An autonomous intrusion detection system for the RPL protocol

被引:6
作者
Shirafkan, Mohammad [1 ]
Shahidienjad, Ali [1 ]
Ghobaei-Arani, Mostafa [1 ]
机构
[1] Islamic Azad Univ, Qom Branch, Dept Comp Engn, Qom, Iran
关键词
Intrusion detection; GMDH neural network; Hierarchical semantic; RPL protocol; LOW-POWER; ROUTING PROTOCOL; ALGORITHM; INTERNET; ATTACKS;
D O I
10.1007/s12083-021-01255-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Routing Protocol for Low-Power and Lossy Networks (RPL) is a proactive routing protocol for wireless networks based on distance vectors operating on the platform of IEEE 802.15 (a working group of the Institute of Electrical and Electronics Engineers (IEEE) IEEE 802 standards committee). Various approaches have been proposed to detect intrusions in the RPL, often accompanied by problems such as inaccuracy and high error in intrusion detection. Therefore, in this paper, a combination of the hierarchical semantic approach and the Group Method of Data Handling (GMDH) neural network algorithm was used to detect intrusions. The hierarchical semantic approach, which is based on the conversion of infiltration values into meaningful numbers, and the selection of influential variables in the infiltration of the Internet of Things can significantly affect intrusion detection. The GMDH algorithm also produces a model based on the neural network with hidden layers. It also learns from past events and identifies possible intrusions that may occur in the future. The results obtained in the proposed model were compared with the results of other methods. It was observed that the accuracy of the proposed method improved by about 20%.
引用
收藏
页码:484 / 502
页数:19
相关论文
共 34 条
[1]   SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things [J].
Airehrour, David ;
Gutierrez, Jairo A. ;
Ray, Sayan Kumar .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 :860-876
[2]  
Alvi SA, 2017, INT WIREL COMMUN, P1927, DOI 10.1109/IWCMC.2017.7986578
[3]  
[Anonymous], 2017, 2017 2 INT MULT C CO
[4]   New lightweight mitigation techniques for RPL version number attacks [J].
Aris, Ahmet ;
Yalcin, Siddika Berna Ors ;
Oktug, Sema F. .
AD HOC NETWORKS, 2019, 85 :81-91
[5]  
Aydogan E., 2019, 2019 15 IEEE INT WOR, P1
[6]  
Bagheri A, 2005, GMDH TYPE NEURAL NET
[7]  
Barthel D., 2012, Routing Metrics Used for Path Calculation in Low-Power and Lossy Networks
[8]  
Bhalaji N., 2019, P SYSTEM RELIABILITY, P457
[9]   ST-DBSCAN: An algorithm for clustering spatial-temp oral data [J].
Birant, Derya ;
Kut, Alp .
DATA & KNOWLEDGE ENGINEERING, 2007, 60 (01) :208-221
[10]  
Celik M., 2011, 2011 International Symposium on Innovations in Intelligent Systems and Applications (INISTA 2011), P91, DOI 10.1109/INISTA.2011.5946052