Enhancing IoT security: A competitive coevolutionary strategy for detecting RPL attacks in challenging attack environments

被引:0
|
作者
Yilmaz, Selim [1 ]
机构
[1] Mugla Sitki Kocman Univ, Dept Software Engn, TR-48000 Mugla, Turkiye
关键词
RPL; RPL attacks; Intrusion detection; Competitive coevolution; Genetic programming; Genetic algorithm; INTRUSION DETECTION SYSTEM; VERSION NUMBER ATTACKS; LEARNING APPROACH; ROUTING PROTOCOL; LOW-POWER; INTERNET; THINGS; NETWORKS;
D O I
10.1016/j.comnet.2025.111185
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is a recent technology that allows heterogeneous devices to communicate with each other and the Internet. Designed specifically for IoT-enabled networks, the IPv6 Routing Protocol for Low Power Lossy Network (RPL) is adopted as standard routing protocol today. While RPL facilitates efficient routing between IoT devices, it is very susceptible to attacks, leading to numerous threats targeting different aspects of the nodes and network. Consequently, several efforts have been made to develop intrusion detection systems to secure RPL-operated networks. However, many existing solutions are tailored to specific attacks, making them unsuitable for other RPL attacks. Additionally, they depend on fixed simulations with specific scenarios, neglecting the influence of attack environments on detection system performance. The impact of RPL attacks varies with factors such as attacker density and position in the network. Consequently, it is crucial to design IDS that can effectively handle these dynamic conditions. This study addresses these challenges by proposing a competitive coevolution-based intrusion detection system that focuses on the most challenging attack environments. To achieve this, the intrusion detection algorithm and challenging attack environments are competitively evolved. Targeting the network's topology, traffic, and resources through the exploitation of control packets, this study investigates 11 RPL attacks: blackhole, DIS flooding, DAG inconsistency, DAO inconsistency, decreased rank, energy depletion, forwarding misbehavior, increased version, spam DIS, selective forwarding, and worst parent. To assess detection performance, a wide range of evaluation metrics such as accuracy, precision, recall, false alarm rate, and F1-score are used. The findings demonstrate that the proposed system ensures strong detection performance with very low memory and power consumption, suggesting its effectiveness against the attacks threatening the multiple aspects of the network and its applicability on resource-constrained nodes.
引用
收藏
页数:23
相关论文
共 50 条
  • [1] Enhancing Security in IoT Networks Through RDAD for Attack Detection in RPL-Enabled Environments
    K. Sridhar
    B. Anjanee Kumar
    S. Anjali Devi
    Vadali Pitchi Raju
    Anita Soni
    Pallavi Singh
    Shailesh Shivaji Deore
    SN Computer Science, 5 (7)
  • [2] Enhancing Routing Security in IoT: Performance Evaluation of RPL's Secure Mode Under Attacks
    Raoof, Ahmed
    Matrawy, Ashraf
    Lung, Chung-Horng
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (12) : 11536 - 11546
  • [3] Enhancing RPL for Robust and Efficient Routing in Challenging Environments
    Kantert, Jan
    Ringwald, Christian
    von Zengen, Georg
    Tomforde, Sven
    Wolf, Lars
    Mueller-Schloer, Christian
    2015 IEEE NINTH INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS WORKSHOPS (SASOW), 2015, : 7 - 12
  • [4] Assessing the Impact of RPL Attacks in Challenging Environments: An Evolution-assisted Study
    Ceviz, Ozlem
    Yilmaz, Selim
    JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2024,
  • [5] Detecting Poisoning Attacks on Machine Learning in IoT Environments
    Baracaldo, Nathalie
    Chen, Bryant
    Ludwig, Heiko
    Safavi, Amir
    Zhang, Rui
    2018 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (ICIOT), 2018, : 57 - 64
  • [6] Ensuring Security in IoT Applications by Detecting Sybil Attack
    Menon, Gayathri M.
    Nivedya, N.V.
    Nair, Nima S.
    Smart Innovation, Systems and Technologies, 2022, 243 : 307 - 318
  • [7] A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT
    Morales-Molina, Carlos D.
    Hernandez-Suarez, Aldo
    Sanchez-Perez, Gabriel
    Toscano-Medina, Linda K.
    Perez-Meana, Hector
    Olivares-Mercado, Jesus
    Portillo-Portillo, Jose
    Sanchez, Victor
    Garcia-Villalba, Luis Javier
    SENSORS, 2021, 21 (09)
  • [8] A Lightweight Solution for Detecting the Worst Parent Attack in RPL-based IoT Networks
    Abid, Meriem
    Alem, Mohammed
    AD HOC & SENSOR WIRELESS NETWORKS, 2024, 59 (3-4) : 213 - 241
  • [9] Towards a Multilayer Strategy Against Attacks on IoT Environments
    Mauro Junior, Davino
    Rodrigues, Walber
    Gama, Kiev
    Suruagy, Jose A.
    Goncalves, Paulo Andre da S.
    2019 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON SOFTWARE ENGINEERING RESEARCH & PRACTICES FOR THE INTERNET OF THINGS (SERP4IOT 2019), 2019, : 17 - 20
  • [10] Detecting the RPL Version Number Attack in IoT Networks using Deep Learning Models
    Krari, Ayoub
    Hajami, Abdelmajid
    Jarmouni, Ezzitouni
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (10) : 614 - 623