Abstract
The Internet of Things (IoT) aims to increase the physical device’s intelligence. These devices are capable of exchanging data without human intervention. But, IoT devices are resource-constrained and also prone to attacks during routing. These attacks deplete the energy and lifetime of each node in the network thereby gradually degrading the performance of the network and possibly bringing it to a halt. To overcome these problems, this paper proposes a novel Detection and Avoidance of IoT Routing Attacks using Machine Learning Techniques (DAIR-MLT) to detect and avoid Hello Flooding attacks, Rank attacks, and Version Number attacks. The Cooja simulator is used for simulating the proposed DAIR-MLT Techniques. In the DAIR-MLT, the detection and avoidance of attacks are carried out in two stages namely Detection of IoT routing Attacks and Avoidance of detected attacks. Two different datasets are used namely DA_IoT_Routing Normal Datasets and DA_IoT_Routing Abnormal Datasets to test and analyze the performance of proposed DAIR-MLT Techniques. From the simulation results, it is inferred that the proposed algorithm increases the packet delivery ratio by 41.55%, throughput by 39.56%, and network lifetime by 43.2% compared to existing algorithms. Further, it is found that the proposed DAIR-MLT algorithm decreases the energy consumption of nodes in IoT by 40.16% and End-to-End delay by 45.26%.
Similar content being viewed by others
Data availability
The author(s) will provide the datasets and materials used and/or analyzed in this work.
References
Kamel SOM, Elhamayed SA (2020) Mitigating the impact of IoT routing attacks on power consumption in IoT healthcare environment using convolutional neural network. Int J Comput Network Inform Secur 12(4):11–29
Khan K, Mehmood A, Khan S, Khan MA, Iqbal Z, Mashwani WK (2020) A survey on intrusion detection and prevention in wireless ad-hoc networks. J Syst Archit. 105:101701
Gopinath V, Rao KV, Rao SK (2023) A comprehensive analysis of IoT security towards providing a cost-effective solution: a layered approach. Int J Inform Technol. 15(7):3813–3826
Sahay R, Geethakumari G, Modugu K (2018) Attack graph-Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT. In, (2018) IEEE 4th World Forum on Internet of Things (WF-IoT). IEEE 308–313
Al-Amiedy TA, Anbar M, Belaton B, Kabla AHH, Hasbullah IH, Alashhab ZR (2022) A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of Internet of Things. Sensors. 22(9):3400
Kharrufa H, Al-Kashoash HA, Kemp AH (2019) RPL-based routing protocols in IoT applications: a review. IEEE Sensors J. 19(15):5952–5967
Tripathy BK, Jena SK, Reddy V, Das S, Panda SK (2021) A novel communication framework between MANET and WSN in IoT based smart environment. Int J Inform Technol. 13:921–931
Hkiri A, Karmani M, Machhout M (2022) The routing protocol for low power and lossy networks (RPL) under attack: simulation and analysis. In: 2022 5th International Conference on Advanced Systems and Emergent Technologies (IC_ASET). IEEE; p. 143-148
Glissa G, Rachedi A, Meddeb AA, secure routing protocol based on RPL for Internet of Things. In, (2016) IEEE Global Communications Conference (GLOBECOM). IEEE 2016:1–7
Dvir A, Buttyan L, VeRA-version number and rank authentication in RPL. In, et al (2011) IEEE eighth international conference on mobile ad-hoc and sensor systems. IEEE 2011:709–714
Deepavathi P, Tharun A, Mala C (2023) DA_IoT_Routing Normal Datasets. GitHub; https://github.com/DeepavathiPaganraj/DA_-IoT_-Routing-Normal-Datasets
Deepavathi P, Tharun A, Mala C (2023) DA_IoT_Routing Abnormal Datasets. GitHub; https://github.com/DeepavathiPaganraj/DA_IoT_Routing-Abnormal-Datasets
Sen PC, Hajra M, Ghosh M (2020) Supervised classification algorithms in machine learning: a survey and review. In: Emerging Technology in Modelling and Graphics: Proceedings of IEM Graph 2018. Springer; p. 99-111
A Almusaylim Z, Jhanjhi N, Alhumam A (2020) Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPL-RP. Sensors. 20(21):5997
Srividya R, Vyshali Rao K (2022) Light weight hash function using secured key distribution technique for MANET. Int J Inform Technol. 14(6):3099–3108
Renjith P, Ramesh K, Sasikumar S (2021) An improved trust-based security framework for internet of things. Int J Inform Technol. 13:677–685
Kumar K, Kumar S (2018) Energy efficient link stable routing in internet of things. Int J Inform Technol. 10:465–479
Raoof A, Matrawy A, Lung CH (2018) Routing attacks and mitigation methods for RPL-based Internet of Things. IEEE Commun Surveys Tutorials. 21(2):1582–1606
Choudhary S, Detection Kesswani N (2018) Prevention of routing attacks in internet of things. In: 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE 1537–1540
Agiollo A, Conti M, Kaliyar P, Lin TN, Pajola L (2021) DETONAR: Detection of routing attacks in RPL-based IoT. IEEE Trans Network Service Manag. 18(2):1178–1190
Sharma S, Verma VK (2021) AIEMLA: artificial intelligence enabled machine learning approach for routing attacks on internet of things. J Supercomput. 77(12):13757–13787
Aljufair G, Mahyoub M, Almazyad AS (2023) On mitigating dis attacks in iot networks. In: 18th Wireless On-Demand Network Systems and Services Conference (WONS). IEEE 104–109
Kim J, Shim M, Hong S, Shin Y, Choi E (2020) Intelligent detection of iot botnets using machine learning and deep learning. Appl Sci. 10(19):7009
Kavitha P, Usha M (2014) Cluster based anomaly detection in wireless LAN. Int J Comput Trends Technol (IJCTT). 12(5):227–230
Arış A, Yalçın SBÖ, Oktuğ SF (2019) New lightweight mitigation techniques for RPL version number attacks. Ad Hoc Networks. 85:81–91
Seyfollahi A, Moodi M, Ghaffari A (2022) MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications. Comput Stand Interfaces. 82:103622
Sheibani M, Barekatain B, Arvan E (2022) A lightweight distributed detection algorithm for DDAO Attack on RPL routing protocol in Internet of Things. Pervas Mobile Comput. 80:101525
Deepavathi P, Mala C (2023) Detection and prevention of various routing attacks in RPL for a smart vehicle environment using an enhanced privacy secure-RPL routing protocol. Int J Vehic Inform Commun Syst. 8(4):309–329
Sahay R, Geethakumari G, Mitra B (2022) A holistic framework for prediction of routing attacks in IoT-LLNs. J Supercomput. 78(1):1409–1433
Wallgren L, Raza S, Voigt T (2013) Routing attacks and countermeasures in the RPL-based internet of things. Int J Distrib Sensor Networks. 9(8):794326
Sahay R, Geethakumari G, Mitra B (2020) A novel blockchain-based framework to secure IoT-LLNs against routing attacks. Computing. 102:2445–2470
Rabhi S, Abbes T, Zarai F (2023) IoT routing attacks detection using machine learning algorithms. Wireless Person Commun. 128(3):1839–1857
Funding
We declare that we have not received any funding for this research work.
Author information
Authors and Affiliations
Contributions
All Authors have equally contributed to the paper.
Corresponding author
Ethics declarations
Conflict of interest
There are no conflicts of interest to disclose.
Ethical approval and consent to participate
Not Applicable.
Consent for publication
Not Applicable.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Paganraj, D. Dair-mlt: detection and avoidance of IoT routing attacks using machine learning techniques. Int. j. inf. tecnol. (2024). https://doi.org/10.1007/s41870-024-01794-1
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s41870-024-01794-1