Skip to main content
Erschienen in:

18.04.2024

A novel RPL defense mechanism based on trust and deep learning for internet of things

verfasst von: Khatereh Ahmadi, Reza Javidan

Erschienen in: The Journal of Supercomputing | Ausgabe 12/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Along with the significant growth of applications and facilities provided by the Internet of Things (IoT) in recent years, security challenges and related issues to privacy become considerable interest of researchers. On the other hand, the de facto IoT routing protocol for low-power and lossy networks called RPL is vulnerable to various types of routing attacks. Many researchers have investigated RPL security solutions focusing on effective detection of prevalent and destructive routing attacks such as blackhole attack, selective forwarding attack, rank attack and so on. Recent studies are proposing trust-based mechanisms with the aim of replacing traditional cryptography-based operations with lightweight security models in order to cover the inherent challenges of IoT devices, including energy and computational limitations. Therefore, in this paper, focusing on the problem of RPL vulnerability against well-known routing attacks, we have proposed a trust-based attack detection model, which investigates traffic behavior in different attack scenarios and detects malicious nodes relying on behavior deviation exactly at the same time as the start of any attack activity. Expected behavior is predicted by our learning model trained from the historical routing behavior pattern, using recurrent neural networks as a powerful deep learning method, which leads to attack detection with high-level accuracy and precision. Both mathematical analysis and simulation results on multiple RPL attack scenarios show clearly that the proposed trust-based defense mechanism is an effective approach capable of timely and precisely detection of routing behavior pattern deviation of malicious nodes exactly at the start time of the attack occurrence, which leads to attack detection and attacker identification based on trust scores extracted from the detected fluctuations between expected and real routing behavior patterns.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Fußnoten
1
Machine to Machine.
 
2
Low power and lossy networks.
 
3
Packet Forwarding Ratio.
 
4
DODAG Information Solicitation.
 
5
K-Nearest Neighbor.
 
Literatur
1.
Zurück zum Zitat Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645–1660CrossRef Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645–1660CrossRef
2.
Zurück zum Zitat Ammar M, Russello G, Crispo B (2018) Internet of things: a survey on the security of IoT frameworks. J Inf Secur Appl 38:8–27 Ammar M, Russello G, Crispo B (2018) Internet of things: a survey on the security of IoT frameworks. J Inf Secur Appl 38:8–27
3.
Zurück zum Zitat Winter T, Thubert P, Brandt A et al (2012) RPL: IPv6 Routing Protocol for Low Power and Lossy Networks. RFC 6550, Int Eng Task Force Winter T, Thubert P, Brandt A et al (2012) RPL: IPv6 Routing Protocol for Low Power and Lossy Networks. RFC 6550, Int Eng Task Force
4.
Zurück zum Zitat Medjek F, Tanjaoui D, Romdhani I, DJedjig N (2018) Security threats in the internet of things: RPL’s attacks and countermeasures. In: Security and Privacy in Smart Sensor Networks, IGI Global, pp 147–178 Medjek F, Tanjaoui D, Romdhani I, DJedjig N (2018) Security threats in the internet of things: RPL’s attacks and countermeasures. In: Security and Privacy in Smart Sensor Networks, IGI Global, pp 147–178
5.
Zurück zum Zitat Muzammal SM, Murugesan RK, Jhanjhi NZ (2021) A comprehensive review on secure routing in internet of things: mitigation methods and trust-based approaches. IEEE Internet Things J 8:4186–4210CrossRef Muzammal SM, Murugesan RK, Jhanjhi NZ (2021) A comprehensive review on secure routing in internet of things: mitigation methods and trust-based approaches. IEEE Internet Things J 8:4186–4210CrossRef
6.
Zurück zum Zitat Yavuz FY, Unal D, Gul E (2018) Deep learning for detection of routing attacks in the internet of things. Int J Comput Intell Syst 12:39–58CrossRef Yavuz FY, Unal D, Gul E (2018) Deep learning for detection of routing attacks in the internet of things. Int J Comput Intell Syst 12:39–58CrossRef
7.
Zurück zum Zitat Medjek F, Tanjaoui D, Romdhani I, Djedjig N (2020) Trust-aware and cooperative routing protocol for IoT security. J Inf Secur Appl 52:102467 Medjek F, Tanjaoui D, Romdhani I, Djedjig N (2020) Trust-aware and cooperative routing protocol for IoT security. J Inf Secur Appl 52:102467
8.
Zurück zum Zitat Airehrour D, Gutierrez J, Ray SK (2016) Securing RPL routing protocol from blackhole attacks using a trust-based mechanism. In: 2016 26th International Telecommunication Networks and Applications Conference (ITNAC) Airehrour D, Gutierrez J, Ray SK (2016) Securing RPL routing protocol from blackhole attacks using a trust-based mechanism. In: 2016 26th International Telecommunication Networks and Applications Conference (ITNAC)
9.
Zurück zum Zitat Airehrour D, Gutierrez J, Ray SK (2017) A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks. Aust J Telecommun Digit Econ 5(1):50–69 Airehrour D, Gutierrez J, Ray SK (2017) A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks. Aust J Telecommun Digit Econ 5(1):50–69
10.
Zurück zum Zitat Jyothisree MVR, Sreekanth S (2019) Attacks in RPL and detection technique used for internet of things. Int J Recent Technol Eng (IJRTE) 8(1):1876–1879 Jyothisree MVR, Sreekanth S (2019) Attacks in RPL and detection technique used for internet of things. Int J Recent Technol Eng (IJRTE) 8(1):1876–1879
11.
Zurück zum Zitat Jiang J, Liu Y (2022) Secure IoT routing: selective forwarding attacks and trust-based defenses in RPL network. Networking and Internet Architecture (cs.NI) Jiang J, Liu Y (2022) Secure IoT routing: selective forwarding attacks and trust-based defenses in RPL network. Networking and Internet Architecture (cs.NI)
12.
Zurück zum Zitat Kiran V, Sardana A, Kaur P et al (2022) Defending against DDoS attacks in RPL using subjective logic based trust approach for IOT. In: 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) Kiran V, Sardana A, Kaur P et al (2022) Defending against DDoS attacks in RPL using subjective logic based trust approach for IOT. In: 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)
13.
Zurück zum Zitat Loulianou PP, Vassilakis VG, Shahandashti SF (2022) A trust-based intrusion detection system for RPL networks: detecting a combination of rank and blackhole attacks. J Cyber Secur Priv 2(1):124–153 Loulianou PP, Vassilakis VG, Shahandashti SF (2022) A trust-based intrusion detection system for RPL networks: detecting a combination of rank and blackhole attacks. J Cyber Secur Priv 2(1):124–153
14.
Zurück zum Zitat Azzedin F (2023) Mitigating denial of service attacks in RPL-based IoT environments: trust-based approach. IEEE Access 11:129077–129089CrossRef Azzedin F (2023) Mitigating denial of service attacks in RPL-based IoT environments: trust-based approach. IEEE Access 11:129077–129089CrossRef
15.
Zurück zum Zitat Diro AA, Chilamkurti M (2018) Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener Comput Syst 82:761–768CrossRef Diro AA, Chilamkurti M (2018) Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener Comput Syst 82:761–768CrossRef
16.
Zurück zum Zitat Campos EM, Saura PF et al. (2021) Evaluating federated learning for intrusion detection in internet of things: review and challenges. Comput Sci, Mach Learn Campos EM, Saura PF et al. (2021) Evaluating federated learning for intrusion detection in internet of things: review and challenges. Comput Sci, Mach Learn
17.
Zurück zum Zitat Rahman MA, Asyhari AT et al (2020) Scalable machine learning-based intrusion detection system for IoT-enabled smart cities. Sustain Cities Soc 61:102324CrossRef Rahman MA, Asyhari AT et al (2020) Scalable machine learning-based intrusion detection system for IoT-enabled smart cities. Sustain Cities Soc 61:102324CrossRef
18.
Zurück zum Zitat Zahra F, Jhanjhi NZ et al (2022) Rank and wormhole attack detection model for RPL-based internet of things using machine learning. In: Advances in IoT Privacy, Security and Applications Zahra F, Jhanjhi NZ et al (2022) Rank and wormhole attack detection model for RPL-based internet of things using machine learning. In: Advances in IoT Privacy, Security and Applications
19.
Zurück zum Zitat Neerugatti V, Reddy AR (2019) Machine learning based technique for detection of rank attack in RPL based internet of things networks. In: International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol 8 Neerugatti V, Reddy AR (2019) Machine learning based technique for detection of rank attack in RPL based internet of things networks. In: International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol 8
20.
Zurück zum Zitat Krari A, Hajami A, Jarmouni E (2023) Detecting the RPL version number attack in IoT Networks using Deep Learning Models. Int J Adv Comput Sci Appl 14(10) Krari A, Hajami A, Jarmouni E (2023) Detecting the RPL version number attack in IoT Networks using Deep Learning Models. Int J Adv Comput Sci Appl 14(10)
21.
Zurück zum Zitat Ma W, Wang X, Hu M, Zhou AQ (2021) Machine learning empowered trust evaluation method for IoT devices. IEEE Access 9:65066–65077CrossRef Ma W, Wang X, Hu M, Zhou AQ (2021) Machine learning empowered trust evaluation method for IoT devices. IEEE Access 9:65066–65077CrossRef
22.
Zurück zum Zitat Prathapchandran K, Janani T (2021) A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest—RFTRUST. Comput Netw 198:108413CrossRef Prathapchandran K, Janani T (2021) A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest—RFTRUST. Comput Netw 198:108413CrossRef
23.
Zurück zum Zitat Rutravigneshwaran P, Anitha G, Prathapchandran K (2024) Trust-based support vector regressive (TSVR) security mechanism to identify malicious nodes in the Internet of Battlefield Things (IoBT). Int J Syst Assur Eng Manag 15:287–299CrossRef Rutravigneshwaran P, Anitha G, Prathapchandran K (2024) Trust-based support vector regressive (TSVR) security mechanism to identify malicious nodes in the Internet of Battlefield Things (IoBT). Int J Syst Assur Eng Manag 15:287–299CrossRef
24.
Zurück zum Zitat Ryu J, Kim S (2024) Trust system- and multiple verification technique-based method for detecting wormhole attacks in MANETs. IEEE Access 12:16266–16275CrossRef Ryu J, Kim S (2024) Trust system- and multiple verification technique-based method for detecting wormhole attacks in MANETs. IEEE Access 12:16266–16275CrossRef
25.
Zurück zum Zitat Sherstinsky A (2020) Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network. Phys D: Nonlinear Phenom 404:132306MathSciNetCrossRef Sherstinsky A (2020) Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network. Phys D: Nonlinear Phenom 404:132306MathSciNetCrossRef
26.
Zurück zum Zitat Lee L, Dai S, Cao Z (2019) Deep long short-term memory (LSTM) network with sliding-window approach in urban thermal analysis. In: IEEE International Conference on Communications in China Workshops (ICCC), September 2019. Lee L, Dai S, Cao Z (2019) Deep long short-term memory (LSTM) network with sliding-window approach in urban thermal analysis. In: IEEE International Conference on Communications in China Workshops (ICCC), September 2019.
27.
Zurück zum Zitat Heidarian A, Dinneen MJ (2016)A hybrid geometric approach for measuring similarity level among documents and document clustering. In: 2016 IEEE Second International Conference on Big Data Computing Service and Applications, IEEE Computer Society, 2016 Heidarian A, Dinneen MJ (2016)A hybrid geometric approach for measuring similarity level among documents and document clustering. In: 2016 IEEE Second International Conference on Big Data Computing Service and Applications, IEEE Computer Society, 2016
28.
Zurück zum Zitat Agiollo A, Conti M, Caliyar P, Lin T, Pajola L (2021) DETONAR: detection of routing attacks in RPL-based IoT. IEEE Trans Netw Serv Manag 18(2):1178–1190CrossRef Agiollo A, Conti M, Caliyar P, Lin T, Pajola L (2021) DETONAR: detection of routing attacks in RPL-based IoT. IEEE Trans Netw Serv Manag 18(2):1178–1190CrossRef
Metadaten
Titel
A novel RPL defense mechanism based on trust and deep learning for internet of things
verfasst von
Khatereh Ahmadi
Reza Javidan
Publikationsdatum
18.04.2024
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 12/2024
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-024-06118-5