F. Zahra
Rank and wormhole attack detection model for RPL-based Internet of Things using machine learning
Zahra, F.; Jhanjhi, N. Z.; Brohi, Sarfraz Nawaz; Khan, Navid; Masud, Mehedi; AlZain, Mohammed A.
Authors
N. Z. Jhanjhi
Sarfraz Nawaz Brohi
Navid Khan
Mehedi Masud
Mohammed A. AlZain
Abstract
The proliferation of the internet of things (IoT) technology has led to numerous challenges in various life domains, such as healthcare, smart systems, and mission-critical applications. The most critical issue is the security of IoT nodes, networks, and infrastructures. IoT uses the routing protocol for low-power and lossy networks (RPL) for data communication among the devices. RPL comprises a lightweight core and thus does not support high computation and resource-consuming methods for security implementation. Therefore, both IoT and RPL are vulnerable to security attacks, which are broadly categorized into RPL-specific and sensor-network-inherited attacks. Among the most concerning protocol-specific attacks are rank attacks and wormhole attacks in sensor-network-inherited attack types. They target the RPL resources and components including control messages, repair mechanisms, routing topologies, and sensor network resources by consuming. This leads to the collapse of IoT infrastructure. In this paper, a lightweight multiclass classification-based RPL-specific and sensor-network-inherited attack detection model called MC-MLGBM is proposed. A novel dataset was generated through the construction of various network models to address the unavailability of the required dataset, optimal feature selection to improve model performance, and a light gradient boosting machine-based algorithm optimized for a multiclass classification-based attack detection. The results of extensive experiments are demonstrated through several metrics including confusion matrix, accuracy, precision, and recall. For further performance evaluation and to remove any bias, the multiclass-specific metrics were also used to evaluate the model, including cross-entropy, Cohn’s kappa, and Matthews correlation coefficient, and then compared with benchmark research.
Journal Article Type | Article |
---|---|
Acceptance Date | Aug 26, 2022 |
Online Publication Date | Sep 7, 2022 |
Publication Date | Sep 7, 2022 |
Deposit Date | Sep 9, 2022 |
Publicly Available Date | Sep 12, 2022 |
Journal | Sensors |
Electronic ISSN | 1424-8220 |
Publisher | MDPI |
Peer Reviewed | Peer Reviewed |
Volume | 22 |
Issue | 18 |
Article Number | 6765 |
Pages | 1 - 17 |
Series Title | Advances in IoT Privacy, Security and Applications |
Series ISSN | 1424-8220 |
DOI | https://doi.org/10.3390/s22186765 |
Keywords | RPL routing protocol; internet of things; RPL attacks; protocol-specific attacks; SN-inherited attacks; attack detection; machine learning |
Public URL | https://uwe-repository.worktribe.com/output/9953784 |
Publisher URL | https://www.mdpi.com/1424-8220/22/18/6765 |
Related Public URLs | https://www.mdpi.com/journal/sensors/special_issues/V5J48R2WD5 |
Files
Rank and wormhole attack detection model for RPL-based Internet of Things using machine learning
(2.1 Mb)
PDF
Licence
http://creativecommons.org/licenses/by/4.0/
Publisher Licence URL
http://creativecommons.org/licenses/by/4.0/
You might also like
UAV’s applications, architecture, security issues and attack scenarios: A survey
(2020)
Book Chapter
A three-level ransomware detection and prevention mechanism
(2020)
Journal Article
A data tracking and monitoring mechanism
(2020)
Book Chapter
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search