Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 1/2022

29-10-2021

An autonomous intrusion detection system for the RPL protocol

Authors: Mohammad Shirafkan, Ali Shahidienjad, Mostafa Ghobaei-Arani

Published in: Peer-to-Peer Networking and Applications | Issue 1/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Routing Protocol for Low-Power and Lossy Networks (RPL) is a proactive routing protocol for wireless networks based on distance vectors operating on the platform of IEEE 802.15 (a working group of the Institute of Electrical and Electronics Engineers (IEEE) IEEE 802 standards committee). Various approaches have been proposed to detect intrusions in the RPL, often accompanied by problems such as inaccuracy and high error in intrusion detection. Therefore, in this paper, a combination of the hierarchical semantic approach and the Group Method of Data Handling (GMDH) neural network algorithm was used to detect intrusions. The hierarchical semantic approach, which is based on the conversion of infiltration values into meaningful numbers, and the selection of influential variables in the infiltration of the Internet of Things can significantly affect intrusion detection. The GMDH algorithm also produces a model based on the neural network with hidden layers. It also learns from past events and identifies possible intrusions that may occur in the future. The results obtained in the proposed model were compared with the results of other methods. It was observed that the accuracy of the proposed method improved by about 20%.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Paul PV, Saraswathi R (2017) The Internet of Things—A comprehensive survey. In Computation of Power, Energy Information and Communication (ICCPEIC), 2017 International Conference on (pp. 421–426). IEEE‏ Paul PV, Saraswathi R (2017) The Internet of Things—A comprehensive survey. In Computation of Power, Energy Information and Communication (ICCPEIC), 2017 International Conference on (pp. 421–426). IEEE‏
2.
go back to reference Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W (2017) A survey on Internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J 4(5):1125–1142CrossRef Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W (2017) A survey on Internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J 4(5):1125–1142CrossRef
3.
go back to reference Xia F, Yang LT, Wang L, Vinel A (2012) Internet of things. Int J Commun Syst 25(9):1101–1102CrossRef Xia F, Yang LT, Wang L, Vinel A (2012) Internet of things. Int J Commun Syst 25(9):1101–1102CrossRef
4.
go back to reference Winter T, Thubert P, Brandt A, Hui J, Kelsey R, Levis P, Pister K, Struik R, Vasseur J, Alexander R (2012) RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks, RFC 6550 (Proposed Standard). Internet Engineering Task Force Winter T, Thubert P, Brandt A, Hui J, Kelsey R, Levis P, Pister K, Struik R, Vasseur J, Alexander R (2012) RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks, RFC 6550 (Proposed Standard). Internet Engineering Task Force
5.
go back to reference Zhang L, Feng G, Qin, S (2015) Intrusion detection system for RPL from routing choice intrusion. In 2015 IEEE International Conference on Communication Workshop (ICCW) (pp. 2652–2658). IEEE Zhang L, Feng G, Qin, S (2015) Intrusion detection system for RPL from routing choice intrusion. In 2015 IEEE International Conference on Communication Workshop (ICCW) (pp. 2652–2658). IEEE
6.
go back to reference Patel HB, Jinwala DC, Patel DR (2016) Baseline intrusion detection framework for 6lowpan devices. In Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services (pp. 72–76). ACM Patel HB, Jinwala DC, Patel DR (2016) Baseline intrusion detection framework for 6lowpan devices. In Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services (pp. 72–76). ACM
7.
go back to reference Mayzaud A, Badonnel R, Chrisment I (2016) A Taxonomy of Attacks in RPL-based Internet of Things Mayzaud A, Badonnel R, Chrisment I (2016) A Taxonomy of Attacks in RPL-based Internet of Things
8.
go back to reference Mayzaud A, Badonnel R, Chrisment I (2016) Detecting version number attacks in RPL-based networks using a distributed monitoring architecture. In 2016 12th International Conference on Network and Service Management (CNSM) (pp. 127–135). IEEE Mayzaud A, Badonnel R, Chrisment I (2016) Detecting version number attacks in RPL-based networks using a distributed monitoring architecture. In 2016 12th International Conference on Network and Service Management (CNSM) (pp. 127–135). IEEE
9.
go back to reference Le A, Loo J, Chai KK, Aiash M (2016) A specification-based IDS for detecting attacks on RPL-based network topology. Information 7(2):25CrossRef Le A, Loo J, Chai KK, Aiash M (2016) A specification-based IDS for detecting attacks on RPL-based network topology. Information 7(2):25CrossRef
10.
go back to reference Glissa G, Rachedi A, Meddeb A (2016) A secure routing protocol based on RPL for Internet of Things. In 2016 IEEE Global Communications Conference (GLOBECOM) (pp. 1–7). IEEE Glissa G, Rachedi A, Meddeb A (2016) A secure routing protocol based on RPL for Internet of Things. In 2016 IEEE Global Communications Conference (GLOBECOM) (pp. 1–7). IEEE
11.
go back to reference Kamble A, Malemath VS, Patil D (2017) Security attacks and secure routing protocols in RPL-based Internet of Things: Survey. In 2017 International Conference on Emerging Trends & Innovation in ICT (ICEI) (pp. 33–39). IEEE Kamble A, Malemath VS, Patil D (2017) Security attacks and secure routing protocols in RPL-based Internet of Things: Survey. In 2017 International Conference on Emerging Trends & Innovation in ICT (ICEI) (pp. 33–39). IEEE
12.
go back to reference Kim HS, Ko J, Culler DE, Paek J (2017) Challenging the IPv6 routing protocol for low-power and lossy networks (RPL): A survey. IEEE Communications Surveys & Tutorials 19(4):2502–2525CrossRef Kim HS, Ko J, Culler DE, Paek J (2017) Challenging the IPv6 routing protocol for low-power and lossy networks (RPL): A survey. IEEE Communications Surveys & Tutorials 19(4):2502–2525CrossRef
13.
go back to reference Ghaleb B, Al-Dubai A, Ekonomou E, Wadhaj I (2017) A new enhanced RPL based routing for Internet of Things. In 2017 IEEE International Conference on Communications Workshops (ICC Workshops) (pp. 595–600). IEEE Ghaleb B, Al-Dubai A, Ekonomou E, Wadhaj I (2017) A new enhanced RPL based routing for Internet of Things. In 2017 IEEE International Conference on Communications Workshops (ICC Workshops) (pp. 595–600). IEEE
14.
go back to reference Shukla P (2017) ML-IDS: A machine learning approach to detect wormhole attacks in Internet of Things. In 2017 Intelligent Systems Conference (IntelliSys) (pp. 234–240). IEEE Shukla P (2017) ML-IDS: A machine learning approach to detect wormhole attacks in Internet of Things. In 2017 Intelligent Systems Conference (IntelliSys) (pp. 234–240). IEEE
15.
go back to reference Shreenivas D, Raza S, Voigt T (2017) Intrusion Detection in the RPL-connected 6LoWPAN Networks. In Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security (pp. 31–38). ACM Shreenivas D, Raza S, Voigt T (2017) Intrusion Detection in the RPL-connected 6LoWPAN Networks. In Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security (pp. 31–38). ACM
16.
go back to reference Sousa N, Sobral JV, Rodrigues JJ, Rabêlo RA, Solic P (2017) ERAOF: A new RPL protocol thingsive function for Internet of Things applications. In 2017 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech) (pp. 1–5). IEEE Sousa N, Sobral JV, Rodrigues JJ, Rabêlo RA, Solic P (2017) ERAOF: A new RPL protocol thingsive function for Internet of Things applications. In 2017 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech) (pp. 1–5). IEEE
17.
go back to reference Alvi SA, ul Hassan F, Mian AN (2017) On the energy efficiency and stability of RPL routing protocol. In 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC) (pp. 1927–1932). IEEE Alvi SA, ul Hassan F, Mian AN (2017) On the energy efficiency and stability of RPL routing protocol. In 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC) (pp. 1927–1932). IEEE
18.
go back to reference Kim HS, Kim H, Paek J, Bahk S (2016) Load balancing under heavy traffic in RPL routing protocol for low power and lossy networks. IEEE Trans Mob Comput 16(4):964–979CrossRef Kim HS, Kim H, Paek J, Bahk S (2016) Load balancing under heavy traffic in RPL routing protocol for low power and lossy networks. IEEE Trans Mob Comput 16(4):964–979CrossRef
19.
go back to reference Nikravan M, Movaghar A, Hosseinzadeh M (2018) A lightweight defense approach to mitigate version number and rank attacks in low-power and lossy networks. Wireless Pers Commun 99(2):1035–1059CrossRef Nikravan M, Movaghar A, Hosseinzadeh M (2018) A lightweight defense approach to mitigate version number and rank attacks in low-power and lossy networks. Wireless Pers Commun 99(2):1035–1059CrossRef
20.
go back to reference Airehrour D, Gutierrez JA, Ray SK (2019) SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Futur Gener Comput Syst 93:860–876CrossRef Airehrour D, Gutierrez JA, Ray SK (2019) SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Futur Gener Comput Syst 93:860–876CrossRef
21.
go back to reference Arış A, Yalçın SBÖ, Oktuğ SF (2019) New lightweight mitigation techniques for RPL version number attacks. Ad Hoc Netw 85:81–91CrossRef Arış A, Yalçın SBÖ, Oktuğ SF (2019) New lightweight mitigation techniques for RPL version number attacks. Ad Hoc Netw 85:81–91CrossRef
22.
go back to reference Hashemi SY, Aliee FS (2019) Dynamic and comprehensive trust model for IoT and its integration into RPL. J Supercomput 75(7):3555–3584CrossRef Hashemi SY, Aliee FS (2019) Dynamic and comprehensive trust model for IoT and its integration into RPL. J Supercomput 75(7):3555–3584CrossRef
23.
go back to reference Bhalaji N, Hariharasudan KS, Aashika K (2019) A Trust-Based Mechanism to Combat Blackhole Attack in RPL Protocol. In International Conference on Intelligent Computing and Communication Technologies (pp. 457–464). Springer, Singapore Bhalaji N, Hariharasudan KS, Aashika K (2019) A Trust-Based Mechanism to Combat Blackhole Attack in RPL Protocol. In International Conference on Intelligent Computing and Communication Technologies (pp. 457–464). Springer, Singapore
24.
go back to reference Kfoury E, Saab J, Younes P, Achkar R (2019) A Self Organizing Map Intrusion Detection System for RPL Protocol Attacks. International Journal of Interdisciplinary Telecommunications and Networking (IJITN) 11(1):30–43CrossRef Kfoury E, Saab J, Younes P, Achkar R (2019) A Self Organizing Map Intrusion Detection System for RPL Protocol Attacks. International Journal of Interdisciplinary Telecommunications and Networking (IJITN) 11(1):30–43CrossRef
25.
go back to reference Tsvetkov T, Klein A (2011) RPL: IPv6 routing protocol for low power and lossy networks. Network 59‏ Tsvetkov T, Klein A (2011) RPL: IPv6 routing protocol for low power and lossy networks. Network 59‏
26.
go back to reference Barthel D, Pister K, Dejean N, Vasseur JP, Kim M (2012) Routing metrics used for path calculation in low-power and lossy networks‏ Barthel D, Pister K, Dejean N, Vasseur JP, Kim M (2012) Routing metrics used for path calculation in low-power and lossy networks‏
27.
go back to reference Çelik M, Dadaşer-Çelik F, Dokuz AŞ (2011) Anomaly detection in temperature data using dbscan algorithm. In 2011 International Symposium on Innovations in Intelligent Systems and Applications (pp. 91–95), IEEE Çelik M, Dadaşer-Çelik F, Dokuz AŞ (2011) Anomaly detection in temperature data using dbscan algorithm. In 2011 International Symposium on Innovations in Intelligent Systems and Applications (pp. 91–95), IEEE
28.
go back to reference Mayzaud A, Sehgal A, Badonnel R, Chrisment I, Schönwälder J (2015) Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks. Int J Network Manage 25(5):320–339CrossRef Mayzaud A, Sehgal A, Badonnel R, Chrisment I, Schönwälder J (2015) Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks. Int J Network Manage 25(5):320–339CrossRef
29.
go back to reference Farlow SJ (1981) The GMDH algorithm of Ivakhnenko. Am Stat 35(4):210–215 Farlow SJ (1981) The GMDH algorithm of Ivakhnenko. Am Stat 35(4):210–215
30.
go back to reference Aydogan E, Yilmaz S, Sen S, Butun I, Forsström S, Gidlund M (2019) A Central Intrusion Detection System for RPL-Based Industrial Internet of Things. In 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS) (pp. 1–5). IEEE Aydogan E, Yilmaz S, Sen S, Butun I, Forsström S, Gidlund M (2019) A Central Intrusion Detection System for RPL-Based Industrial Internet of Things. In 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS) (pp. 1–5). IEEE
31.
go back to reference Hinton GE, Osindero S, Teh YW (2006) A fast learning algorithm for deep belief nets. Neural Comput 18(7):1527–1554MathSciNetCrossRef Hinton GE, Osindero S, Teh YW (2006) A fast learning algorithm for deep belief nets. Neural Comput 18(7):1527–1554MathSciNetCrossRef
32.
go back to reference Bagheri A, NARIMANZADEH N, Siavash AS, Khoobkar AR (2005) Gmdh type neural networks and their application to the identification of the inverse kinematics equations of robotic manipulators (research note) Bagheri A, NARIMANZADEH N, Siavash AS, Khoobkar AR (2005) Gmdh type neural networks and their application to the identification of the inverse kinematics equations of robotic manipulators (research note)
33.
go back to reference Birant D, Kut A (2007) ST-DBSCAN: An algorithm for clustering spatial-temporal data. Data Knowl Eng 60(1):208–221CrossRef Birant D, Kut A (2007) ST-DBSCAN: An algorithm for clustering spatial-temporal data. Data Knowl Eng 60(1):208–221CrossRef
34.
go back to reference Smys S, Basar A, Wang H (2020) Hybrid intrusion detection system for Internet of Things (IoT). Journal of ISMAC 2(04):190–199CrossRef Smys S, Basar A, Wang H (2020) Hybrid intrusion detection system for Internet of Things (IoT). Journal of ISMAC 2(04):190–199CrossRef
Metadata
Title
An autonomous intrusion detection system for the RPL protocol
Authors
Mohammad Shirafkan
Ali Shahidienjad
Mostafa Ghobaei-Arani
Publication date
29-10-2021
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 1/2022
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-021-01255-7

Other articles of this Issue 1/2022

Peer-to-Peer Networking and Applications 1/2022 Go to the issue

Premium Partner