A Trust Based Anomaly Detection Scheme Using a Hybrid Deep Learning Model for IoT Routing Attacks Mitigation

被引:1
作者
Ahmadi, Khatereh [1 ]
Javidan, Reza [1 ]
机构
[1] Shiraz Univ Technol, Comp Engn & IT Dept, Shiraz, Iran
关键词
anomaly; deep learning; Internet of Things; routing attack; RPL; trust; INTERNET;
D O I
10.1049/2024/4449798
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT), as a remarkable paradigm, establishes a wide range of applications in various industries like healthcare, smart homes, smart cities, agriculture, transportation, and military domains. This widespread technology provides a general platform for heterogeneous objects to connect, exchange, and process gathered information. Beside significant efficiency and productivity impacts of IoT technology, security and privacy concerns have emerged more than ever. The routing protocol for low power and lossy networks (RPL) which is standardized for IoT environment, suffers from the basic security considerations, which makes it vulnerable to many well-known attacks. Several security solutions have been proposed to address routing attacks detection in RPL-based IoT, most of which are based on machine learning techniques, intrusion detection systems and trust-based approaches. Securing RPL-based IoT networks is challenging because resource constraint IoT devices are connected to untrusted Internet, the communication links are lossy and the devices use a set of novel and heterogenous technologies. Therefore, providing light-weight security mechanisms play a vital role in timely detection and prevention of IoT routing attacks. In this paper, we proposed a novel anomaly detection-based trust management model using the concepts of sequence prediction and deep learning. We have formulated the problem of routing behavior anomaly detection as a time series forecasting method, which is solved based on a stacked long-short term memory (LSTM) sequence to sequence autoencoder; that is, a hybrid training model of recurrent neural networks and autoencoders. The proposed model is then utilized to provide a detection mechanism to address four prevalent and destructive RPL attacks including: black-hole attack, destination-oriented directed acyclic graph (DODAG) information solicitation (DIS) flooding attack, version number (VN) attack, and decreased rank (DR) attack. In order to evaluate the efficiency and effectiveness of the proposed model in timely detection of RPL-specific routing attacks, we have implemented the proposed model on several RPL-based IoT scenarios simulated using Contiki Cooja simulator separately, and the results have been compared in details. According to the presented results, the implemented detection scheme on all attack scenarios, demonstrated that the trend of estimated anomaly between real and predicted routing behavior is similar to the evaluated attack frequency of malicious nodes during the RPL process and in contrast, analyzed trust scores represent an opposite pattern, which shows high accurate and timely detection of attack incidences using our proposed trust scheme.
引用
收藏
页数:21
相关论文
共 37 条
[21]  
Khan Z. A., 2017, A Trust-Based Resilient Routing Mechanism for the Internet of Things
[22]   RPL-Based Routing Protocols in IoT Applications: A Review [J].
Kharrufa, Harith ;
Al-Kashoash, Hayder A. A. ;
Kemp, Andrew H. .
IEEE SENSORS JOURNAL, 2019, 19 (15) :5952-5967
[23]  
Krari A, 2023, INT J ADV COMPUT SC, V14, P614
[24]  
Ma W., 2021, Machine Learning Empowered Trust Evaluation Method for IoT Devices, P9
[25]   Internet of Things: A Comprehensive Overview on Protocols, Architectures, Technologies, Simulation Tools, and Future Directions [J].
Mansour, Mohammad ;
Gamal, Amal ;
Ahmed, Ahmed I. I. ;
Said, Lobna A. A. ;
Elbaz, Abdelmoniem ;
Herencsar, Norbert ;
Soltan, Ahmed .
ENERGIES, 2023, 16 (08)
[26]   A Comprehensive Review on Secure Routing in Internet of Things: Mitigation Methods and Trust-Based Approaches [J].
Muzammal, Syeda M. ;
Murugesan, Raja Kumar ;
Jhanjhi, N. Z. .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) :4186-4210
[27]   An ensemble learning framework for the detection of RPL attacks in IoT networks based on the genetic feature selection approach [J].
Osman, Musa ;
He, Jingsha ;
Zhu, Nafei ;
Mokbal, Fawaz Mahiuob Mohammed .
AD HOC NETWORKS, 2024, 152
[28]  
Park H., 2024, INT C ARTIFICIAL INT
[29]   IoT Routing Attacks Detection Using Machine Learning Algorithms [J].
Rabhi, Sana ;
Abbes, Tarek ;
Zarai, Faouzi .
WIRELESS PERSONAL COMMUNICATIONS, 2023, 128 (03) :1839-1857
[30]  
Rashid M. M., 2024, 2023 IEEE AS PAC C C