Fatima-tuz Zahra
Proposing a hybrid RPL protocol for rank and wormhole attack mitigation using machine learning
Zahra, Fatima-tuz; Jhanjhi, N. Z.; Brohi, Sarfraz; Malik, Nazir A.; Humayun, Mamoona
Authors
N. Z. Jhanjhi
Sarfraz Brohi
Nazir A. Malik
Mamoona Humayun
Abstract
Internet of Things have profoundly transformed the way technology is deployed today in different domains of life. However, its widescale implementation has also caused major security concerns in context of data communication because of escalating interconnectivity of resource-constrained smart devices. Due to the exacerbating security attack vulnerability, it has become necessary to address the issue of insecure routing in these devices. Low-power and lossy IoT networks on which they run commonly use RPL for routing due to its lightweight nature and compatibility for data transmission. However, RPL is prone to both WSN-inherited and RPL-specific attacks. Several existing solutions have addressed the detection of some of them. However, lack of mitigation techniques is observed which can extenuate attacks of both types such as wormhole as well as rank attack; when they are launched on an RPL-based network. Therefore, the aim of this study is to introduce RPL, its vulnerability to the two attacks, and the proposition that machine learning techniques like support vector machines can be effectively used to develop a secure and improved version of RPL for mitigation of both WSN-inherited and RPL-specific attacks in an RPL-based IoT network.
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | 2020 2nd International Conference on Computer and Information Sciences, ICCIS 2020 |
Start Date | Oct 13, 2020 |
End Date | Oct 15, 2020 |
Acceptance Date | Sep 18, 2020 |
Publication Date | Oct 13, 2020 |
Deposit Date | Sep 9, 2022 |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Book Title | 2020 2nd International Conference on Computer and Information Sciences (ICCIS) |
ISBN | 9781728154671 |
DOI | https://doi.org/10.1109/ICCIS49240.2020.9257607 |
Public URL | https://uwe-repository.worktribe.com/output/9942708 |
Publisher URL | https://ieeexplore.ieee.org/document/9257607 |
Related Public URLs | https://ieeexplore.ieee.org/xpl/conhome/9257596/proceeding |
You might also like
Quantum blockchain: Trends, technologies, and future directions
(2024)
Journal Article
Hardware vulnerabilities: Taxonomy and business security models
(2024)
Book Chapter
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search