Skip to main content

Advertisement

Log in

Dair-mlt: detection and avoidance of IoT routing attacks using machine learning techniques

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) aims to increase the physical device’s intelligence. These devices are capable of exchanging data without human intervention. But, IoT devices are resource-constrained and also prone to attacks during routing. These attacks deplete the energy and lifetime of each node in the network thereby gradually degrading the performance of the network and possibly bringing it to a halt. To overcome these problems, this paper proposes a novel Detection and Avoidance of IoT Routing Attacks using Machine Learning Techniques (DAIR-MLT) to detect and avoid Hello Flooding attacks, Rank attacks, and Version Number attacks. The Cooja simulator is used for simulating the proposed DAIR-MLT Techniques. In the DAIR-MLT, the detection and avoidance of attacks are carried out in two stages namely Detection of IoT routing Attacks and Avoidance of detected attacks. Two different datasets are used namely DA_IoT_Routing Normal Datasets and DA_IoT_Routing Abnormal Datasets to test and analyze the performance of proposed DAIR-MLT Techniques. From the simulation results, it is inferred that the proposed algorithm increases the packet delivery ratio by 41.55%, throughput by 39.56%, and network lifetime by 43.2% compared to existing algorithms. Further, it is found that the proposed DAIR-MLT algorithm decreases the energy consumption of nodes in IoT by 40.16% and End-to-End delay by 45.26%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Algorithm 2
Algorithm 3
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data availability

The author(s) will provide the datasets and materials used and/or analyzed in this work.

References

  1. Kamel SOM, Elhamayed SA (2020) Mitigating the impact of IoT routing attacks on power consumption in IoT healthcare environment using convolutional neural network. Int J Comput Network Inform Secur 12(4):11–29

    Google Scholar 

  2. Khan K, Mehmood A, Khan S, Khan MA, Iqbal Z, Mashwani WK (2020) A survey on intrusion detection and prevention in wireless ad-hoc networks. J Syst Archit. 105:101701

    Article  Google Scholar 

  3. Gopinath V, Rao KV, Rao SK (2023) A comprehensive analysis of IoT security towards providing a cost-effective solution: a layered approach. Int J Inform Technol. 15(7):3813–3826

    Google Scholar 

  4. Sahay R, Geethakumari G, Modugu K (2018) Attack graph-Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT. In, (2018) IEEE 4th World Forum on Internet of Things (WF-IoT). IEEE 308–313

  5. Al-Amiedy TA, Anbar M, Belaton B, Kabla AHH, Hasbullah IH, Alashhab ZR (2022) A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of Internet of Things. Sensors. 22(9):3400

    Article  ADS  PubMed  PubMed Central  Google Scholar 

  6. Kharrufa H, Al-Kashoash HA, Kemp AH (2019) RPL-based routing protocols in IoT applications: a review. IEEE Sensors J. 19(15):5952–5967

    Article  ADS  Google Scholar 

  7. Tripathy BK, Jena SK, Reddy V, Das S, Panda SK (2021) A novel communication framework between MANET and WSN in IoT based smart environment. Int J Inform Technol. 13:921–931

    Google Scholar 

  8. Hkiri A, Karmani M, Machhout M (2022) The routing protocol for low power and lossy networks (RPL) under attack: simulation and analysis. In: 2022 5th International Conference on Advanced Systems and Emergent Technologies (IC_ASET). IEEE; p. 143-148

  9. Glissa G, Rachedi A, Meddeb AA, secure routing protocol based on RPL for Internet of Things. In, (2016) IEEE Global Communications Conference (GLOBECOM). IEEE 2016:1–7

  10. Dvir A, Buttyan L, VeRA-version number and rank authentication in RPL. In, et al (2011) IEEE eighth international conference on mobile ad-hoc and sensor systems. IEEE 2011:709–714

  11. Deepavathi P, Tharun A, Mala C (2023) DA_IoT_Routing Normal Datasets. GitHub; https://github.com/DeepavathiPaganraj/DA_-IoT_-Routing-Normal-Datasets

  12. Deepavathi P, Tharun A, Mala C (2023) DA_IoT_Routing Abnormal Datasets. GitHub; https://github.com/DeepavathiPaganraj/DA_IoT_Routing-Abnormal-Datasets

  13. Sen PC, Hajra M, Ghosh M (2020) Supervised classification algorithms in machine learning: a survey and review. In: Emerging Technology in Modelling and Graphics: Proceedings of IEM Graph 2018. Springer; p. 99-111

  14. A Almusaylim Z, Jhanjhi N, Alhumam A (2020) Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPL-RP. Sensors. 20(21):5997

  15. Srividya R, Vyshali Rao K (2022) Light weight hash function using secured key distribution technique for MANET. Int J Inform Technol. 14(6):3099–3108

    Google Scholar 

  16. Renjith P, Ramesh K, Sasikumar S (2021) An improved trust-based security framework for internet of things. Int J Inform Technol. 13:677–685

    Google Scholar 

  17. Kumar K, Kumar S (2018) Energy efficient link stable routing in internet of things. Int J Inform Technol. 10:465–479

    Google Scholar 

  18. Raoof A, Matrawy A, Lung CH (2018) Routing attacks and mitigation methods for RPL-based Internet of Things. IEEE Commun Surveys Tutorials. 21(2):1582–1606

    Article  Google Scholar 

  19. Choudhary S, Detection Kesswani N (2018) Prevention of routing attacks in internet of things. In: 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE 1537–1540

  20. Agiollo A, Conti M, Kaliyar P, Lin TN, Pajola L (2021) DETONAR: Detection of routing attacks in RPL-based IoT. IEEE Trans Network Service Manag. 18(2):1178–1190

    Article  Google Scholar 

  21. Sharma S, Verma VK (2021) AIEMLA: artificial intelligence enabled machine learning approach for routing attacks on internet of things. J Supercomput. 77(12):13757–13787

    Article  Google Scholar 

  22. Aljufair G, Mahyoub M, Almazyad AS (2023) On mitigating dis attacks in iot networks. In: 18th Wireless On-Demand Network Systems and Services Conference (WONS). IEEE 104–109

  23. Kim J, Shim M, Hong S, Shin Y, Choi E (2020) Intelligent detection of iot botnets using machine learning and deep learning. Appl Sci. 10(19):7009

    Article  CAS  Google Scholar 

  24. Kavitha P, Usha M (2014) Cluster based anomaly detection in wireless LAN. Int J Comput Trends Technol (IJCTT). 12(5):227–230

    Article  Google Scholar 

  25. Arış A, Yalçın SBÖ, Oktuğ SF (2019) New lightweight mitigation techniques for RPL version number attacks. Ad Hoc Networks. 85:81–91

    Article  Google Scholar 

  26. Seyfollahi A, Moodi M, Ghaffari A (2022) MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications. Comput Stand Interfaces. 82:103622

    Article  Google Scholar 

  27. Sheibani M, Barekatain B, Arvan E (2022) A lightweight distributed detection algorithm for DDAO Attack on RPL routing protocol in Internet of Things. Pervas Mobile Comput. 80:101525

    Article  Google Scholar 

  28. Deepavathi P, Mala C (2023) Detection and prevention of various routing attacks in RPL for a smart vehicle environment using an enhanced privacy secure-RPL routing protocol. Int J Vehic Inform Commun Syst. 8(4):309–329

    Google Scholar 

  29. Sahay R, Geethakumari G, Mitra B (2022) A holistic framework for prediction of routing attacks in IoT-LLNs. J Supercomput. 78(1):1409–1433

    Article  Google Scholar 

  30. Wallgren L, Raza S, Voigt T (2013) Routing attacks and countermeasures in the RPL-based internet of things. Int J Distrib Sensor Networks. 9(8):794326

    Article  Google Scholar 

  31. Sahay R, Geethakumari G, Mitra B (2020) A novel blockchain-based framework to secure IoT-LLNs against routing attacks. Computing. 102:2445–2470

    Article  Google Scholar 

  32. Rabhi S, Abbes T, Zarai F (2023) IoT routing attacks detection using machine learning algorithms. Wireless Person Commun. 128(3):1839–1857

    Article  Google Scholar 

Download references

Funding

We declare that we have not received any funding for this research work.

Author information

Authors and Affiliations

Authors

Contributions

All Authors have equally contributed to the paper.

Corresponding author

Correspondence to Deepavathi Paganraj.

Ethics declarations

Conflict of interest

There are no conflicts of interest to disclose.

Ethical approval and consent to participate

Not Applicable.

Consent for publication

Not Applicable.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Paganraj, D. Dair-mlt: detection and avoidance of IoT routing attacks using machine learning techniques. Int. j. inf. tecnol. (2024). https://doi.org/10.1007/s41870-024-01794-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s41870-024-01794-1

Keywords

Navigation