Skip to main content
Log in

AIEMLA: artificial intelligence enabled machine learning approach for routing attacks on internet of things

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The Internet of things (IoT) is emerging as a prime area of research in the modern era. The significance of IoT in the daily life is increasing due to the increase in objects or things connected to the internet. In this paper, routing protocol for low power and lossy networks (RPL) is examined on the Contiki operating system. This paper used RPL attack framework to simulate three RPL attacks, namely hello-flood, decreased-rank and increased-version. These attacks are simulated in a separate and simultaneous manner. The focus remained on the detection of these attacks through artificial neural network (ANN)-based supervised machine learning approach. The accurate detection of the malicious nodes prevents the network from the severe effects of the attack. The accuracy of the proposed model is computed with hold-out approach and tenfold cross-validation technique. The hyperparameters have been optimized through parameter tuning. The model presented in this paper detected the aforesaid attacks simultaneously as well as individually with 100% accuracy. This work also investigated other performance measures like precision, recall, F1-score and Mathews correlation coefficient (MCC).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Lee I, Lee K (2015) The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Bus Horiz 58(2015):431–440

    Article  Google Scholar 

  2. Chen S, Xu H, Liu D, Hu B, Wang H (2014) A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective. IEEE Int Things J 1(4):349–359

    Article  Google Scholar 

  3. Purri S, Choudhury T, Kashyap N, Kumar P (2017) “Specialization of IoT applications in health care industries”, International Conference on Big Data Analytics and Computational Intelligence (ICBDACI), pp. 1–5

  4. Botta A, Donato WD, Persico V, Pescape A (2016) Integration of cloud computing and internet of things: a survey. FuturGenerComputSyst 56:684–700

    Google Scholar 

  5. Singh S, Verma VK, Pathak NP (2015) Sensors augmentation influence over trust and reputation models realization for dense wireless sensor networks. IEEE Sens J 15(11):6248–6254

    Article  Google Scholar 

  6. Verma VK, Singh S, Pathak NP (2015) Optimized battery models observations for static, distance vector and on-demand based routing protocols over 802.11 enabled wireless sensor networks. Wireless PersCommun 81(2015):503–517

    Article  Google Scholar 

  7. Verma VK, Singh S, Pathak NP (2016) Analytical event-based investigations over delphi random generator distributions for data dissemination routing protocols in highly dense wireless sensor network. Wireless PersCommun 87(2016):1209–1222

    Article  Google Scholar 

  8. Verma VK (2017) Pheromone and path length factor-based trustworthiness estimations in heterogeneous wireless sensor networks. IEEE Sens J 17:215–220

    Article  Google Scholar 

  9. Verma VK, Singh S, Pathak NP (2017) Towards comparative evaluation of trust and reputation models over static, dynamic and oscillating wireless sensor networks. Wireless Netw 2017:1–9

    Article  Google Scholar 

  10. Verma VK, Ntalianis K, Singh S, Pathak NP (2018) Data proliferation based estimations over distribution factor in heterogeneous wireless sensor networks. ComputCommun 124:111–118

    Google Scholar 

  11. Kawamoto D (2017) “IoT security incidents rampant and costly”, https://www.darkreading.com/vulnerabilities---threats/iot-security-incidents-rampant-and-costly/d/d-id/1329367, pp. 1–9

  12. Gaddour O, Koubaa A (2012) RPL in a nutshell: a survey. ComputNetw 56(14):3163–3178

    Google Scholar 

  13. Pongle P, Chavan G (2015) A survey: attacks on RPL and 6LoWPAN in IoT. IntConf Pervasive Comput (ICPC) 2015:1–6

    Google Scholar 

  14. Biljana L, Risteska S, Kire TV (2017) A review of internet of things for smart home: challenges and solutions. J Clean Prod 140(2017):1454–1464

    Google Scholar 

  15. Mahdavinejad MS, Rezvan M, Barekatain M, Adibi P, Barnaghi P, Sheth AP (2017) “Machine learning for internet of things data analysis: a survey”, Dig Commun Netw-2017, pp. 1–56

  16. Zarpelão BS, Miani RS, Kawakani CT, Alvarenga SCD (2017) “A survey of intrusion detection in internet of things”, J Netw Comput Appl-2017, pp. 1–46

  17. Khan MA, Salah K (2018) IoT security: review, blockchain solutions, and open challenges. Future Gen ComputSyst 82(2018):395–411

    Article  Google Scholar 

  18. Costa KAPD, Papa JP, Lisboa CO, Munoz R, Albuquerque VHCD (2019) Internet of things: a survey on machine learning-based intrusion detection approaches. ComputNetw 151(2019):147–157

    Google Scholar 

  19. Sengupta J, Ruj S, Bit SD (2019) A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J NetwComputAppl 2019:1–51

    Google Scholar 

  20. Verma A, Ranga V (2020) “Security of RPL based 6LoWPAN networks in the internet of things: a review”, IEEE Sens J-2020, pp. 1–24

  21. Avila K, Jabba D, Gomez J (2020) “Security aspects for Rpl-based protocols: a systematic review in IoT”, Appl Sci-2020, pp. 1–20

  22. Almusaylim ZA, Alhumam A, Jhanjhi NZ (2020) Proposing a secure RPL based internet of things routing protocol: a review. Ad Hoc Netw 101(2020):1–17

    Google Scholar 

  23. Simha SNV, Mathew R, Sahoo S, Biradar RC (2020) “A review of RPL protocol using contiki operating system”, Proceedings of the Fourth International Conference on Trends in Electronics and Informatics (ICOEI 2020), pp 259–264

  24. Wallgren L, Raza S, Voigt T (2013) “Routing attacks and countermeasures in the RPL-based internet of things”, Int J Dist Sens Netw-2013, pp 1–11

  25. Sehgal A, Mayzaud A, Badonnel R, Chrisment I, Schönwälder J (2014) “Addressing DODAG inconsistency attacks in RPL networks”, Proc. of GIIS Conference, pp 1–8

  26. Mayzaud A, Sehgal A, Badonnel R, Chrisment I, Schonwalder J (2014) “A study of RPL DODAG version attacks,” in AIMS’14 Springer, pp 92–104

  27. Mayzaud A, Sehgal A, Badonnel R, Chrisment I, Schönwälder J (2015) Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks. Int J Net Manag. https://doi.org/10.1002/nem.1898

    Article  Google Scholar 

  28. Mayzaud A, Badonnel R, Chrisment I (2015) A taxonomy of attacks in RPL-based internet of things. Int J Netw Sec 18(3):459–473

    Google Scholar 

  29. Ahmed F, Ko YB (2016) Mitigation of black hole attacks in routing protocol for low power and lossy networks. Sec CommNetw 9(18):1–27

    Google Scholar 

  30. Thanigaivelan NK, Nigussie E, Kanth RK, Virtanen S, Isoaho J (2016) “Distributed internal anomaly detection system for Internet-of-Things”, 13th IEEE Annual Consumer Communications Networking Conference (CCNC), pp.319–320

  31. Aris A, Oktug SF, Yalcin SBO (2016) “RPL version number attacks: In-depth study”, 2016 IEEE/IFIP Network Operations and Management Symposium (NOMS 2016), pp. 776–779

  32. Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for Internet of Things. FuturGenerComputSyst 82(2018):761–768

    Google Scholar 

  33. Perazzo P, Vallati C, Varano D, Anastasi G, Dinni G (2018) “Implementation of a wormhole attack against a RPL network: challenges and effects”, 2018 14th Annual Conference on Wireless On-demand Network Systems and Services (WONS), pp 95–102

  34. Jyothisree MVR, Sreekanth S (2019) “Attacks in RPL and detection technique used for internet of things”, Int J Recent Technol Eng (IJRTE) ISSN: 2277–3878, 8(1) 1876–1879

  35. Ahutu OR, El-Ocla H (2020), “Centralized routing protocol for detecting wormhole attacks in wireless sensor networks”, IEEE Access 8 pp. 63270–63282

  36. Sahay R, Geethakumari G, Mitra B, Sahoo I (2020) “Efficient framework for detection of version number attack in internet of things”, Abraham A., Cherukuri A., Melin P., Gandhi N. (Eds) Intelligent systems design and applications (ISDA 2018). Advances in Intelligent Systems and Computing (AISC 941), pp. 480–492

  37. Pu C (2020) Sybil attack in RPL-based internet of things: analysis and defenses. IEEE Int Things J 7(6):4937–4949. https://doi.org/10.1109/JIOT.2020.2971463

    Article  Google Scholar 

  38. Raza S, Wallgren L, Voigt T (2013) SVELTE: Real-time intrusion detection in Internet of Things. Ad Hoc Netw 11(2013):2661–2674

    Article  Google Scholar 

  39. Kasinathan P, Pastrone C, Spirito MA, Vinkovits M (2013) "Denial-of-Service detection in 6LoWPAN based internet of things.", Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on. IEEE, pp. 600–607

  40. Rghioui A, Khannous A, Bouhorma M (2014) Denial-of-Service attacks on 6LoWPAN-RPL networks: Threats and an intrusion detection system proposition. J AdvComputSciTechnol 3(2):143

    Google Scholar 

  41. Pongle P, Chavan G (2015) Real Time Intrusion and Wormhole Attack Detection in Internet of Things. Int J ComputAppl 121(9):1–13

    Google Scholar 

  42. Sheikhan M, Bostani H (2016) “A hybrid intrusion detection architecture for internet of things”, 8th International Symposium on Telecommunications, IEEE, pp 601–606

  43. Le A, Loo J, Chai KK, Aiash M (2016) A specification-based IDS for detecting attacks on RPL-based network topology. Information 7(2):1–19

    Article  Google Scholar 

  44. Jarrah OYA, Hammdi YA, Yoo PD, Muhaidat S, Qutayri MA (2017) “Semi-supervised Multi-Layered Clustering Model for Intrusion Detection”, Digital Communications and Networks, pp. 1–12

  45. Lee D, Derrible S, Pereira FC (2018) “Comparison of four types of artificial neural network and a multinomial logit model for travel mode choice modeling”, transportation research board-2018, pp.1–12

  46. Anitha AA, Arockiam L (2019) “ANNIDS: artificial neural network based intrusion detection system for internet of things”, Int J Innov Technol Expl Eng (IJITEE) ISSN: 2278–3075, 8(11), 2583–2588

  47. Bhosale SD, Sonavane SS (2019) “A real-time intrusion detection system for wormhole attack in the rpl based internet of things”, The 12th International Conference Interdisciplinarity in Engineering, Procedia manufacturing 32, 840-847

  48. Kfoury E, Saab J, Younes P, Achkar R (2019) A self organizing map intrusion detection system for rpl protocol attacks. Int J InterdisTelecommunNetw 11(1):30–43

    Google Scholar 

  49. Sharma M, Elmiligi H, Gebali F, Verma A (2019) “Simulating attacks for RPL and generating multi-class dataset for supervised machine learning”, 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pp. 20-26

  50. Qureshi KN, Rana SS, Ahmed A, Jeon G (2020) A novel and secure attacks detection framework for Smart Cities Industrial Internet of Things. Sustain Urban Areas 2020:1–33

    Google Scholar 

  51. Sharma S, Verma VK (2020) Security explorations for routing attacks in low power networks on internet of things. J Supercomput 2020:1–35

    Google Scholar 

  52. Thubert P (2012) “Objective function zero for the routing protocol for low-power and lossy networks (RPL)”, RFC 6552; IETF Secretariat: Fremont, CA, USA, pp. 1–14

  53. Gnawali O, Levis P (2012) “The minimum rank with hysteresis objective function”, RFC 6719; IETF Secretariat: Fremont, CA, USA, pp. 1–13

  54. Jain AK, Mao J, Mohiuddin KM (1996) “Artificial neural networks: a tutorial”, Computer, 29(3), pp. 31–44

  55. Dunkels A, Gronvall A, Voigt T (2004) “Contiki–a lightweight and flexible operating system for tiny networked sensors”. 29th Annual IEEE International Conference on Local Computer Networks (LCN’04), IEEE Computer Society, pp. 455–462

  56. Sterlind FO, Dunkels A, Eriksson A, Finne J, Voigt T (2006) “Cross-level sensor network simulation with Cooja”, IEEE 31st Conference on Local Computer Networks, LCN ’06, IEEE Computer Society, pp. 641–648.

  57. Hondt AD, Bahmad H, Vanhee J (2016) “RPL attacks framework”, mobile and embedded computing LINGI2146 Report, pp.1–14

  58. Hendrawan INR, Arsa IGNW (2017) "Zolertia Z1 energy usage simulation with Cooja simulator", Informatics and Computational Sciences (ICICoS) 2017 1st International Conference on, pp. 147–152

  59. Chicco D, Jurmaan G (2020) The advantages of the Matthews correlation coefficient (MCC) over F1 score and accuracy in binary classification evaluation. BMC Genomics 21:6. https://doi.org/10.1186/s12864-019-6413-7

  60. Hussain F, Hussian R, Hassan SA, Hosssain E (2020) Machine learning in IoT security: current solutions and future challenges. IEEE CommunSurv Tutor 22(3):1686–1721

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vinod Kumar Verma.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sharma, S., Verma, V.K. AIEMLA: artificial intelligence enabled machine learning approach for routing attacks on internet of things. J Supercomput 77, 13757–13787 (2021). https://doi.org/10.1007/s11227-021-03833-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-021-03833-1

Keywords

Navigation