Skip to main content
Top
Published in:

18-04-2024

A novel RPL defense mechanism based on trust and deep learning for internet of things

Authors: Khatereh Ahmadi, Reza Javidan

Published in: The Journal of Supercomputing | Issue 12/2024

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Along with the significant growth of applications and facilities provided by the Internet of Things (IoT) in recent years, security challenges and related issues to privacy become considerable interest of researchers. On the other hand, the de facto IoT routing protocol for low-power and lossy networks called RPL is vulnerable to various types of routing attacks. Many researchers have investigated RPL security solutions focusing on effective detection of prevalent and destructive routing attacks such as blackhole attack, selective forwarding attack, rank attack and so on. Recent studies are proposing trust-based mechanisms with the aim of replacing traditional cryptography-based operations with lightweight security models in order to cover the inherent challenges of IoT devices, including energy and computational limitations. Therefore, in this paper, focusing on the problem of RPL vulnerability against well-known routing attacks, we have proposed a trust-based attack detection model, which investigates traffic behavior in different attack scenarios and detects malicious nodes relying on behavior deviation exactly at the same time as the start of any attack activity. Expected behavior is predicted by our learning model trained from the historical routing behavior pattern, using recurrent neural networks as a powerful deep learning method, which leads to attack detection with high-level accuracy and precision. Both mathematical analysis and simulation results on multiple RPL attack scenarios show clearly that the proposed trust-based defense mechanism is an effective approach capable of timely and precisely detection of routing behavior pattern deviation of malicious nodes exactly at the start time of the attack occurrence, which leads to attack detection and attacker identification based on trust scores extracted from the detected fluctuations between expected and real routing behavior patterns.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Footnotes
1
Machine to Machine.
 
2
Low power and lossy networks.
 
3
Packet Forwarding Ratio.
 
4
DODAG Information Solicitation.
 
5
K-Nearest Neighbor.
 
Literature
1.
go back to reference Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645–1660CrossRef Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645–1660CrossRef
2.
go back to reference Ammar M, Russello G, Crispo B (2018) Internet of things: a survey on the security of IoT frameworks. J Inf Secur Appl 38:8–27 Ammar M, Russello G, Crispo B (2018) Internet of things: a survey on the security of IoT frameworks. J Inf Secur Appl 38:8–27
3.
go back to reference Winter T, Thubert P, Brandt A et al (2012) RPL: IPv6 Routing Protocol for Low Power and Lossy Networks. RFC 6550, Int Eng Task Force Winter T, Thubert P, Brandt A et al (2012) RPL: IPv6 Routing Protocol for Low Power and Lossy Networks. RFC 6550, Int Eng Task Force
4.
go back to reference Medjek F, Tanjaoui D, Romdhani I, DJedjig N (2018) Security threats in the internet of things: RPL’s attacks and countermeasures. In: Security and Privacy in Smart Sensor Networks, IGI Global, pp 147–178 Medjek F, Tanjaoui D, Romdhani I, DJedjig N (2018) Security threats in the internet of things: RPL’s attacks and countermeasures. In: Security and Privacy in Smart Sensor Networks, IGI Global, pp 147–178
5.
go back to reference Muzammal SM, Murugesan RK, Jhanjhi NZ (2021) A comprehensive review on secure routing in internet of things: mitigation methods and trust-based approaches. IEEE Internet Things J 8:4186–4210CrossRef Muzammal SM, Murugesan RK, Jhanjhi NZ (2021) A comprehensive review on secure routing in internet of things: mitigation methods and trust-based approaches. IEEE Internet Things J 8:4186–4210CrossRef
6.
go back to reference Yavuz FY, Unal D, Gul E (2018) Deep learning for detection of routing attacks in the internet of things. Int J Comput Intell Syst 12:39–58CrossRef Yavuz FY, Unal D, Gul E (2018) Deep learning for detection of routing attacks in the internet of things. Int J Comput Intell Syst 12:39–58CrossRef
7.
go back to reference Medjek F, Tanjaoui D, Romdhani I, Djedjig N (2020) Trust-aware and cooperative routing protocol for IoT security. J Inf Secur Appl 52:102467 Medjek F, Tanjaoui D, Romdhani I, Djedjig N (2020) Trust-aware and cooperative routing protocol for IoT security. J Inf Secur Appl 52:102467
8.
go back to reference Airehrour D, Gutierrez J, Ray SK (2016) Securing RPL routing protocol from blackhole attacks using a trust-based mechanism. In: 2016 26th International Telecommunication Networks and Applications Conference (ITNAC) Airehrour D, Gutierrez J, Ray SK (2016) Securing RPL routing protocol from blackhole attacks using a trust-based mechanism. In: 2016 26th International Telecommunication Networks and Applications Conference (ITNAC)
9.
go back to reference Airehrour D, Gutierrez J, Ray SK (2017) A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks. Aust J Telecommun Digit Econ 5(1):50–69 Airehrour D, Gutierrez J, Ray SK (2017) A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks. Aust J Telecommun Digit Econ 5(1):50–69
10.
go back to reference Jyothisree MVR, Sreekanth S (2019) Attacks in RPL and detection technique used for internet of things. Int J Recent Technol Eng (IJRTE) 8(1):1876–1879 Jyothisree MVR, Sreekanth S (2019) Attacks in RPL and detection technique used for internet of things. Int J Recent Technol Eng (IJRTE) 8(1):1876–1879
11.
go back to reference Jiang J, Liu Y (2022) Secure IoT routing: selective forwarding attacks and trust-based defenses in RPL network. Networking and Internet Architecture (cs.NI) Jiang J, Liu Y (2022) Secure IoT routing: selective forwarding attacks and trust-based defenses in RPL network. Networking and Internet Architecture (cs.NI)
12.
go back to reference Kiran V, Sardana A, Kaur P et al (2022) Defending against DDoS attacks in RPL using subjective logic based trust approach for IOT. In: 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) Kiran V, Sardana A, Kaur P et al (2022) Defending against DDoS attacks in RPL using subjective logic based trust approach for IOT. In: 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)
13.
go back to reference Loulianou PP, Vassilakis VG, Shahandashti SF (2022) A trust-based intrusion detection system for RPL networks: detecting a combination of rank and blackhole attacks. J Cyber Secur Priv 2(1):124–153 Loulianou PP, Vassilakis VG, Shahandashti SF (2022) A trust-based intrusion detection system for RPL networks: detecting a combination of rank and blackhole attacks. J Cyber Secur Priv 2(1):124–153
14.
go back to reference Azzedin F (2023) Mitigating denial of service attacks in RPL-based IoT environments: trust-based approach. IEEE Access 11:129077–129089CrossRef Azzedin F (2023) Mitigating denial of service attacks in RPL-based IoT environments: trust-based approach. IEEE Access 11:129077–129089CrossRef
15.
go back to reference Diro AA, Chilamkurti M (2018) Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener Comput Syst 82:761–768CrossRef Diro AA, Chilamkurti M (2018) Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener Comput Syst 82:761–768CrossRef
16.
go back to reference Campos EM, Saura PF et al. (2021) Evaluating federated learning for intrusion detection in internet of things: review and challenges. Comput Sci, Mach Learn Campos EM, Saura PF et al. (2021) Evaluating federated learning for intrusion detection in internet of things: review and challenges. Comput Sci, Mach Learn
17.
go back to reference Rahman MA, Asyhari AT et al (2020) Scalable machine learning-based intrusion detection system for IoT-enabled smart cities. Sustain Cities Soc 61:102324CrossRef Rahman MA, Asyhari AT et al (2020) Scalable machine learning-based intrusion detection system for IoT-enabled smart cities. Sustain Cities Soc 61:102324CrossRef
18.
go back to reference Zahra F, Jhanjhi NZ et al (2022) Rank and wormhole attack detection model for RPL-based internet of things using machine learning. In: Advances in IoT Privacy, Security and Applications Zahra F, Jhanjhi NZ et al (2022) Rank and wormhole attack detection model for RPL-based internet of things using machine learning. In: Advances in IoT Privacy, Security and Applications
19.
go back to reference Neerugatti V, Reddy AR (2019) Machine learning based technique for detection of rank attack in RPL based internet of things networks. In: International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol 8 Neerugatti V, Reddy AR (2019) Machine learning based technique for detection of rank attack in RPL based internet of things networks. In: International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol 8
20.
go back to reference Krari A, Hajami A, Jarmouni E (2023) Detecting the RPL version number attack in IoT Networks using Deep Learning Models. Int J Adv Comput Sci Appl 14(10) Krari A, Hajami A, Jarmouni E (2023) Detecting the RPL version number attack in IoT Networks using Deep Learning Models. Int J Adv Comput Sci Appl 14(10)
21.
go back to reference Ma W, Wang X, Hu M, Zhou AQ (2021) Machine learning empowered trust evaluation method for IoT devices. IEEE Access 9:65066–65077CrossRef Ma W, Wang X, Hu M, Zhou AQ (2021) Machine learning empowered trust evaluation method for IoT devices. IEEE Access 9:65066–65077CrossRef
22.
go back to reference Prathapchandran K, Janani T (2021) A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest—RFTRUST. Comput Netw 198:108413CrossRef Prathapchandran K, Janani T (2021) A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest—RFTRUST. Comput Netw 198:108413CrossRef
23.
go back to reference Rutravigneshwaran P, Anitha G, Prathapchandran K (2024) Trust-based support vector regressive (TSVR) security mechanism to identify malicious nodes in the Internet of Battlefield Things (IoBT). Int J Syst Assur Eng Manag 15:287–299CrossRef Rutravigneshwaran P, Anitha G, Prathapchandran K (2024) Trust-based support vector regressive (TSVR) security mechanism to identify malicious nodes in the Internet of Battlefield Things (IoBT). Int J Syst Assur Eng Manag 15:287–299CrossRef
24.
go back to reference Ryu J, Kim S (2024) Trust system- and multiple verification technique-based method for detecting wormhole attacks in MANETs. IEEE Access 12:16266–16275CrossRef Ryu J, Kim S (2024) Trust system- and multiple verification technique-based method for detecting wormhole attacks in MANETs. IEEE Access 12:16266–16275CrossRef
25.
go back to reference Sherstinsky A (2020) Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network. Phys D: Nonlinear Phenom 404:132306MathSciNetCrossRef Sherstinsky A (2020) Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network. Phys D: Nonlinear Phenom 404:132306MathSciNetCrossRef
26.
go back to reference Lee L, Dai S, Cao Z (2019) Deep long short-term memory (LSTM) network with sliding-window approach in urban thermal analysis. In: IEEE International Conference on Communications in China Workshops (ICCC), September 2019. Lee L, Dai S, Cao Z (2019) Deep long short-term memory (LSTM) network with sliding-window approach in urban thermal analysis. In: IEEE International Conference on Communications in China Workshops (ICCC), September 2019.
27.
go back to reference Heidarian A, Dinneen MJ (2016)A hybrid geometric approach for measuring similarity level among documents and document clustering. In: 2016 IEEE Second International Conference on Big Data Computing Service and Applications, IEEE Computer Society, 2016 Heidarian A, Dinneen MJ (2016)A hybrid geometric approach for measuring similarity level among documents and document clustering. In: 2016 IEEE Second International Conference on Big Data Computing Service and Applications, IEEE Computer Society, 2016
28.
go back to reference Agiollo A, Conti M, Caliyar P, Lin T, Pajola L (2021) DETONAR: detection of routing attacks in RPL-based IoT. IEEE Trans Netw Serv Manag 18(2):1178–1190CrossRef Agiollo A, Conti M, Caliyar P, Lin T, Pajola L (2021) DETONAR: detection of routing attacks in RPL-based IoT. IEEE Trans Netw Serv Manag 18(2):1178–1190CrossRef
Metadata
Title
A novel RPL defense mechanism based on trust and deep learning for internet of things
Authors
Khatereh Ahmadi
Reza Javidan
Publication date
18-04-2024
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 12/2024
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-024-06118-5

Premium Partner