Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks

被引:0
作者
Al-Sarawi, Shadi [1 ]
Anbar, Mohammed [1 ]
Alabsi, Basim Ahmad [2 ]
Aladaileh, Mohammad Adnan [3 ]
Rihan, Shaza Dawood Ahmed [2 ]
机构
[1] Univ Sains Malaysia, Natl Adv IPv6 Ctr NAv6, Gelugor 11800, Penang, Malaysia
[2] Najran Univ, Appl Coll, King Abdulaziz St,POB 1988, Najran, Saudi Arabia
[3] Amer Univ Madaba AUM, Sch Informat Technol, Cybersecur Dept, Amman 11821, Jordan
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 77卷 / 01期
关键词
Internet of Things; IPv6 over low power wireless personal area networks; Routing Protocol for Low-Power and Lossy Networks; Internet Protocol Version 6; distributed denial of service; wireless sensor networks; INTRUSION DETECTION SYSTEMS;
D O I
10.32604/cmc.2023.041108
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) consists of interconnected smart devices communicating and collecting data. The Routing Protocol for Low-Power and Lossy Networks (RPL) is the standard protocol for Internet Protocol Version 6 (IPv6) in the IoT. However, RPL is vulnerable to various attacks, including the sinkhole attack, which disrupts the network by manipulating routing information. This paper proposes the Unweighted Voting Method (UVM) for sinkhole node identification, utilizing three key behavioral indicators: DODAG Information Object (DIO) Transaction Frequency, Rank Harmony, and Power Consumption. These indicators have been carefully selected based on their contribution to sinkhole attack detection and other relevant features used in previous research. The UVM method employs an unweighted voting mechanism, where each voter or rule holds equal weight in detecting the presence of a sinkhole attack based on the proposed indicators. The effectiveness of the UVM method is evaluated using the COOJA simulator and compared with existing approaches. Notably, the proposed approach fulfills power consumption requirements for constrained nodes without increasing consumption due to the deployment design. In terms of detection accuracy, simulation results demonstrate a high detection rate ranging from 90% to 100%, with a low false-positive rate of 0% to 0.2%. Consequently, the proposed approach surpasses Ensemble Learning Intrusion Detection Systems by leveraging three indicators and three supporting rules.
引用
收藏
页码:491 / 515
页数:25
相关论文
共 50 条
[41]   Majority Voting Ensemble Classifier for Detecting Keylogging Attack on Internet of Things [J].
Maz, Yahya Alhaj ;
Anbar, Mohammed ;
Manickam, Selvakumar ;
Rihan, Shaza Dawood Ahmed ;
Alabsi, Basim Ahmad ;
Dorgham, Osama M. .
IEEE ACCESS, 2024, 12 :19860-19871
[42]   RFC 6550: On Minimizing the Control Plane Traffic of RPL-based Industrial Networks [J].
Sourailidis, Dimitrios ;
Koutsiamanis, Remous-Aris ;
Papadopoulos, Georgios Z. ;
Barthel, Dominique ;
Montavont, Nicolas .
2020 21ST IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (IEEE WOWMOM 2020), 2020, :439-444
[43]   IPv6 Multicast Forwarding in RPL-Based Wireless Sensor Networks [J].
Oikonomou, George ;
Phillips, Iain ;
Tryfonas, Theo .
WIRELESS PERSONAL COMMUNICATIONS, 2013, 73 (03) :1089-1116
[44]   IPv6 Multicast Forwarding in RPL-Based Wireless Sensor Networks [J].
George Oikonomou ;
Iain Phillips ;
Theo Tryfonas .
Wireless Personal Communications, 2013, 73 :1089-1116
[45]   Lightweight Three-Factor Sensor and User Authentication for RPL-Based 6TiSCH Networks [J].
Aydin, Hakan ;
Aydin, Burak ;
Gormus, Sedat .
IEEE SENSORS JOURNAL, 2024, 24 (17) :28196-28209
[46]   LEA-RPL: lightweight energy-aware RPL protocol for internet of things based on particle swarm optimization [J].
Mokrani, Sabrina ;
Belkadi, Malika ;
Sadoun, Tassadit ;
Lloret, Jaime ;
Aoudjit, Rachida .
TELECOMMUNICATION SYSTEMS, 2025, 88 (01)
[47]   DEEM: A Decentralized and Energy Efficient Method for detecting sinkhole attacks on the internet of things [J].
Taghanaki, Saeid Rafiei ;
Jamshidi, Kamal ;
Bohlooli, Ali .
2019 9TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE 2019), 2019, :325-330
[48]   E2V: Techniques for Detecting and Mitigating Rank Inconsistency Attack (RInA) in RPL based Internet of Things [J].
Stephen, R. ;
Arockiam, L. .
SECOND NATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE (NCCI 2018), 2018, 1142
[49]   UEE-RPL: A UAV-Based Energy Efficient Routing for Internet of Things [J].
Yang, Zhutian ;
Liu, Hanze ;
Chen, Yunfei ;
Zhu, Xingsheng ;
Ning, Yong ;
Zhu, Weiqiang .
IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2021, 5 (03) :1333-1344
[50]   Detecting and forecasting cryptojacking attack trends in Internet of Things and wireless sensor networks devices [J].
Reddy, C. Kishor Kumar ;
Kaza, Vijaya Sindhoori ;
Mohana, R. Madana ;
Alamer, Abdulrahman ;
Alam, Shadab ;
Shuaib, Mohammed ;
Basudan, Sultan ;
Sheneamer, Abdullah .
PEERJ COMPUTER SCIENCE, 2024, 10 :1-35