Adversarial RL-Based IDS for Evolving Data Environment in 6LoWPAN

被引:10
作者
Pasikhani, Aryan Mohammadi [1 ]
Clark, John A. [1 ]
Gope, Prosanta [1 ]
机构
[1] Univ Sheffield, Dept Comp Sci, Sheffield S1 4DP, S Yorkshire, England
基金
英国工程与自然科学研究理事会;
关键词
Routing; Temperature sensors; Intrusion detection; Radio frequency; Internet; Data models; Wireless personal area networks; Intrusion detection system; RPL attacks; 6LoWPAN; adversarial reinforcement learning; incremental machine learning; concept-drift detection; INTRUSION DETECTION SYSTEM; ROUTING ATTACKS; INTERNET; RPL;
D O I
10.1109/TIFS.2022.3214099
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Low-power and Lossy Networks (LLNs) comprise nodes characterised by constrained computational power, memory, and energy resources. The LLN nodes empower ubiquitous connections amongst numerous devices (e.g. temperature, humidity, and turbidity sensors, together with motors, valves and other actuators) to sense, control and store properties of their environments. They are often deployed in hostile, unattended, and unfavourable conditions. Securing them often becomes very challenging. The extent of interconnected LLN devices poses a series of routing threats (e.g. wormhole, grayhole, DIO suppression, and increase rank attacks). Consequently, an efficient and effective intrusion detection system (IDS) is of utmost importance in identifying anomalous activities in the IPv6 over Low-powered Wireless Personal Area Networks (6LoWPAN). This article proposes a robust Adversarial Reinforcement Learning (ARL) framework to generate efficient IDSs for evolving data environments. The integration of ARL and incremental machine-learning facilitates the generation of resource-efficient and robust IDS detectors. We demonstrate in particular how such an approach, leveraging notions of 'concept drift' detection and adaptation, can handle inevitable changes in the environment, giving the IDS best chances of detecting attacks in the current profile. The range of routing attacks considered is the most comprehensive to date. For the first time, Black-box and Grey-box ML-based adversaries aiming to destabilise the 6LoWPAN are distinguished and addressed.
引用
收藏
页码:3831 / 3846
页数:16
相关论文
共 50 条
[31]   Analysis of Routing Attacks on RPL based 6LoWPAN Networks [J].
Verma, Abhishek ;
Ranga, Virender .
INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2018, 11 (08) :43-56
[32]   Impact Analysis of Rank Attack on RPL-Based 6LoWPAN Networks in Internet of Things and Aftermaths [J].
Bang, Ankur ;
Rao, Udai Pratap .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2023, 48 (02) :2489-2505
[33]   IPv6-Based Smart Grid Communication over 6LoWPAN [J].
Van Kerkhoven, Jason ;
Charlebois, Nathaniel ;
Robertson, Alex ;
Gibson, Brydon ;
Ahmed, Arslan ;
Bouida, Zied ;
Ibnkahla, Mohamed .
2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,
[34]   Aggregator Based RPL for an IoT-Fog Based Power Distribution System with 6LoWPAN [J].
Tom, Rijo Jackson ;
Sankaranarayanan, Suresh ;
de Albuquerque, Victor Hugo C. ;
Rodrigues, Joel J. P. C. .
CHINA COMMUNICATIONS, 2020, 17 (01) :104-117
[35]   Aggregator Based RPL for an IoT-Fog Based Power Distribution System with 6LoWPAN [J].
Rijo Jackson Tom ;
Suresh Sankaranarayanan ;
Victor Hugo Cde Albuquerque ;
Joel JPCRodrigues .
中国通信, 2020, 17 (01) :104-117
[36]   IMBF - Counteracting Denial-of-Sleep Attacks in 6LowPAN Based Internet of Things [J].
Husain, A. Jahir ;
Mohamed, M. A. Maluk .
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2019, 35 (02) :361-374
[37]   Dynamic and Distributed Load Balancing Scheme in Multi-Gateway based 6LoWPAN [J].
Ha, Minkeun ;
Kwon, Kiwoong ;
Kim, Daeyoung ;
Kong, Peng-Yong .
2014 IEEE INTERNATIONAL CONFERENCE (ITHINGS) - 2014 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) - 2014 IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL-SOCIAL COMPUTING (CPS), 2014, :87-94
[38]   ECIS, an Energy Conservation and Interconnection Scheme between WSN and Internet based on the 6LoWPAN [J].
Yuan, Quan ;
Zhang, Runtong ;
Chu, Fuzhi ;
Dai, Wei .
2013 16TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2013), 2013, :565-570
[39]   Blackhole Detection in 6LoWPAN Based Internet of Things : An Anomaly Based Approach [J].
Patel, Himanshu B. ;
Jinwala, Devesh C. .
PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, :947-954
[40]   Performance Evaluation of a Wormhole Detection Method using Round-Trip Times and Hop Counts in RPL-Based 6LoWPAN Networks [J].
Samuel, Charisma ;
Alvarez, Brian Martinez ;
Ribera, Eric Garcia ;
Ioulianou, Philokypros P. ;
Vassilakis, Vassilios G. .
2020 12TH INTERNATIONAL SYMPOSIUM ON COMMUNICATION SYSTEMS, NETWORKS AND DIGITAL SIGNAL PROCESSING, CSNDSP, 2020,