Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

An Intrusion Detection System using Deep Cellular Learning Automata and Semantic Hierarchy for Enhancing RPL Protocol Security

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

The internet of things (IoT) is a collection of systems connected to an online network consisting of things. Routing Protocol for Low-Power and Lossy Networks (RPL) is a proactive routing protocol for wireless networks based on distance vectors. Several methods have been proposed for improving RPL protocol security, suffering from lack of accuracy, the authenticity of intrusion detection, and lack of scalability. Therefore, in this research, an intrusion detection system based on deep cellular learning automata and semantic hierarchy is developed to increase RPL protocol security. Semantic hierarchy is used to transform attack features into significant values, and deep cellular learning automata are employed to increase the security of the RPL protocol. Here five datasets related to attacks, including Darknet, “Version Number”, “NSL-KDD”, “Botnet”, and Distributed Denial of Service (DDoS), have been used. Comparing the proposed results on five datasets indicates that the proposed method outperforms its counterparts. Also, the proposed model has been tested on Blackhole, NID, and BoT-IoT datasets based on ANN and CNN's Deep Neural Network. The results of penetration detection accuracy of the proposed method on Blackhole datasets, NID, and BoT-IoT were 99.65%, 99.71%, and 93.75%, respectively, which improved by averages of 0.42% compared to ANN and 0.55% compared to CNN methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data Availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Ray, P.P.: A survey on Internet of Things architectures. J. King Saud Univ. Comput. Inf. Sci. 30(3), 291–319 (2018)

    Google Scholar 

  2. Qiu, T., Chen, N., Li, K., Atiquzzaman, M., Zhao, W.: How can heterogeneous internet of things build our future: A survey? IEEE Communications Surveys & Tutorials (2018)

  3. Sahay, R., Geethakumari, G., Mitra, B.: Mitigating the worst parent attack in RPL based internet of things. Clust. Comput. 25(2), 1303–1320 (2022)

    Article  Google Scholar 

  4. Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4(5), 1125–1142 (2017)

    Article  Google Scholar 

  5. Xia, F., Yang, L.T., Wang, L., Vinel, A.: Internet of things. Int. J. Commun Syst 25(9), 1101–1102 (2012)

    Article  Google Scholar 

  6. Ahmad, R., Alsmadi, I., Alhamdani, W., Tawalbeh, L.A.: Towards building data analytics benchmarks for IoT intrusion detection. Clust. Comput. 25(3), 2125–2141 (2022)

    Article  Google Scholar 

  7. Shahidinejad, A., Ghobaei-Arani, M., Souri, A., Shojafar, M., & Kumari, S. Light-edge: a lightweight authentication protocol for IoT devices in an edge-cloud environment. IEEE Consum. Electron. Mag. 11(2), 57–63 (2021)

    Article  Google Scholar 

  8. Heidari, A. and Jabraeil Jamali, M.A., 2022. Internet of Things intrusion detection systems: a comprehensive review and future directions. Cluster Computing, pp.1–28.

  9. Tofighy, S., Rahmanian, A.A., Ghobaei-Arani, M.: An ensemble CPU load prediction algorithm using a Bayesian information criterion and smooth filters in a cloud computing environment. Softw. Pract. Exp. 48(12), 2257–2277 (2018)

    Article  Google Scholar 

  10. Shreenivas, D., Raza, S., Voigt, T.: Intrusion detection in the RPL-connected 6LoWPAN networks. In: Proceedings of the 3rd ACM international workshop on IoT privacy, trust, and security (pp. 31–38). (2017, April)

  11. Aljarrah, E., Yassein, M.B., Aljawarneh, S.: Routing protocol of low-power and lossy network: Survey and open issues. In: 2016 International Conference on engineering & MIS (ICEMIS) (pp. 1–6). IEEE (2016)

  12. Pradhan, M., Nayak, C. K., & Pradhan, S. K. (2020). Intrusion detection system (IDS) and their types. In: Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications (pp. 481–497). IGI Global.

  13. Borkar, A., Donode, A., Kumari, A.: A survey on Intrusion Detection System (IDS) and Internal Intrusion Detection and protection system (IIDPS). In: 2017 International conference on inventive computing and informatics (ICICI) (pp. 949–953). IEEE (2017, November).

  14. Vinayakumar, R., Alazab, M., Soman, K.P., Poornachandran, P., Al-Nemrat, A., Venkatraman, S.: Deep learning approach for intelligent intrusion detection system. IEEE Access 7, 41525–41550 (2019)

    Article  Google Scholar 

  15. Karatas, G., Demir, O., Sahingoz, O.K.: Deep learning in intrusion detection systems. In: 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT) (pp. 113–116). IEEE (2018, December).

  16. Kim, H.S., Ko, J., Culler, D.E., Paek, J.: Challenging the IPv6 routing protocol for low-power and lossy networks (RPL): A survey. IEEE Commun. Surv. Tutor. 19(4), 2502–2525 (2017)

    Article  Google Scholar 

  17. Shukla, P.: ML-IDS: A machine learning approach to detect wormhole attacks in Internet of Things. In: 2017 Intelligent Systems Conference (IntelliSys) (pp. 234–240). IEEE (2017, September).

  18. Shreenivas, D., Raza, S., Voigt, T.: Intrusion Detection in the RPL-connected 6LoWPAN Networks. In: Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security (pp. 31–38). ACM (2017, April)

  19. Sousa, N., Sobral, J. V., Rodrigues, J. J., Rabêlo, R. A., & Solic, P. (2017, July). ERAOF: A new RPL protocol thingsive function for Internet of Things applications. In 2017 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech) (pp. 1–5). IEEE.

  20. Nikravan, M., Movaghar, A., Hosseinzadeh, M.: A lightweight defense approach to mitigate version number and rank attacks in low-power and lossy networks. Wirel. Pers. Commun. 99(2), 1035–1059 (2018)

    Article  Google Scholar 

  21. Airehrour, D., Gutierrez, J.A., Ray, S.K.: SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Futur. Gener. Comput. Syst. 93, 860–876 (2019)

    Article  Google Scholar 

  22. Arış, A., Yalçın, S.B.Ö., Oktuğ, S.F.: New lightweight mitigation techniques for RPL version number attacks. Ad Hoc Netw. 85, 81–91 (2019)

    Article  Google Scholar 

  23. Hashemi, S.Y., Aliee, F.S.: Dynamic and comprehensive trust model for IoT and its integration into RPL. J. Supercomput. 75(7), 3555–3584 (2019)

    Article  Google Scholar 

  24. Bhalaji, N., Hariharasudan, K.S., Aashika, K.: A Trust Based Mechanism to Combat Blackhole Attack in RPL Protocol. In: International Conference on Intelligent Computing and Communication Technologies (pp. 457–464). Springer, Singapore (2019, January)

  25. Kfoury, E., Saab, J., Younes, P., Achkar, R.: A self organizing map intrusion detection system for RPL protocol attacks. Int. J. Interdisciplinary Telecommun. Netw. 11(1), 30–43 (2019)

    Google Scholar 

  26. Canbalaban, E., & Sen, S. (2020, October). A cross-layer intrusion detection system for RPL-based Internet of Things. In International Conference on Ad-Hoc Networks and Wireless (pp. 214–227). Springer, Cham.

  27. Jahantigh, N., Bakhtiyari Shahri, A.: Intrusion detection system to detect insider attack on RPL routing protocol based on destination advertisement object. Int. J. Inf. Commun. Technol. Res. 13(2), 17–28 (2021)

    Google Scholar 

  28. Violettas, G., Simoglou, G., Petridou, S., Mamatas, L.: A softwarized intrusion detection system for the RPL-based Internet of Things networks. Futur. Gener. Comput. Syst. 125, 698–714 (2021)

    Article  Google Scholar 

  29. Prajisha, C., & Vasudevan, A. R. (2021, December). An Intrusion Detection System for Blackhole Attack Detection and Isolation in RPL Based IoT Using ANN. In International Advanced Computing Conference (pp. 332–347). Springer, Cham.

  30. Saba, T., Rehman, A., Sadad, T., Kolivand, H., Bahaj, S.A.: Anomaly-based intrusion detection system for IoT networks through deep learning model. Comput. Electr. Eng. 99, 107810 (2022)

    Article  Google Scholar 

  31. Ioulianou, P.P., Vassilakis, V.G., Shahandashti, S.F.: A trust-based intrusion detection system for RPL networks: detecting a combination of rank and blackhole attacks. J. Cybersecurity Privacy 2(1), 124–153 (2022)

    Article  Google Scholar 

  32. Prakash, P. J., & Lalitha, B. (2022). Optimized Ensemble Classifier Based Network Intrusion Detection System for RPL Based Internet of Things. Wireless Personal Communications, 1–24.

  33. Manne, V. R. J., & Sreekanth, S. (2022, March). Detection and Mitigation of RPL Routing Attacks in Internet of Things. In 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 481–485). IEEE.

  34. Ivakhnenko, A.G.: Polynomial theory of complex systems. IEEE Trans. Syst. Man Cybern. 4, 364–378 (1971)

    Article  MathSciNet  Google Scholar 

  35. Li, R.Y.M., Fong, S., Chong, K.W.S.: Forecasting the REITs and stock indices: group method of data handling neural network approach. Pac. Rim Prop. Res. J. 23(2), 123–160 (2017)

    Google Scholar 

  36. Farlow, S.J.: Self-Organizing Method in Modeling: GMDH. Type Algorithm (1984)

  37. Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)

    Article  Google Scholar 

  38. http://205.174.165.80/CICDataset/CICDDoS2019/Dataset/.

  39. https://www.unb.ca/cic/datasets/botnet.html.

  40. M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, A Detailed Analysis of the KDD CUP 99 Data Set, Submitted to Second IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), 2009.

  41. https://www.unb.ca/cic/datasets/darknet2020.html.

  42. Aydogan, E., Yilmaz, S., Sen, S., Butun, I., Forsström, S., & Gidlund, M. (2019, May). A Central Intrusion Detection System for RPL-Based Industrial Internet of Things. In 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS) (pp. 1–5). IEEE.

Download references

Funding

This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Contributions

MS, AS, MG-A conducted this research. MS: methodology, software, validation, writing original draft. AS: conceptualization, supervision, writing review & editing, formal analysis, project administration. MG-A: investigation, resources, data curation, visualization.

Corresponding author

Correspondence to Ali Shahidinejad.

Ethics declarations

Conflict of interest

We certify that there is no actual or potential conflict of interest in relation to this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shirafkan, M., Shahidinejad, A. & Ghobaei-Arani, M. An Intrusion Detection System using Deep Cellular Learning Automata and Semantic Hierarchy for Enhancing RPL Protocol Security. Cluster Comput 26, 2443–2461 (2023). https://doi.org/10.1007/s10586-022-03820-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-022-03820-y

Keywords

Navigation