Random forest classifier‐based safe and reliable routing for opportunistic IoT networks

Designing a safe and reliable way for communicating the messages among the devices and humans forming the Opportunistic Internet of Things network (OppIoT) has been a challenge since the broadcast mode of message sharing is used. To contribute toward addressing such challenge, this paper proposes a Random Forest Classifier (RFC)‐based safe and reliable routing protocol for OppIoT (called RFCSec) which ensures space efficiency, hash‐based message integrity, and high packet delivery, simultaneously protecting the network against safety threats viz. packet collusion, hypernova, supernova, and wormhole attacks. The proposed RFCSec scheme is composed of two phases. In the first one, the RFC is trained on real data trace, and based on the output of this training, the second phase consists in classifying the encountered nodes of a given node as belonging to one of the output classes of nodes based on their past behavior in the network. This helps in proactively isolating the malicious nodes from participating in the routing process and encourages the participation of the ones with good message forwarding behavior, low packet dropping rate, high buffer availability, and a higher probability of delivering the messages in the past. Simulation results using the ONE simulator show that the proposed RFCSec secure routing scheme is superior to the MLProph, RLProph, and CAML routing protocols, chosen as benchmarks, in terms of legitimate packet delivery, probability of message delivery, count of dropped messages, and latency in packet delivery. The out‐of‐bag error obtained is also minimal

[1]  Martin Kopp,et al.  Anomaly explanation with random forests , 2020, Expert Syst. Appl..

[2]  Joel J. P. C. Rodrigues,et al.  RLProph: a dynamic programming based reinforcement learning approach for optimal routing in opportunistic IoT networks , 2020, Wirel. Networks.

[3]  S. M. Dilip Kumar,et al.  Machine Learning Based Efficient Multi-copy Routing for OppIoT Networks , 2019 .

[4]  Deepak Kumar Sharma,et al.  A Machine Learning Approach Using Classifier Cascades for Optimal Routing in Opportunistic Internet of Things Networks , 2019, 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).

[5]  Joel J. P. C. Rodrigues,et al.  A Machine Learning-Based Protocol for Efficient Routing in Opportunistic Networks , 2018, IEEE Systems Journal.

[6]  Sanjay Sharma,et al.  Detection of Advanced Malware by Machine Learning Techniques , 2018, Advances in Intelligent Systems and Computing.

[7]  Rahul Gomes,et al.  Random Forest Classifier in SDN Framework for User-Based Indoor Localization , 2018, 2018 IEEE International Conference on Electro/Information Technology (EIT).

[8]  Santosh Biswas,et al.  MATEM: A unified framework based on trust and MCDM for assuring security, reliability and QoS in DTN routing , 2018, J. Netw. Comput. Appl..

[9]  Wei Liu,et al.  A principle component analysis-based random forest with the potential nearest neighbor method for automobile insurance fraud identification , 2017, Appl. Soft Comput..

[10]  Qi Zhao,et al.  Detection of DNS DDoS Attacks with Random Forest Algorithm on Spark , 2018, FNC/MobiSPC.

[11]  Mohammad S. Obaidat,et al.  Supernova and Hypernova Misbehavior Detection Scheme for Opportunistic Networks , 2017, 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA).

[12]  Vicky H. Mak-Hau,et al.  Defense against packet collusion attacks in opportunistic networks , 2017, Comput. Secur..

[13]  Anthony Skjellum,et al.  Using machine learning to secure IoT systems , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).

[14]  H. Vincent Poor,et al.  Machine Learning Methods for Attack Detection in the Smart Grid , 2015, IEEE Transactions on Neural Networks and Learning Systems.

[15]  Ali Feizollah,et al.  Evaluation of machine learning classifiers for mobile malware detection , 2014, Soft Computing.

[16]  Andrew W. Appel,et al.  Verification of a Cryptographic Primitive: SHA-256 , 2015, TOPL.

[17]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[18]  Zhu Wang,et al.  Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things , 2013, J. Netw. Comput. Appl..

[19]  Mohammed S. Alam,et al.  Random Forest Classification for Detecting Android Malware , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.

[20]  Yajin Zhou,et al.  Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.

[21]  Rob Stocker,et al.  Using Decision Tree for Diagnosing Heart Disease Patients , 2011, AusDM.

[22]  J. Ott,et al.  The ONE simulator for DTN protocol evaluation , 2009, SimuTools.

[23]  Marco Conti,et al.  Opportunistic networking: data forwarding in disconnected mobile ad hoc networks , 2006, IEEE Communications Magazine.

[24]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.