Proposing a Rank and Wormhole Attack Detection Framework using Machine Learning

被引:23
作者
Fatima-tuz-Zahra [1 ]
Jhanjhi, N. Z. [1 ]
Brohi, Sarfraz Nawaz [1 ]
Malik, Nazir A. [2 ]
机构
[1] Taylors Univ, Sch Comp & IT SoCIT, Subang Jaya, Malaysia
[2] Bahria Univ, Dept Comp Sci, Islamabad, Pakistan
来源
2019 13TH INTERNATIONAL CONFERENCE ON MATHEMATICS, ACTUARIAL SCIENCE, COMPUTER SCIENCE AND STATISTICS (MACS-13) | 2019年
关键词
RPL; Internet of Things; rank attack; wormhole attack; machine learning; INTERNET;
D O I
10.1109/macs48846.2019.9024821
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Internet of Things (IoT) is a paradigm in digital technology which is prevalently revolutionizing various sectors like healthcare, military, business and more. However, the incremental deployment of this advanced technology has also caused critical security issues simultaneously. In particular, IoT networks are continuing to grow vulnerable to security attacks due to exponential connectivity of 'things' with each other in the smart infrastructure. Due to this increased vulnerability, it has become crucial to address the issue of insecure routing in these IoT devices. IoT uses RPL, which is a specially designed standard for networking that caters to the resource-constrained and lightweight nature of IoT devices, for information broadcast. It is equally prone to routing attacks like any other class of protocols in wireless networks. Various solutions have been proposed by researchers to counter them including version, rank, sinkhole and wormhole attacks since last decade. However, given the huge impact, neither detection nor mitigation method has been found which addresses rank and wormhole attacks when they are initiated at the same time on an IoT network In this paper, a rank and wormhole attack detection framework is proposed, by employing machine learning approaches, which address the stated issue. This research aims to contribute toward design and development of high-performing and effective solutions for routing attacks in RPL-based IoT networks.
引用
收藏
页数:9
相关论文
共 27 条
  • [1] Abdullah A., INT J ENG RES TECHNO, V12, P8
  • [2] Secure routing for internet of things: A survey
    Airehrour, David
    Gutierrez, Jairo
    Ray, Sayan Kumar
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 : 198 - 213
  • [3] Alexander A., 2012, Rpl: Ipv6 routing protocol for low-power and lossy networks, P157, DOI DOI 10.17487/RFC6550
  • [4] Almulhim M., INT J COMPUTER SCI N, V19, P107
  • [5] Almulhim M., 2018 20 INT C ADV CO, P481
  • [6] Almusaylim Z.A., WIRELESS NETWORKS, V25, P3193
  • [7] CoAR: Congestion-Aware Routing Protocol for Low Power and Lossy Networks for IoT Applications
    Bhandari, Khadak Singh
    Hosen, A. S. M. Sanwar
    Cho, Gi Hwan
    [J]. SENSORS, 2018, 18 (11)
  • [8] Dutta N., 2019, ADV INTELLIGENT SYST, V702
  • [9] A Survey of Limitations and Enhancements of the IPv6 Routing Protocol for Low-Power and Lossy Networks: A Focus on Core Operations
    Ghaleb, Baraq
    Al-Dubai, Ahmed Y.
    Ekonomou, Elias
    Alsarhan, Ayoub
    Nasser, Youssef
    Mackenzie, Lewis M.
    Boukerche, Azzedine
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1607 - 1635
  • [10] Guler U., 2017, IEEE 60 INT MIDW S C