Adversarial RL-Based IDS for Evolving Data Environment in 6LoWPAN

被引:10
作者
Pasikhani, Aryan Mohammadi [1 ]
Clark, John A. [1 ]
Gope, Prosanta [1 ]
机构
[1] Univ Sheffield, Dept Comp Sci, Sheffield S1 4DP, S Yorkshire, England
基金
英国工程与自然科学研究理事会;
关键词
Routing; Temperature sensors; Intrusion detection; Radio frequency; Internet; Data models; Wireless personal area networks; Intrusion detection system; RPL attacks; 6LoWPAN; adversarial reinforcement learning; incremental machine learning; concept-drift detection; INTRUSION DETECTION SYSTEM; ROUTING ATTACKS; INTERNET; RPL;
D O I
10.1109/TIFS.2022.3214099
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Low-power and Lossy Networks (LLNs) comprise nodes characterised by constrained computational power, memory, and energy resources. The LLN nodes empower ubiquitous connections amongst numerous devices (e.g. temperature, humidity, and turbidity sensors, together with motors, valves and other actuators) to sense, control and store properties of their environments. They are often deployed in hostile, unattended, and unfavourable conditions. Securing them often becomes very challenging. The extent of interconnected LLN devices poses a series of routing threats (e.g. wormhole, grayhole, DIO suppression, and increase rank attacks). Consequently, an efficient and effective intrusion detection system (IDS) is of utmost importance in identifying anomalous activities in the IPv6 over Low-powered Wireless Personal Area Networks (6LoWPAN). This article proposes a robust Adversarial Reinforcement Learning (ARL) framework to generate efficient IDSs for evolving data environments. The integration of ARL and incremental machine-learning facilitates the generation of resource-efficient and robust IDS detectors. We demonstrate in particular how such an approach, leveraging notions of 'concept drift' detection and adaptation, can handle inevitable changes in the environment, giving the IDS best chances of detecting attacks in the current profile. The range of routing attacks considered is the most comprehensive to date. For the first time, Black-box and Grey-box ML-based adversaries aiming to destabilise the 6LoWPAN are distinguished and addressed.
引用
收藏
页码:3831 / 3846
页数:16
相关论文
共 50 条
[21]   Optimal addressing-based routing for 6LoWPAN [J].
Wang, Xiaonan ;
Sun, Qi ;
Yang, Yuan ;
Wang, Dong .
COMPUTER STANDARDS & INTERFACES, 2016, 45 :79-89
[22]   Performance Evaluation of 6LoWPAN Gateway Used in Actual Network Environment [J].
Bai Enjian ;
Zhang Xiaokui .
2012 INTERNATIONAL CONFERENCE ON CONTROL ENGINEERING AND COMMUNICATION TECHNOLOGY (ICCECT 2012), 2012, :1036-1039
[23]   A Software-Defined Networking framework for IoT based on 6LoWPAN [J].
Lasso, Fabian Fernando Jurado ;
Clarke, Ken ;
Nirmalathas, Ampalavanapillai .
2018 WIRELESS TELECOMMUNICATIONS SYMPOSIUM (WTS), 2018,
[24]   Distributed Monitoring in 6LoWPAN based Internet of Things [J].
Mostafa, B. ;
Benslimane, A. ;
Boureau, E. ;
Molnar, M. ;
Saleh, M. .
2016 INTERNATIONAL CONFERENCE ON SELECTED TOPICS IN MOBILE & WIRELESS NETWORKING (MOWNET), 2016, :188-194
[25]   RETRACTED: Investigation of RPL in 6LoWPAN based elderly care monitoring system (Retracted Article) [J].
Parveen, M. Shabana ;
Bhuvaneswari, P. T., V .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 42 (06) :5411-5426
[26]   New Bit Pattern Based IPv6 Address Compression Techniques for 6LoWPAN Header Compression [J].
Geetha, V ;
Bhat, Archana ;
Thanmayee, S. .
IEEE ACCESS, 2022, 10 :80055-80070
[27]   The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things [J].
Abhishek Verma ;
Virender Ranga .
Computing, 2021, 103 :1479-1500
[28]   Residual Energy based RE-RPL for 6LoWPAN [J].
Sarode, Ketki P. ;
Solapure, Sharwari S. .
2019 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET 2019): ADVANCING WIRELESS AND MOBILE COMMUNICATIONS TECHNOLOGIES FOR 2020 INFORMATION SOCIETY, 2019, :351-354
[29]   A Time Synchronization Scheme based on RPL for 6LoWPAN Networks [J].
Wang, Maosen ;
Zou, Zhimou ;
Pu, Chenggen ;
Wang, Ping ;
Yin, Yandan .
2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, :5969-5974
[30]   Optimized mobility management for RPL/6LoWPAN based IoT network architecture using the firefly algorithm [J].
Manikannan, K. ;
Nagarajan, V .
MICROPROCESSORS AND MICROSYSTEMS, 2020, 77