Adversarial RL-Based IDS for Evolving Data Environment in 6LoWPAN

被引:10
|
作者
Pasikhani, Aryan Mohammadi [1 ]
Clark, John A. [1 ]
Gope, Prosanta [1 ]
机构
[1] Univ Sheffield, Dept Comp Sci, Sheffield S1 4DP, S Yorkshire, England
基金
英国工程与自然科学研究理事会;
关键词
Routing; Temperature sensors; Intrusion detection; Radio frequency; Internet; Data models; Wireless personal area networks; Intrusion detection system; RPL attacks; 6LoWPAN; adversarial reinforcement learning; incremental machine learning; concept-drift detection; INTRUSION DETECTION SYSTEM; ROUTING ATTACKS; INTERNET; RPL;
D O I
10.1109/TIFS.2022.3214099
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Low-power and Lossy Networks (LLNs) comprise nodes characterised by constrained computational power, memory, and energy resources. The LLN nodes empower ubiquitous connections amongst numerous devices (e.g. temperature, humidity, and turbidity sensors, together with motors, valves and other actuators) to sense, control and store properties of their environments. They are often deployed in hostile, unattended, and unfavourable conditions. Securing them often becomes very challenging. The extent of interconnected LLN devices poses a series of routing threats (e.g. wormhole, grayhole, DIO suppression, and increase rank attacks). Consequently, an efficient and effective intrusion detection system (IDS) is of utmost importance in identifying anomalous activities in the IPv6 over Low-powered Wireless Personal Area Networks (6LoWPAN). This article proposes a robust Adversarial Reinforcement Learning (ARL) framework to generate efficient IDSs for evolving data environments. The integration of ARL and incremental machine-learning facilitates the generation of resource-efficient and robust IDS detectors. We demonstrate in particular how such an approach, leveraging notions of 'concept drift' detection and adaptation, can handle inevitable changes in the environment, giving the IDS best chances of detecting attacks in the current profile. The range of routing attacks considered is the most comprehensive to date. For the first time, Black-box and Grey-box ML-based adversaries aiming to destabilise the 6LoWPAN are distinguished and addressed.
引用
收藏
页码:3831 / 3846
页数:16
相关论文
共 50 条
  • [1] Reinforcement-Learning-based IDS for 6LoWPAN
    Pasikhani, Aryan Mohammadi
    Clark, John A.
    Gope, Prosanta
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 1049 - 1060
  • [2] A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks
    Bhale, Pradeepkumar
    Biswas, Santosh
    Nandi, Sukumar
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (02) : 915 - 934
  • [3] A 6LoWPAN Application Environment
    Tolle, Gilman
    SENSYS'07: PROCEEDINGS OF THE 5TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, 2007, : 375 - 376
  • [4] Data driven intrusion detection for 6LoWPAN based IoT systems
    Ors, Faik Kerem
    Levi, Albert
    AD HOC NETWORKS, 2023, 143
  • [5] Energy Efficient Approach to Detect Sinkhole Attack Using Roving IDS in 6LoWPAN Network
    Bhale, Pradeepkumar
    Dey, Sukanta
    Biswas, Santosh
    Nandi, Sukumar
    INNOVATIONS FOR COMMUNITY SERVICES, I4CS 2020, 2020, 1139 : 187 - 207
  • [6] DSAT-IDS: Dissimilarity and Adaptive Threshold-based Intrusion Detection system to mitigate selective forwarding attack in the RPL-based 6LoWPAN
    Rajasekar, V. R.
    Rajkumar, S.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (09): : 12029 - 12068
  • [7] A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks
    Pradeepkumar Bhale
    Santosh Biswas
    Sukumar Nandi
    International Journal of Information Security, 2024, 23 : 915 - 934
  • [8] 6LoWPAN Protocol in Fixed Environment: A Performance Assessment Analysis
    Yusoff, Nin Hayati Mohd
    Zakaria, Nurul Azma
    Sikora, Axel
    Sebastian, Jubin E.
    PROCEEDINGS OF THE 2019 10TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS - TECHNOLOGY AND APPLICATIONS (IDAACS), VOL. 2, 2019, : 1142 - 1147
  • [9] Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol
    Napiah, Mohamad Nazrin
    Bin Idris, Mohd Yamani Idna
    Ramli, Roziana
    Ahmedy, Ismail
    IEEE ACCESS, 2018, 6 : 16623 - 16638
  • [10] Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review
    Verma, Abhishek
    Ranga, Virender
    IEEE SENSORS JOURNAL, 2020, 20 (11) : 5666 - 5690