Skip to main content
Log in

A holistic framework for prediction of routing attacks in IoT-LLNs

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The IPv6 routing protocol for low power and lossy networks (RPL) has gained widespread application in the Internet of Things (IoT) environment. RPL has inherent security features to restrict external attacks. However, internal attacks in the IoT environment have continued to grow due to the lack of mechanisms to manage the secure identities and credentials of the billions of heterogeneous IoT devices. Weak credentials aid attackers in gaining access to IoT devices and further exploiting vulnerabilities stemming from the underlying routing protocols. Routing attacks degrade the performance of IoT networks by compromising the network resources, topology, and traffic. In this paper, we propose a holistic framework for the prediction of routing attacks in RPL-based IoT. The framework leverages Graph Convolution Network-based network embedding to capture and learn the latent state of the nodes in the IoT network. It uses a Long Short Term Memory model to predict network traffic. The framework incorporates a Feedforward Neural Network that uses network embedding and traffic prediction as input to predict routing attacks. The accuracy of any learning model depends on the integrity of the data provided to it as input. Therefore, the framework uses smart contract-fortified blockchain technology to establish secure channels for IoT data access. The smart contract within the blockchain generates warning impulses in the case of abnormal behavior of nodes. The framework predicts normal scenarios, resource attack scenarios, traffic attack scenarios, and topological attack scenarios with a fair accuracy of 94.5%, 82.46%, 91.88%, and 86.13%, respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Winter T, Thubert P, Brandt A, Hui J, Kelsey R, Pister K, Struik R, Vasseur JP, Alexander R (2012) RPL: IPv6 routing protocol for low-power and lossy networks, RFC 6550, March 2012

  2. Kim HS, Ko J, Culler DE, Paek J (2017) Challenging the IPv6 routing protocol for low-power and lossy networks (RPL): a survey. IEEE Commun Surv Tutor 19(4):2502–25

    Article  Google Scholar 

  3. Raoof A, Matrawy A, Chung-Horng L (2018) Routing attacks and mitigation methods for RPL-based Internet of Things. IEEE Commun Surv Tutor 21(2):1582–1606

    Article  Google Scholar 

  4. Mayzaud A, Badonnel R, Chrisment I (2016) A taxonomy of attacks in RPL-based Internet of Things. Int J Netw Secur 18(3):459–473

    Google Scholar 

  5. Kambourakis G, Kolias C, Stavrou A (2017) The mirai botnet and the iot zombie armies In: Proceedings of the IEEE Military Communications Conference (MILCOM), October 2017, pp 267–272

  6. Kfoury E, Saab J, Younes P, Achkar R (2019) A self organizing map intrusion detection system for RPL protocol attacks. IGI Glob JITN 11(1):30–43

    Google Scholar 

  7. Verma A, Ranga V (2019) ELNIDS: ensemble learning based network intrusion detection system for RPL based Internet of Things. In: Proceedings of the 4th IEEE International conference on Internet of Things: Smart Innovation and Usages, April 2019, pp 1–6

  8. Sahay R, Geethakumari G, Modugu K, Mitra B (2018) Traffic convergence detection in IoT LLNs: a multilayer perceptron based mechanism. In: Proceedings of the 2018 IEEE Symposium Series in Computational Intelligence, 18–21 November 2018, pp 1715–1722

  9. Hou M, Ren J, Zhang D, Kong X, Zhang D, Xia F (2020) Network embedding: taxonomies, frameworks and applications. Comput Sci Rev 38:100296

    Article  MathSciNet  Google Scholar 

  10. Huston G (2015) The internet of stupid thing, Asia-Pacific Network Information Centre (APNIC) Blog. 30 April 2015

  11. Sahay R, Geethakumari G, Mitra B (2020) A novel blockchain based framework to secure IoT-LLNs against routing attacks. Computing 102(11):2445–70

    Article  Google Scholar 

  12. Pongle P, Chavan G (2015) A survey: attacks on RPL and 6LoWPAN in IoT. In: Proceedings of the IEEE International Conference on Pervasive Computing (ICPC), January 2015, pp 1–6

  13. Dohler M, Watteyne T, Winter T, Barthel D (2009) Routing requirements for urban low-power and lossy networks. In: RFC 5548, May 2009

  14. Kharrufa H, Al-Kashoash HA, Kemp AH (2019) RPL-based routing protocols in IoT applications: a review. IEEE Sens J 19(15):5952–67

    Article  Google Scholar 

  15. Vasseur JP, Kim M, Pister K, Dejean N, Barthel D (2012) Routing metrics used for path calculation in low-power and lossy networks. In: RFC 6551 March 2012

  16. Chen H, Perozzi B, Al-Rfou R, Skiena S (2018) A tutorial on network embeddings. arXiv preprint arXiv:1808.02590

  17. Shi M, Tang Y, Zhu X, Liu J, He H (2020) Topical network embedding. Data Min Knowl Disc 34(1):75–100

    Article  MathSciNet  Google Scholar 

  18. Teslya N, Ryabchikov I (2017) Blockchain-based platform architecture for industrial IoT. In: Proceedings of the IEEE 21st Conference of Open Innovations Association, November 2017, pp 321–329

  19. Christidis K, Devetsikiotis M (2016) Blockchains and smart contracts for the internet of things. IEEE Access 4:2292–303

    Article  Google Scholar 

  20. Dvir A, Buttyan L (2011) VeRA-version number and rank authentication in RPL. In: Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems (MASS), 17 October 2011, pp 709–714

  21. Salehi M, Darehshoorzadeh A, Boukerche A (2015) On the effect of black-hole attack on opportunistic routing protocols. In: Proceedings of the 12th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, November 2015, pp 93–100

  22. Cirstea C, Cernaianu M, Gontean A (2012) Packet loss analysis in wireless sensor networks routing protocols. In: Proceedings of the 35th IEEE International Conference of Telecommunication and Signal Processing, 3 July 2012, pp 37–41

  23. Le A, Loo J, Lasebae A, Vinel A, Chen Y, Chai M (2013) The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sens J 13(10):3685–92

    Article  Google Scholar 

  24. Ghaleb B, Al-Dubai A, Ekonomou E, Qasem M, Romdhani I, Mackenzie L (2018) Addressing the DAO insider attack in RPL’s Internet of Things networks. IEEE Commun Lett 23(1):68–71

    Article  Google Scholar 

  25. Kulaua U, Muller S, Schildtb S, Busching F, Wolf L (2021) Investigation & mitigation of the energy efficiency impact of node resets in RPL. Ad Hoc Netw 114:102417

    Article  Google Scholar 

  26. Khan ZA, Herrmann P (2017) A trust based distributed intrusion detection mechanism for Internet of Things. In: Proceedings of the 31st International Conference on In Advanced Information Networking and Applications (AINA), March 2017, pp 1169–1176

  27. Khan ZA, Ullrich J, Voyiatzis, AG, Herrmann P (2017) A trust-based resilient routing mechanism for the internet of things. In Proceedings of the 12th International Conference on Availability, Reliability and Security, August 2017, pp 1–6

  28. Kamgueu PO, Nataf E, Ndie TD (2017) Survey on RPL enhancements: a focus on topology, security and mobility. Comput Commun 120:10–21

    Article  Google Scholar 

  29. Mayzaud A, Badonnel R, Chrisment I (2017) A distributed monitoring strategy for detecting version number attacks in RPL based networks. IEEE Trans Netw Serv Manag 14(2):472–86

    Article  Google Scholar 

  30. Raza S, Wallgren L, Voigt T (2013) SVELTE: real-time intrusion detection in the Internet of Things. J Ad Hoc Netw 11(8):2661–2674

    Article  Google Scholar 

  31. Perrey H, Landsmann M, Ugus O, Schmidt TC, Wählisch M (2013) TRAIL: topology authentication in RPL. arXiv preprint arXiv:1312.0984

  32. Airehrour D, Gutierrez JA, Ray SK (2019) SecTrust-RPL: a secure trust-aware RPL routing protocol for Internet of Things. Future Gen Comput Syst 93:860–76

    Article  Google Scholar 

  33. Zaminkar M, Fotohi R (2020) SoS-RPL: securing Internet of Things against sinkhole attack using RPL protocol-based node rating and ranking mechanism. Wirel Pers Commun 114:1287–1312

    Article  Google Scholar 

  34. Sahay R, Geethakumari G, Mitra B (2020) A feedforward neural network based model to predict sub-optimal path attack in IoT-LLNs. In: Proceedings of the 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID), May 2020, pp 400–409

  35. Mahdavinejad MS, Rezvan M, Barekatain M, Adibi P, Barnaghi P, Sheth AP (2018) Machine learning for Internet of Things data analysis: a survey. Digit Commun Netw 4(3):161–75

    Article  Google Scholar 

  36. Jagannath J, Polosky N, Jagannath A, Restuccia F, Melodia T (2019) Machine learning for wireless communications in the Internet of Things: a comprehensive survey. Ad Hoc Netw 93:101913

    Article  Google Scholar 

  37. Sahay R, Geethakumari G, Modugu K (2018) Attack graph-based vulnerability assessment of rank property in RPL 6LOWPAN in IoT. In: Proceedings of the 2018 IEEE World Forum on Internet of Things, 05–08 February 2018, pp 308–313

  38. Zikria YB, Afzal MK, Ishmanov F, Kim SW, Yu H (2018) A survey on routing protocols supported by the Contiki Internet of things operating system. Future Gen Comput Syst 82:200–19

    Article  Google Scholar 

  39. Vasseur JP, Kim M, Pister K, Dejean N, Barthel D (2012) Routing metrics used for path calculation in low-power and lossy networks. In: RFC 6551, March 2012

  40. Essop I, Ribeiro J, Papaioannou M, Zachos G, Mantas G, Rodriguez J (2021) Generating datasets for anomaly-based intrusion detection systems in IoT and industrial IoT networks. Sensors 21(4):1528

    Article  Google Scholar 

  41. Rouhani S, Deters R (2017) Performance analysis of Ethereum transactions in private blockchain. In: Proceedings of the 8th IEEE International Conference on Software Engineering and Service Science, November 2017, pp 70–74

  42. Edwards M, Xie X (2016) Graph based convolutional neural network. arXiv preprint arXiv:1609.08965

  43. Jiang F, Fu Y, Gupta BB, Lou F, Rho S, Meng F, Tian Z (2018) Deep learning based multi-channel intelligent attack detection for data security. IEEE Trans Sustain Comput 5(2):204–12

    Article  Google Scholar 

  44. Sahay R, Geethakumari G, Mitra B, Thejas V (2018) Exponential smoothing based approach for detection of blackhole attacks in IoT. In: Proceedings of the 12th IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), December 2018, pp 1–6

  45. Simoglou G, Violettas G, Petridou S, Mamatas L (2021) Intrusion detection systems for RPL security: a comparative analysis. Comput Secur 2:102219

    Article  Google Scholar 

  46. Glissa G, Rachedi A, Meddeb A (2016) A secure routing protocol based on RPL for Internet of Things. In: the Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), 4 December 2016, pp 1–7

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rashmi Sahay.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sahay, R., Geethakumari, G. & Mitra, B. A holistic framework for prediction of routing attacks in IoT-LLNs. J Supercomput 78, 1409–1433 (2022). https://doi.org/10.1007/s11227-021-03922-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-021-03922-1

Keywords

Navigation