Enhancing IoT security: A competitive coevolutionary strategy for detecting RPL attacks in challenging attack environments

被引:0
|
作者
Yilmaz, Selim [1 ]
机构
[1] Mugla Sitki Kocman Univ, Dept Software Engn, TR-48000 Mugla, Turkiye
关键词
RPL; RPL attacks; Intrusion detection; Competitive coevolution; Genetic programming; Genetic algorithm; INTRUSION DETECTION SYSTEM; VERSION NUMBER ATTACKS; LEARNING APPROACH; ROUTING PROTOCOL; LOW-POWER; INTERNET; THINGS; NETWORKS;
D O I
10.1016/j.comnet.2025.111185
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is a recent technology that allows heterogeneous devices to communicate with each other and the Internet. Designed specifically for IoT-enabled networks, the IPv6 Routing Protocol for Low Power Lossy Network (RPL) is adopted as standard routing protocol today. While RPL facilitates efficient routing between IoT devices, it is very susceptible to attacks, leading to numerous threats targeting different aspects of the nodes and network. Consequently, several efforts have been made to develop intrusion detection systems to secure RPL-operated networks. However, many existing solutions are tailored to specific attacks, making them unsuitable for other RPL attacks. Additionally, they depend on fixed simulations with specific scenarios, neglecting the influence of attack environments on detection system performance. The impact of RPL attacks varies with factors such as attacker density and position in the network. Consequently, it is crucial to design IDS that can effectively handle these dynamic conditions. This study addresses these challenges by proposing a competitive coevolution-based intrusion detection system that focuses on the most challenging attack environments. To achieve this, the intrusion detection algorithm and challenging attack environments are competitively evolved. Targeting the network's topology, traffic, and resources through the exploitation of control packets, this study investigates 11 RPL attacks: blackhole, DIS flooding, DAG inconsistency, DAO inconsistency, decreased rank, energy depletion, forwarding misbehavior, increased version, spam DIS, selective forwarding, and worst parent. To assess detection performance, a wide range of evaluation metrics such as accuracy, precision, recall, false alarm rate, and F1-score are used. The findings demonstrate that the proposed system ensures strong detection performance with very low memory and power consumption, suggesting its effectiveness against the attacks threatening the multiple aspects of the network and its applicability on resource-constrained nodes.
引用
收藏
页数:23
相关论文
共 50 条
  • [41] A Security Framework for Improving QoS by Detecting and Mitigating Cache Side-Channel Attacks in Virtualized Environments
    Mahipal, S.
    Sharmila, V. Ceronmani
    IAENG International Journal of Computer Science, 2023, 50 (02)
  • [42] Enhancing Network Security in SDN: Detecting Low-Rate DDoS Attacks Using Decision Trees
    Alomin, Hasen
    Gargouri, Amir
    Ghorbel, Mohamed Ali
    2024 IEEE INTERNATIONAL CONFERENCE ON ADVANCED SYSTEMS AND EMERGENT TECHNOLOGIES, ICASET 2024, 2024,
  • [43] Dynamic Security Level Changing Strategy using Attack Predictions Case Study of TCP SYN Attacks
    Lim, Sung-Hwa
    Kim, Jai-Hoon
    2014 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2014,
  • [44] An effective DDoS attack mitigation strategy for IoT using an optimization-based adaptive security model
    Kumar, Saurav
    Keshri, Ajit kumar
    KNOWLEDGE-BASED SYSTEMS, 2024, 299
  • [45] Enhancing IoT Device Security: Predicting and Analyzing Reconnaissance Attacks Using Flags and Time-Based Attributes
    Sharmin, Nazia
    Kiekintveld, Christopher
    2023 10TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY, IOTSMS, 2023, : 23 - 30
  • [46] Detecting security attacks in cyber-physical systems: a comparison of Mule and WSO2 intelligent IoT architectures
    Roldan-Gomez, Jose
    Boubeta-Puig, Juan
    Pachacama-Castillo, Gabriela
    Ortiz, Guadalupe
    Luis Martinez, Jose
    PEERJ COMPUTER SCIENCE, 2021, 7
  • [47] Detecting security attacks in cyber-physical systems: a comparison of Mule and WSO2 intelligent IoT architectures
    Roldán-Gómez J.
    Boubeta-Puig J.
    Pachacama-Castillo G.
    Ortiz G.
    Martínez J.L.
    PeerJ Computer Science, 2021, 7
  • [48] Enhancing quantum time transfer security: detecting intercept-resend attacks with energy-time entanglement
    Quan, Runai
    Hong, Huibo
    Xiang, Xiao
    Cao, Mingtao
    Li, Xinghua
    Li, Baihong
    Dong, Ruifang
    Liu, Tao
    Zhang, Shougang
    NEW JOURNAL OF PHYSICS, 2024, 26 (09):
  • [49] Enhancing Cloud Security: An Optimization-based Deep Learning Model for Detecting Denial-of-Service Attacks
    Alhazmi, Lamia
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (07) : 330 - 338
  • [50] Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features
    Inam Ullah
    Asra Noor
    Shah Nazir
    Farhad Ali
    Yazeed Yasin Ghadi
    Nida Aslam
    The Journal of Supercomputing, 2024, 80 : 5870 - 5899