Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

An autonomous intrusion detection system for the RPL protocol

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Routing Protocol for Low-Power and Lossy Networks (RPL) is a proactive routing protocol for wireless networks based on distance vectors operating on the platform of IEEE 802.15 (a working group of the Institute of Electrical and Electronics Engineers (IEEE) IEEE 802 standards committee). Various approaches have been proposed to detect intrusions in the RPL, often accompanied by problems such as inaccuracy and high error in intrusion detection. Therefore, in this paper, a combination of the hierarchical semantic approach and the Group Method of Data Handling (GMDH) neural network algorithm was used to detect intrusions. The hierarchical semantic approach, which is based on the conversion of infiltration values into meaningful numbers, and the selection of influential variables in the infiltration of the Internet of Things can significantly affect intrusion detection. The GMDH algorithm also produces a model based on the neural network with hidden layers. It also learns from past events and identifies possible intrusions that may occur in the future. The results obtained in the proposed model were compared with the results of other methods. It was observed that the accuracy of the proposed method improved by about 20%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Paul PV, Saraswathi R (2017) The Internet of Things—A comprehensive survey. In Computation of Power, Energy Information and Communication (ICCPEIC), 2017 International Conference on (pp. 421–426). IEEE‏

  2. Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W (2017) A survey on Internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J 4(5):1125–1142

    Article  Google Scholar 

  3. Xia F, Yang LT, Wang L, Vinel A (2012) Internet of things. Int J Commun Syst 25(9):1101–1102

    Article  Google Scholar 

  4. Winter T, Thubert P, Brandt A, Hui J, Kelsey R, Levis P, Pister K, Struik R, Vasseur J, Alexander R (2012) RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks, RFC 6550 (Proposed Standard). Internet Engineering Task Force

  5. Zhang L, Feng G, Qin, S (2015) Intrusion detection system for RPL from routing choice intrusion. In 2015 IEEE International Conference on Communication Workshop (ICCW) (pp. 2652–2658). IEEE

  6. Patel HB, Jinwala DC, Patel DR (2016) Baseline intrusion detection framework for 6lowpan devices. In Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services (pp. 72–76). ACM

  7. Mayzaud A, Badonnel R, Chrisment I (2016) A Taxonomy of Attacks in RPL-based Internet of Things

  8. Mayzaud A, Badonnel R, Chrisment I (2016) Detecting version number attacks in RPL-based networks using a distributed monitoring architecture. In 2016 12th International Conference on Network and Service Management (CNSM) (pp. 127–135). IEEE

  9. Le A, Loo J, Chai KK, Aiash M (2016) A specification-based IDS for detecting attacks on RPL-based network topology. Information 7(2):25

    Article  Google Scholar 

  10. Glissa G, Rachedi A, Meddeb A (2016) A secure routing protocol based on RPL for Internet of Things. In 2016 IEEE Global Communications Conference (GLOBECOM) (pp. 1–7). IEEE

  11. Kamble A, Malemath VS, Patil D (2017) Security attacks and secure routing protocols in RPL-based Internet of Things: Survey. In 2017 International Conference on Emerging Trends & Innovation in ICT (ICEI) (pp. 33–39). IEEE

  12. Kim HS, Ko J, Culler DE, Paek J (2017) Challenging the IPv6 routing protocol for low-power and lossy networks (RPL): A survey. IEEE Communications Surveys & Tutorials 19(4):2502–2525

    Article  Google Scholar 

  13. Ghaleb B, Al-Dubai A, Ekonomou E, Wadhaj I (2017) A new enhanced RPL based routing for Internet of Things. In 2017 IEEE International Conference on Communications Workshops (ICC Workshops) (pp. 595–600). IEEE

  14. Shukla P (2017) ML-IDS: A machine learning approach to detect wormhole attacks in Internet of Things. In 2017 Intelligent Systems Conference (IntelliSys) (pp. 234–240). IEEE

  15. Shreenivas D, Raza S, Voigt T (2017) Intrusion Detection in the RPL-connected 6LoWPAN Networks. In Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security (pp. 31–38). ACM

  16. Sousa N, Sobral JV, Rodrigues JJ, Rabêlo RA, Solic P (2017) ERAOF: A new RPL protocol thingsive function for Internet of Things applications. In 2017 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech) (pp. 1–5). IEEE

  17. Alvi SA, ul Hassan F, Mian AN (2017) On the energy efficiency and stability of RPL routing protocol. In 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC) (pp. 1927–1932). IEEE

  18. Kim HS, Kim H, Paek J, Bahk S (2016) Load balancing under heavy traffic in RPL routing protocol for low power and lossy networks. IEEE Trans Mob Comput 16(4):964–979

    Article  Google Scholar 

  19. Nikravan M, Movaghar A, Hosseinzadeh M (2018) A lightweight defense approach to mitigate version number and rank attacks in low-power and lossy networks. Wireless Pers Commun 99(2):1035–1059

    Article  Google Scholar 

  20. Airehrour D, Gutierrez JA, Ray SK (2019) SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Futur Gener Comput Syst 93:860–876

    Article  Google Scholar 

  21. Arış A, Yalçın SBÖ, Oktuğ SF (2019) New lightweight mitigation techniques for RPL version number attacks. Ad Hoc Netw 85:81–91

    Article  Google Scholar 

  22. Hashemi SY, Aliee FS (2019) Dynamic and comprehensive trust model for IoT and its integration into RPL. J Supercomput 75(7):3555–3584

    Article  Google Scholar 

  23. Bhalaji N, Hariharasudan KS, Aashika K (2019) A Trust-Based Mechanism to Combat Blackhole Attack in RPL Protocol. In International Conference on Intelligent Computing and Communication Technologies (pp. 457–464). Springer, Singapore

  24. Kfoury E, Saab J, Younes P, Achkar R (2019) A Self Organizing Map Intrusion Detection System for RPL Protocol Attacks. International Journal of Interdisciplinary Telecommunications and Networking (IJITN) 11(1):30–43

    Article  Google Scholar 

  25. Tsvetkov T, Klein A (2011) RPL: IPv6 routing protocol for low power and lossy networks. Network 59‏

  26. Barthel D, Pister K, Dejean N, Vasseur JP, Kim M (2012) Routing metrics used for path calculation in low-power and lossy networks‏

  27. Çelik M, Dadaşer-Çelik F, Dokuz AŞ (2011) Anomaly detection in temperature data using dbscan algorithm. In 2011 International Symposium on Innovations in Intelligent Systems and Applications (pp. 91–95), IEEE

  28. Mayzaud A, Sehgal A, Badonnel R, Chrisment I, Schönwälder J (2015) Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks. Int J Network Manage 25(5):320–339

    Article  Google Scholar 

  29. Farlow SJ (1981) The GMDH algorithm of Ivakhnenko. Am Stat 35(4):210–215

    Google Scholar 

  30. Aydogan E, Yilmaz S, Sen S, Butun I, Forsström S, Gidlund M (2019) A Central Intrusion Detection System for RPL-Based Industrial Internet of Things. In 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS) (pp. 1–5). IEEE

  31. Hinton GE, Osindero S, Teh YW (2006) A fast learning algorithm for deep belief nets. Neural Comput 18(7):1527–1554

    Article  MathSciNet  Google Scholar 

  32. Bagheri A, NARIMANZADEH N, Siavash AS, Khoobkar AR (2005) Gmdh type neural networks and their application to the identification of the inverse kinematics equations of robotic manipulators (research note)

  33. Birant D, Kut A (2007) ST-DBSCAN: An algorithm for clustering spatial-temporal data. Data Knowl Eng 60(1):208–221

    Article  Google Scholar 

  34. Smys S, Basar A, Wang H (2020) Hybrid intrusion detection system for Internet of Things (IoT). Journal of ISMAC 2(04):190–199

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ali Shahidienjad.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shirafkan, M., Shahidienjad, A. & Ghobaei-Arani, M. An autonomous intrusion detection system for the RPL protocol. Peer-to-Peer Netw. Appl. 15, 484–502 (2022). https://doi.org/10.1007/s12083-021-01255-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-021-01255-7

Keywords

Navigation