A Trust Based Anomaly Detection Scheme Using a Hybrid Deep Learning Model for IoT Routing Attacks Mitigation

被引:1
作者
Ahmadi, Khatereh [1 ]
Javidan, Reza [1 ]
机构
[1] Shiraz Univ Technol, Comp Engn & IT Dept, Shiraz, Iran
关键词
anomaly; deep learning; Internet of Things; routing attack; RPL; trust; INTERNET;
D O I
10.1049/2024/4449798
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT), as a remarkable paradigm, establishes a wide range of applications in various industries like healthcare, smart homes, smart cities, agriculture, transportation, and military domains. This widespread technology provides a general platform for heterogeneous objects to connect, exchange, and process gathered information. Beside significant efficiency and productivity impacts of IoT technology, security and privacy concerns have emerged more than ever. The routing protocol for low power and lossy networks (RPL) which is standardized for IoT environment, suffers from the basic security considerations, which makes it vulnerable to many well-known attacks. Several security solutions have been proposed to address routing attacks detection in RPL-based IoT, most of which are based on machine learning techniques, intrusion detection systems and trust-based approaches. Securing RPL-based IoT networks is challenging because resource constraint IoT devices are connected to untrusted Internet, the communication links are lossy and the devices use a set of novel and heterogenous technologies. Therefore, providing light-weight security mechanisms play a vital role in timely detection and prevention of IoT routing attacks. In this paper, we proposed a novel anomaly detection-based trust management model using the concepts of sequence prediction and deep learning. We have formulated the problem of routing behavior anomaly detection as a time series forecasting method, which is solved based on a stacked long-short term memory (LSTM) sequence to sequence autoencoder; that is, a hybrid training model of recurrent neural networks and autoencoders. The proposed model is then utilized to provide a detection mechanism to address four prevalent and destructive RPL attacks including: black-hole attack, destination-oriented directed acyclic graph (DODAG) information solicitation (DIS) flooding attack, version number (VN) attack, and decreased rank (DR) attack. In order to evaluate the efficiency and effectiveness of the proposed model in timely detection of RPL-specific routing attacks, we have implemented the proposed model on several RPL-based IoT scenarios simulated using Contiki Cooja simulator separately, and the results have been compared in details. According to the presented results, the implemented detection scheme on all attack scenarios, demonstrated that the trend of estimated anomaly between real and predicted routing behavior is similar to the evaluated attack frequency of malicious nodes during the RPL process and in contrast, analyzed trust scores represent an opposite pattern, which shows high accurate and timely detection of attack incidences using our proposed trust scheme.
引用
收藏
页数:21
相关论文
共 37 条
[1]   DETONAR: Detection of Routing Attacks in RPL-Based IoT [J].
Agiollo, Andrea ;
Conti, Mauro ;
Kaliyar, Pallavi ;
Lin, Tsung-Nan ;
Pajola, Luca .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02) :1178-1190
[2]  
Airehrour D., 2018, Future Generation Computer Systems
[3]   Secure routing for internet of things: A survey [J].
Airehrour, David ;
Gutierrez, Jairo ;
Ray, Sayan Kumar .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 :198-213
[4]   Toward RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach [J].
Albinali, Hussah ;
Azzedin, Farag .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (05) :5215-5238
[5]   A cascaded federated deep learning based framework for detecting wormhole attacks in IoT networks [J].
Alghamdi, Rubayyi ;
Bellaiche, Martine .
COMPUTERS & SECURITY, 2023, 125
[6]  
Amiedy T. A., 2023, Internet of Things Journal, V22, DOI [10.1016/j.iot.2023.100741, DOI 10.1016/J.IOT.2023.100741]
[7]   Mitigating Denial of Service Attacks in RPL-Based IoT Environments: Trust-Based Approach [J].
Azzedin, Farag .
IEEE ACCESS, 2023, 11 :129077-129089
[8]  
Burange A. W., 2023, Journal of Integrated Science & Technology, V11
[9]  
Darabkh K. A., 2022, Recent Advances, Insights, Bibliometric Analysis Recommendation and Future Directions, V207
[10]   A Real-Time Intrusion Detection System for Wormhole Attack in the RPL based Internet of Things [J].
Deshmukh-Bhosale, Snehal ;
Sonavane, Santosh S. .
12TH INTERNATIONAL CONFERENCE INTERDISCIPLINARITY IN ENGINEERING (INTER-ENG 2018), 2019, 32 :840-847