262
Elektronische ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-023-00763-2

Weitere Artikel der Ausgabe 2/2024

International Journal of Information Security 2/2024 Zur Ausgabe

Premium Partner