Reference Hub25
A Self Organizing Map Intrusion Detection System for RPL Protocol Attacks

A Self Organizing Map Intrusion Detection System for RPL Protocol Attacks

Elie Kfoury, Julien Saab, Paul Younes, Roger Achkar
Copyright: © 2019 |Volume: 11 |Issue: 1 |Pages: 14
ISSN: 1941-8663|EISSN: 1941-8671|EISBN13: 9781522565482|DOI: 10.4018/IJITN.2019010103
Cite Article Cite Article

MLA

Kfoury, Elie, et al. "A Self Organizing Map Intrusion Detection System for RPL Protocol Attacks." IJITN vol.11, no.1 2019: pp.30-43. http://doi.org/10.4018/IJITN.2019010103

APA

Kfoury, E., Saab, J., Younes, P., & Achkar, R. (2019). A Self Organizing Map Intrusion Detection System for RPL Protocol Attacks. International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 11(1), 30-43. http://doi.org/10.4018/IJITN.2019010103

Chicago

Kfoury, Elie, et al. "A Self Organizing Map Intrusion Detection System for RPL Protocol Attacks," International Journal of Interdisciplinary Telecommunications and Networking (IJITN) 11, no.1: 30-43. http://doi.org/10.4018/IJITN.2019010103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Routing over low power and lossy networks (RPL) is a standardized routing protocol for constrained Wireless Sensor Network (WSN) environments. The main node's constraints include processing capability, power, memory, and energy. RPL protocol describes how WSN nodes create a mesh topology, enabling them to route sensor data. Unfortunately, various attacks exist on the RPL protocol that can disrupt the topology and consume nodes' energy. In this article, the authors propose an intrusion detection system (IDS) based on self-organizing map (SOM) neural network to cluster the WSN routing attacks, and hence notify the system administrator at an early stage, reducing the risk of interrupting the network and consuming nodes' power. Results showed that the proposed SOM architecture is able to cluster routing packets into three different types of attacks, as well as clean data.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.