Abstract
Routing Protocol for Low-Power and Lossy Networks (RPL) is a proactive routing protocol for wireless networks based on distance vectors operating on the platform of IEEE 802.15 (a working group of the Institute of Electrical and Electronics Engineers (IEEE) IEEE 802 standards committee). Various approaches have been proposed to detect intrusions in the RPL, often accompanied by problems such as inaccuracy and high error in intrusion detection. Therefore, in this paper, a combination of the hierarchical semantic approach and the Group Method of Data Handling (GMDH) neural network algorithm was used to detect intrusions. The hierarchical semantic approach, which is based on the conversion of infiltration values into meaningful numbers, and the selection of influential variables in the infiltration of the Internet of Things can significantly affect intrusion detection. The GMDH algorithm also produces a model based on the neural network with hidden layers. It also learns from past events and identifies possible intrusions that may occur in the future. The results obtained in the proposed model were compared with the results of other methods. It was observed that the accuracy of the proposed method improved by about 20%.
Similar content being viewed by others
References
Paul PV, Saraswathi R (2017) The Internet of Things—A comprehensive survey. In Computation of Power, Energy Information and Communication (ICCPEIC), 2017 International Conference on (pp. 421–426). IEEE
Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W (2017) A survey on Internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J 4(5):1125–1142
Xia F, Yang LT, Wang L, Vinel A (2012) Internet of things. Int J Commun Syst 25(9):1101–1102
Winter T, Thubert P, Brandt A, Hui J, Kelsey R, Levis P, Pister K, Struik R, Vasseur J, Alexander R (2012) RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks, RFC 6550 (Proposed Standard). Internet Engineering Task Force
Zhang L, Feng G, Qin, S (2015) Intrusion detection system for RPL from routing choice intrusion. In 2015 IEEE International Conference on Communication Workshop (ICCW) (pp. 2652–2658). IEEE
Patel HB, Jinwala DC, Patel DR (2016) Baseline intrusion detection framework for 6lowpan devices. In Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services (pp. 72–76). ACM
Mayzaud A, Badonnel R, Chrisment I (2016) A Taxonomy of Attacks in RPL-based Internet of Things
Mayzaud A, Badonnel R, Chrisment I (2016) Detecting version number attacks in RPL-based networks using a distributed monitoring architecture. In 2016 12th International Conference on Network and Service Management (CNSM) (pp. 127–135). IEEE
Le A, Loo J, Chai KK, Aiash M (2016) A specification-based IDS for detecting attacks on RPL-based network topology. Information 7(2):25
Glissa G, Rachedi A, Meddeb A (2016) A secure routing protocol based on RPL for Internet of Things. In 2016 IEEE Global Communications Conference (GLOBECOM) (pp. 1–7). IEEE
Kamble A, Malemath VS, Patil D (2017) Security attacks and secure routing protocols in RPL-based Internet of Things: Survey. In 2017 International Conference on Emerging Trends & Innovation in ICT (ICEI) (pp. 33–39). IEEE
Kim HS, Ko J, Culler DE, Paek J (2017) Challenging the IPv6 routing protocol for low-power and lossy networks (RPL): A survey. IEEE Communications Surveys & Tutorials 19(4):2502–2525
Ghaleb B, Al-Dubai A, Ekonomou E, Wadhaj I (2017) A new enhanced RPL based routing for Internet of Things. In 2017 IEEE International Conference on Communications Workshops (ICC Workshops) (pp. 595–600). IEEE
Shukla P (2017) ML-IDS: A machine learning approach to detect wormhole attacks in Internet of Things. In 2017 Intelligent Systems Conference (IntelliSys) (pp. 234–240). IEEE
Shreenivas D, Raza S, Voigt T (2017) Intrusion Detection in the RPL-connected 6LoWPAN Networks. In Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security (pp. 31–38). ACM
Sousa N, Sobral JV, Rodrigues JJ, Rabêlo RA, Solic P (2017) ERAOF: A new RPL protocol thingsive function for Internet of Things applications. In 2017 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech) (pp. 1–5). IEEE
Alvi SA, ul Hassan F, Mian AN (2017) On the energy efficiency and stability of RPL routing protocol. In 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC) (pp. 1927–1932). IEEE
Kim HS, Kim H, Paek J, Bahk S (2016) Load balancing under heavy traffic in RPL routing protocol for low power and lossy networks. IEEE Trans Mob Comput 16(4):964–979
Nikravan M, Movaghar A, Hosseinzadeh M (2018) A lightweight defense approach to mitigate version number and rank attacks in low-power and lossy networks. Wireless Pers Commun 99(2):1035–1059
Airehrour D, Gutierrez JA, Ray SK (2019) SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Futur Gener Comput Syst 93:860–876
Arış A, Yalçın SBÖ, Oktuğ SF (2019) New lightweight mitigation techniques for RPL version number attacks. Ad Hoc Netw 85:81–91
Hashemi SY, Aliee FS (2019) Dynamic and comprehensive trust model for IoT and its integration into RPL. J Supercomput 75(7):3555–3584
Bhalaji N, Hariharasudan KS, Aashika K (2019) A Trust-Based Mechanism to Combat Blackhole Attack in RPL Protocol. In International Conference on Intelligent Computing and Communication Technologies (pp. 457–464). Springer, Singapore
Kfoury E, Saab J, Younes P, Achkar R (2019) A Self Organizing Map Intrusion Detection System for RPL Protocol Attacks. International Journal of Interdisciplinary Telecommunications and Networking (IJITN) 11(1):30–43
Tsvetkov T, Klein A (2011) RPL: IPv6 routing protocol for low power and lossy networks. Network 59
Barthel D, Pister K, Dejean N, Vasseur JP, Kim M (2012) Routing metrics used for path calculation in low-power and lossy networks
Çelik M, Dadaşer-Çelik F, Dokuz AŞ (2011) Anomaly detection in temperature data using dbscan algorithm. In 2011 International Symposium on Innovations in Intelligent Systems and Applications (pp. 91–95), IEEE
Mayzaud A, Sehgal A, Badonnel R, Chrisment I, Schönwälder J (2015) Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks. Int J Network Manage 25(5):320–339
Farlow SJ (1981) The GMDH algorithm of Ivakhnenko. Am Stat 35(4):210–215
Aydogan E, Yilmaz S, Sen S, Butun I, Forsström S, Gidlund M (2019) A Central Intrusion Detection System for RPL-Based Industrial Internet of Things. In 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS) (pp. 1–5). IEEE
Hinton GE, Osindero S, Teh YW (2006) A fast learning algorithm for deep belief nets. Neural Comput 18(7):1527–1554
Bagheri A, NARIMANZADEH N, Siavash AS, Khoobkar AR (2005) Gmdh type neural networks and their application to the identification of the inverse kinematics equations of robotic manipulators (research note)
Birant D, Kut A (2007) ST-DBSCAN: An algorithm for clustering spatial-temporal data. Data Knowl Eng 60(1):208–221
Smys S, Basar A, Wang H (2020) Hybrid intrusion detection system for Internet of Things (IoT). Journal of ISMAC 2(04):190–199
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Shirafkan, M., Shahidienjad, A. & Ghobaei-Arani, M. An autonomous intrusion detection system for the RPL protocol. Peer-to-Peer Netw. Appl. 15, 484–502 (2022). https://doi.org/10.1007/s12083-021-01255-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-021-01255-7