ML-LGBM: A Machine Learning Model Based on Light Gradient Boosting Machine for the Detection of Version Number Attacks in RPL-Based Networks

被引:35
作者
Osman, Musa [1 ]
He, Jingsha [1 ]
Mokbal, Fawaz Mahiuob Mohammed [1 ,2 ]
Zhu, Nafei [1 ]
Qureshi, Sirajuddin [1 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Dept Software Engn, Beijing 100124, Peoples R China
[2] ILMA Univ, Fac Comp Sci, Karachi 75190, Pakistan
关键词
Internet of Things; Routing protocols; Feature extraction; Training; Testing; Random access memory; Operating systems; IoT; RPL protocol; 6LowPAN; machine learning; RPL attacks; ROUTING ATTACKS; INTERNET; PROTOCOL;
D O I
10.1109/ACCESS.2021.3087175
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) has caused significant digital disruption to the future of the digital world. With the emergence of the 5G technology, IoT would shift rapidly from aspirational vision to real-world applications. However, one of the most pressing issues in IoT is security. Routing protocols of the IoT, such as the Routing Protocol for Low-power and lossy network protocol (RPL), are vulnerable to both insider and outsider attacks with the insider ones being more challenging because they are more difficult to detect and mitigate. Among the most concerning insider attacks to RPL in IoT applications is the Version Number Attacks (VNAs) that target the global repair mechanisms by consuming resources of IoT devices, such as power, memory, and processing power, to eventually cause the IoT ecosystem to collapse. In this paper, a lightweight VNA detection model named ML-LGBM is proposed. The work on the ML-LGBM model includes the development of a large VNA dataset, a feature extraction method, an LGBM algorithm and maximum parameter optimization. Results of extensive experiments demonstrate the advantages of the proposed ML-LGBM model based on several metrics, such as accuracy, precision, F-score, true negative rate and false-positive rate of 99.6%, 99%, 99.6%, 99.3% and 0.0093, respectively. Moreover, the proposed ML-LGBM model has slower execution time and less memory resource requirement of 140.217 seconds and 347,530 bytes, making it suitable for resource-constrained IoT devices.
引用
收藏
页码:83654 / 83665
页数:12
相关论文
共 30 条
[1]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[2]   New lightweight mitigation techniques for RPL version number attacks [J].
Aris, Ahmet ;
Yalcin, Siddika Berna Ors ;
Oktug, Sema F. .
AD HOC NETWORKS, 2019, 85 :81-91
[3]  
Aris A, 2016, IEEE IFIP NETW OPER, P776, DOI 10.1109/NOMS.2016.7502897
[4]   RPL Attack Detection and Prevention in the Internet of Things Networks Using a GRU Based Deep Learning [J].
Cakir, Semih ;
Toklu, Sinan ;
Yalcin, Nesibe .
IEEE ACCESS, 2020, 8 :183678-183689
[5]  
Dvir A., 2011, 2011 IEEE 8th International Conference on Mobile Ad-Hoc and Sensor Systems, P709, DOI 10.1109/MASS.2011.76
[6]   RPL in a nutshell: A survey [J].
Gaddour, Olfa ;
Koubaa, Anis .
COMPUTER NETWORKS, 2012, 56 (14) :3163-3178
[7]   A Survey of Limitations and Enhancements of the IPv6 Routing Protocol for Low-Power and Lossy Networks: A Focus on Core Operations [J].
Ghaleb, Baraq ;
Al-Dubai, Ahmed Y. ;
Ekonomou, Elias ;
Alsarhan, Ayoub ;
Nasser, Youssef ;
Mackenzie, Lewis M. ;
Boukerche, Azzedine .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02) :1607-1635
[8]  
Ke GL, 2017, ADV NEUR IN, V30
[9]   A Self Organizing Map Intrusion Detection System for RPL Protocol Attacks [J].
Kfoury, Elie ;
Saab, Julien ;
Younes, Paul ;
Achkar, Roger .
INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2019, 11 (01) :30-43
[10]   Machine learning algorithms for wireless sensor networks: A survey [J].
Kumar, D. Praveen ;
Amgoth, Tarachand ;
Annavarapu, Chandra Sekhara Rao .
INFORMATION FUSION, 2019, 49 :1-25