Abstract
The internet of things (IoT) is a collection of systems connected to an online network consisting of things. Routing Protocol for Low-Power and Lossy Networks (RPL) is a proactive routing protocol for wireless networks based on distance vectors. Several methods have been proposed for improving RPL protocol security, suffering from lack of accuracy, the authenticity of intrusion detection, and lack of scalability. Therefore, in this research, an intrusion detection system based on deep cellular learning automata and semantic hierarchy is developed to increase RPL protocol security. Semantic hierarchy is used to transform attack features into significant values, and deep cellular learning automata are employed to increase the security of the RPL protocol. Here five datasets related to attacks, including Darknet, “Version Number”, “NSL-KDD”, “Botnet”, and Distributed Denial of Service (DDoS), have been used. Comparing the proposed results on five datasets indicates that the proposed method outperforms its counterparts. Also, the proposed model has been tested on Blackhole, NID, and BoT-IoT datasets based on ANN and CNN's Deep Neural Network. The results of penetration detection accuracy of the proposed method on Blackhole datasets, NID, and BoT-IoT were 99.65%, 99.71%, and 93.75%, respectively, which improved by averages of 0.42% compared to ANN and 0.55% compared to CNN methods.
Similar content being viewed by others
Data Availability
Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.
References
Ray, P.P.: A survey on Internet of Things architectures. J. King Saud Univ. Comput. Inf. Sci. 30(3), 291–319 (2018)
Qiu, T., Chen, N., Li, K., Atiquzzaman, M., Zhao, W.: How can heterogeneous internet of things build our future: A survey? IEEE Communications Surveys & Tutorials (2018)
Sahay, R., Geethakumari, G., Mitra, B.: Mitigating the worst parent attack in RPL based internet of things. Clust. Comput. 25(2), 1303–1320 (2022)
Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4(5), 1125–1142 (2017)
Xia, F., Yang, L.T., Wang, L., Vinel, A.: Internet of things. Int. J. Commun Syst 25(9), 1101–1102 (2012)
Ahmad, R., Alsmadi, I., Alhamdani, W., Tawalbeh, L.A.: Towards building data analytics benchmarks for IoT intrusion detection. Clust. Comput. 25(3), 2125–2141 (2022)
Shahidinejad, A., Ghobaei-Arani, M., Souri, A., Shojafar, M., & Kumari, S. Light-edge: a lightweight authentication protocol for IoT devices in an edge-cloud environment. IEEE Consum. Electron. Mag. 11(2), 57–63 (2021)
Heidari, A. and Jabraeil Jamali, M.A., 2022. Internet of Things intrusion detection systems: a comprehensive review and future directions. Cluster Computing, pp.1–28.
Tofighy, S., Rahmanian, A.A., Ghobaei-Arani, M.: An ensemble CPU load prediction algorithm using a Bayesian information criterion and smooth filters in a cloud computing environment. Softw. Pract. Exp. 48(12), 2257–2277 (2018)
Shreenivas, D., Raza, S., Voigt, T.: Intrusion detection in the RPL-connected 6LoWPAN networks. In: Proceedings of the 3rd ACM international workshop on IoT privacy, trust, and security (pp. 31–38). (2017, April)
Aljarrah, E., Yassein, M.B., Aljawarneh, S.: Routing protocol of low-power and lossy network: Survey and open issues. In: 2016 International Conference on engineering & MIS (ICEMIS) (pp. 1–6). IEEE (2016)
Pradhan, M., Nayak, C. K., & Pradhan, S. K. (2020). Intrusion detection system (IDS) and their types. In: Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications (pp. 481–497). IGI Global.
Borkar, A., Donode, A., Kumari, A.: A survey on Intrusion Detection System (IDS) and Internal Intrusion Detection and protection system (IIDPS). In: 2017 International conference on inventive computing and informatics (ICICI) (pp. 949–953). IEEE (2017, November).
Vinayakumar, R., Alazab, M., Soman, K.P., Poornachandran, P., Al-Nemrat, A., Venkatraman, S.: Deep learning approach for intelligent intrusion detection system. IEEE Access 7, 41525–41550 (2019)
Karatas, G., Demir, O., Sahingoz, O.K.: Deep learning in intrusion detection systems. In: 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT) (pp. 113–116). IEEE (2018, December).
Kim, H.S., Ko, J., Culler, D.E., Paek, J.: Challenging the IPv6 routing protocol for low-power and lossy networks (RPL): A survey. IEEE Commun. Surv. Tutor. 19(4), 2502–2525 (2017)
Shukla, P.: ML-IDS: A machine learning approach to detect wormhole attacks in Internet of Things. In: 2017 Intelligent Systems Conference (IntelliSys) (pp. 234–240). IEEE (2017, September).
Shreenivas, D., Raza, S., Voigt, T.: Intrusion Detection in the RPL-connected 6LoWPAN Networks. In: Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security (pp. 31–38). ACM (2017, April)
Sousa, N., Sobral, J. V., Rodrigues, J. J., Rabêlo, R. A., & Solic, P. (2017, July). ERAOF: A new RPL protocol thingsive function for Internet of Things applications. In 2017 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech) (pp. 1–5). IEEE.
Nikravan, M., Movaghar, A., Hosseinzadeh, M.: A lightweight defense approach to mitigate version number and rank attacks in low-power and lossy networks. Wirel. Pers. Commun. 99(2), 1035–1059 (2018)
Airehrour, D., Gutierrez, J.A., Ray, S.K.: SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Futur. Gener. Comput. Syst. 93, 860–876 (2019)
Arış, A., Yalçın, S.B.Ö., Oktuğ, S.F.: New lightweight mitigation techniques for RPL version number attacks. Ad Hoc Netw. 85, 81–91 (2019)
Hashemi, S.Y., Aliee, F.S.: Dynamic and comprehensive trust model for IoT and its integration into RPL. J. Supercomput. 75(7), 3555–3584 (2019)
Bhalaji, N., Hariharasudan, K.S., Aashika, K.: A Trust Based Mechanism to Combat Blackhole Attack in RPL Protocol. In: International Conference on Intelligent Computing and Communication Technologies (pp. 457–464). Springer, Singapore (2019, January)
Kfoury, E., Saab, J., Younes, P., Achkar, R.: A self organizing map intrusion detection system for RPL protocol attacks. Int. J. Interdisciplinary Telecommun. Netw. 11(1), 30–43 (2019)
Canbalaban, E., & Sen, S. (2020, October). A cross-layer intrusion detection system for RPL-based Internet of Things. In International Conference on Ad-Hoc Networks and Wireless (pp. 214–227). Springer, Cham.
Jahantigh, N., Bakhtiyari Shahri, A.: Intrusion detection system to detect insider attack on RPL routing protocol based on destination advertisement object. Int. J. Inf. Commun. Technol. Res. 13(2), 17–28 (2021)
Violettas, G., Simoglou, G., Petridou, S., Mamatas, L.: A softwarized intrusion detection system for the RPL-based Internet of Things networks. Futur. Gener. Comput. Syst. 125, 698–714 (2021)
Prajisha, C., & Vasudevan, A. R. (2021, December). An Intrusion Detection System for Blackhole Attack Detection and Isolation in RPL Based IoT Using ANN. In International Advanced Computing Conference (pp. 332–347). Springer, Cham.
Saba, T., Rehman, A., Sadad, T., Kolivand, H., Bahaj, S.A.: Anomaly-based intrusion detection system for IoT networks through deep learning model. Comput. Electr. Eng. 99, 107810 (2022)
Ioulianou, P.P., Vassilakis, V.G., Shahandashti, S.F.: A trust-based intrusion detection system for RPL networks: detecting a combination of rank and blackhole attacks. J. Cybersecurity Privacy 2(1), 124–153 (2022)
Prakash, P. J., & Lalitha, B. (2022). Optimized Ensemble Classifier Based Network Intrusion Detection System for RPL Based Internet of Things. Wireless Personal Communications, 1–24.
Manne, V. R. J., & Sreekanth, S. (2022, March). Detection and Mitigation of RPL Routing Attacks in Internet of Things. In 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 481–485). IEEE.
Ivakhnenko, A.G.: Polynomial theory of complex systems. IEEE Trans. Syst. Man Cybern. 4, 364–378 (1971)
Li, R.Y.M., Fong, S., Chong, K.W.S.: Forecasting the REITs and stock indices: group method of data handling neural network approach. Pac. Rim Prop. Res. J. 23(2), 123–160 (2017)
Farlow, S.J.: Self-Organizing Method in Modeling: GMDH. Type Algorithm (1984)
Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)
M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, A Detailed Analysis of the KDD CUP 99 Data Set, Submitted to Second IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), 2009.
Aydogan, E., Yilmaz, S., Sen, S., Butun, I., Forsström, S., & Gidlund, M. (2019, May). A Central Intrusion Detection System for RPL-Based Industrial Internet of Things. In 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS) (pp. 1–5). IEEE.
Funding
This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.
Author information
Authors and Affiliations
Contributions
MS, AS, MG-A conducted this research. MS: methodology, software, validation, writing original draft. AS: conceptualization, supervision, writing review & editing, formal analysis, project administration. MG-A: investigation, resources, data curation, visualization.
Corresponding author
Ethics declarations
Conflict of interest
We certify that there is no actual or potential conflict of interest in relation to this article.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Shirafkan, M., Shahidinejad, A. & Ghobaei-Arani, M. An Intrusion Detection System using Deep Cellular Learning Automata and Semantic Hierarchy for Enhancing RPL Protocol Security. Cluster Comput 26, 2443–2461 (2023). https://doi.org/10.1007/s10586-022-03820-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-022-03820-y