Collaborative Intrusion Detection System to Identify Joint Attacks in Routing Protocol for Low-Power and Lossy Networks Routing Protocol on the Internet of Everything

Main Article Content

Omar A. Abdulkareem
Raja Kumar Kontham
Farhad E. Mahmood

Abstract

The Routing Protocol for Low-Power and Lossy Networks (RPL) routing protocol is utilized in the Internet of Everything (IoE) is highly vulnerable to various collaborative routing attacks.  This attack can highly degrade network performance through increased delay, energy consumption, and unreliable data exchange. This critical vulnerability necessitates a robust intrusion detection system. This study aims to enhance a Collaborative Intrusion Detection System (CIDS) for detecting and mitigating joint attacks in the RPL protocol, focusing on improving detection accuracy while minimizing network delay and energy usage. A series of algorithms and techniques are implemented, including Queue and Workload-Aware RPL (QWL-RPL) for congestion reduction, weighted random forward RPL with a genetic algorithm for load balancing, fuzzy logic for trust evaluation, and Light Gradient Boosting Machine (GBM) for attack detection. Additionally, Q-learning with a trickle-time algorithm is used to classify and manage joint attacks effectively. Numerical analysis indicates that the proposed approach performs better than existing methods in multiple metrics, including accuracy, energy consumption, throughput, control message overhead, precision, and computing time. By integrating these diverse techniques, the proposed CIDS offers a scalable and efficient solution to improve the security and performance of RPL-based networks in IoE environments, outperforming current approaches in detection accuracy and resource optimization.


 

Downloads

Download data is not yet available.

Article Details

How to Cite
Abdulkareem, O. A., Kontham, R. K., & Mahmood , F. E. (2024). Collaborative Intrusion Detection System to Identify Joint Attacks in Routing Protocol for Low-Power and Lossy Networks Routing Protocol on the Internet of Everything . Mesopotamian Journal of CyberSecurity, 4(3), 251–277. https://doi.org/10.58496/MJCS/2024/026
Section
Articles

References

A. Jamalipour and S. Murali, "A taxonomy of Machine-learning-based Intrusion Detection Systems for the Internet of Things: A survey," IEEE Internet of Things Journal, vol. 9, no. 12, pp. 9444–9466, 2021.

N. Alfriehat, M. Anbar, S. Karuppayah, S. D. A. Rihan, B. A. Alabsi, and A. M. Momani, "Detecting Version Number Attacks in Low Power and Lossy Networks for Internet of Things Routing: Review and Taxonomy," IEEE Access, 2024.

P. D. Acevedo, D. Jabba, P. Sanmartin, S. Valle, and E. D. Nino-Ruiz, "WRF-RPL: Weighted Random Forward RPL for High Traffic and Energy Demanding Scenarios," IEEE Access, vol. 9, pp. 60163–60174, 2021.

P. Shahbakhsh, S. H. Ghafouri, and A. K. Bardsiri, "RAARPL: End-to-end Reliability-Aware Adaptive RPL Routing Protocol for the Internet of Things," International Journal of Communication Systems, vol. 36, no. 6, e5445, 2023.

V. C. Farias da Costa, L. Oliveira, and J. de Souza, "Internet of Everything (IoE) Taxonomies: A Survey and a Novel Knowledge-based Taxonomy," Sensors, vol. 21, no. 2, p. 568, 2021.

S. Kumar, P. Tiwari, and M. Zymbler, "Internet of Things is a Revolutionary Approach for Future Technology Enhancement: a Review," Journal of Big Data, vol. 6, no. 1, pp. 1–21, 2019.

R. Sahay, A. Nayyar, R. K. Shrivastava, M. Bilal, S. P. Singh, and S. Pack, "Routing Attack-Induced Anomaly Detection in IoT Network using RBM-LSTM," ICT Express, 2024.

H. S. Kim, J. Paek, D. E. Culler, and S. Bahk, "PC-RPL: Joint Control of Routing Topology and Transmission Power in Real Low-Power and Lossy Networks," ACM Trans. Sens. Netw., vol. 16, no. 2, pp. 1–32, 2020.

S. Garg, D. Mehrotra, H. M. Pandey, and S. Pandey, "Static to Dynamic Transition of RPL Protocol from IoT to IoV in Static and Mobile Environments," Cluster Computing, vol. 26, no. 1, pp. 847–862, 2023.

M. Zaminkar, F. Sarkohaki, and R. Fotohi, "A method based on Encryption and Node Rating for Securing the RPL Protocol Communications in the IoT Ecosystem," International Journal of Communication Systems, vol. 34, no. 3, e4693, 2021.

S. T. Liu and S. D. Wang, "Improved Trickle Algorithm Toward Low Power and Better Route for the RPL Routing Protocol," IEEE Access, vol. 10, pp. 83322–83335, 2022.

B. Varastan, S. Jamali, and R. Fotohi, "Hardening of the Internet of Things by using an Intrusion Detection System based on Deep Learning," Cluster Computing, pp. 1–24, 2023.

J. Wu, Y. Wang, H. Dai, C. Xu, and K. B. Kent, "Adaptive Bi-Recommendation and Self-Improving Network for Heterogeneous Domain Adaptation-Assisted IoT Intrusion Detection," IEEE Internet of Things Journal, 2023.

I. Zaatouri, N. Alyaoui, A. B. Guiloufi, F. Sailhan, and A. Kachouri, "Design and Performance Analysis of Objective Functions for RPL Routing Protocol," Wireless Personal Communications, vol. 124, no. 3, pp. 2677–2697, 2022.

K. A. Darabkh and M. Al-Akhras, "Improving Routing Protocol for Low-Power and Lossy Networks over IoT Environment," in 2021 30th Wireless and Optical Communications Conference (WOCC), 2021, pp. 31–35.

A. Thakkar and R. Lohiya, "A Review on Machine Learning and Deep Learning Perspectives of IDS for IoT: Recent Updates, Security Issues, and Challenges," Archives of Computational Methods in Engineering, vol. 28, no. 4, pp. 3211–3243, 2021.

A. Bang and U. P. Rao, "Performance Evaluation of RPL Protocol Under Decreased and Increased Rank Attacks: A Focus on Smart Home use-Case," SN Computer Science, vol. 4, no. 4, p. 329, 2023.

D. Paganraj and M. Chelliah, "DE2RA-RPL: Detection and Elimination of Resource-related Attacks in IoT RPL-based Protocol," *The Journal of Supercomputing*, pp. 1–31, 2024.

I. E. Lakhlef, B. Djamaa, M. R. Senouci, and A. Bradai, "Enhanced Multicast Protocol for Low-power and Lossy IoT Networks," IEEE Sensors Journal, 2024.

B. Rakesh, "Novel Authentication and Secure Trust-based RPL Routing in Mobile Sink Supported Internet of Things," Cyber-Physical Systems, vol. 9, no. 1, pp. 43–76, 2023.

S. M. Muzammal, R. K. Murugesan, N. Z. Jhanjhi, M. Humayun, A. O. Ibrahim, and A. Abdelmaboud, "A Trust-based Model for Secure Routing against RPL Attacks in Internet of Things," Sensors, vol. 22, no. 18, p. 7052, 2022.

C. D. Morales-Molina et al., "A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT," Sensors, vol. 21, no. 9, p. 3173, 2021.

J. F. Yonan and N. A. A. Zahra, "Node Intrusion Tendency Recognition Using Network Level Features Based Deep Learning Approach," BJN, vol. 2023, pp. 1–10, Jan. 2023.

M. Shirafkan, A. Shahidienjad, and M. Ghobaei-Arani, "An Autonomous Intrusion Detection System for the RPL Protocol," Peer-to-Peer Networking and Applications, vol. 15, no. 1, pp. 484–502, 2022.

D. B. Gothawal and S. V. Nagaraj, "An Intelligent and Lightweight Intrusion Detection Mechanism for RPL Routing Attacks by Applying Automata Model," Information Security Journal: A Global Perspective, vol. 32, no. 1, pp. 1–20, 2023.

M. Shirafkan, A. Shahidinejad, and M. Ghobaei-Arani, "An Intrusion Detection System using Deep Cellular Learning Automata and Semantic Hierarchy for Enhancing RPL Protocol Security," Cluster Computing, vol. 26, no. 4, pp. 2443–2461, 2023.

S. M. Muzammal, R. K. Murugesan, N. Z. Jhanjhi, M. S. Hossain, and A. Yassine, "Trust and Mobility-based Protocol for Secure Routing in Internet of Things," Sensors, vol. 22, no. 16, p. 6215, 2022.

N. Zahedy, B. Barekatain, and A. A. Quintana, "RI-RPL: A New High-quality RPL-based Routing Protocol using Q-learning Algorithm," The Journal of Supercomputing, vol. 80, no. 6, pp. 7691–7749, 2024.

A. O. Bang and U. P. Rao, "EMBOF-RPL: Improved RPL for Early Detection and Isolation of Rank Attack in RPL-based Internet of Things," Peer-to-Peer Networking and Applications, vol. 15, no. 1, pp. 642–665, 2022.

A. S. Bin Shibghatullah, "Mitigating Developed Persistent Threats (APTs) through Machine Learning-Based Intrusion Detection Systems: A Comprehensive Analysis," SHIFRA, vol. 2023, pp. 17–25, Mar. 2023, doi: 10.70470/SHIFRA/2023/003.

M. Nazaralipoorsoomali, P. Asghari, and S. H. H. S. Javadi, "Performance Improvement of Routing Protocol for Low-power and Lossy Networks Protocol in an Internet of Things-based Smart Retail System," International Journal of Communication Systems, vol. 35, no. 10, e5166, 2022.

M. Ezhilarasi, L. Gnanaprasanambikai, A. Kousalya, and M. Shanmugapriya, "A Novel Implementation of Routing Attack Detection Scheme by using Fuzzy and Feed-Forward Neural Networks," Soft Computing, vol. 27, no. 7, pp. 4157–4168, 2023.

H. Lamaazi and N. Benamar, "A Novel Approach for RPL Assessment based on the Objective Function and Trickle Optimizations," Wireless Communications and Mobile Computing, vol. 2019, no. 1, p. 4605095, 2019.

L. Hussain, "Fortifying AI Against Cyber Threats Advancing Resilient Systems to Combat Adversarial Attacks," EDRAAK, vol. 2024, pp. 26–31, Mar. 2024, doi: 10.70470/EDRAAK/2024/004.