Proposing a Hybrid RPL Protocol for Rank and Wormhole Attack Mitigation using Machine Learning

Internet of Things have profoundly transformed the way technology is deployed today in different domains of life. However, its widescale implementation has also caused major security concerns in context of data communication because of escalating interconnectivity of resource-constrained smart devices. Due to the exacerbating security attack vulnerability, it has become necessary to address the issue of insecure routing in these devices. Low-power and lossy IoT networks on which they run commonly use RPL for routing due to its lightweight nature and compatibility for data transmission. However, RPL is prone to both WSN-inherited and RPL-specific attacks. Several existing solutions have addressed the detection of some of them. However, lack of mitigation techniques is observed which can extenuate attacks of both types such as wormhole as well as rank attack; when they are launched on an RPL-based network. Therefore, the aim of this study is to introduce RPL, its vulnerability to the two attacks, and the proposition that machine learning techniques like support vector machines can be effectively used to develop a secure and improved version of RPL for mitigation of both WSN-inherited and RPL-specific attacks in an RPL-based IoT network.

[1]  Mark Stamp,et al.  Detecting malware evolution using support vector machines , 2020, Expert Syst. Appl..

[2]  Rahil Hosseini,et al.  A state-of-the-art survey of malware detection approaches using data mining techniques , 2018, Human-centric Computing and Information Sciences.

[3]  Sayan Kumar Ray,et al.  Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..

[4]  Isabelle Chrisment,et al.  A Distributed Monitoring Strategy for Detecting Version Number Attacks in RPL-Based Networks , 2017, IEEE Transactions on Network and Service Management.

[5]  Tarik Taleb,et al.  An Accurate Security Game for Low-Resource IoT Devices , 2017, IEEE Transactions on Vehicular Technology.

[6]  Mohammed Anbar,et al.  DDoS attack aware environment with secure clustering and routing based on RPL protocol operation , 2019, IET Circuits Devices Syst..

[7]  Karel Heurtefeux,et al.  Enhancing RPL Resilience Against Routing Layer Insider Attacks , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications.

[8]  Cong Pu,et al.  Mitigating Forwarding misbehaviors in RPL-based low power and lossy networks , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[9]  Philip Levis,et al.  RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.

[10]  Mahadevan Supramaniam,et al.  A Review of Intrusion Detection System using Machine Learning Approach , 2019 .

[11]  Thiemo Voigt,et al.  Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.

[12]  Prakash Srivastava,et al.  Trust-based Enhanced Secure Routing against Rank and Sybil Attacks in IoT , 2019, 2019 Twelfth International Conference on Contemporary Computing (IC3).

[13]  Roberto Baldoni,et al.  Survey on the Usage of Machine Learning Techniques for Malware Analysis , 2017, Comput. Secur..

[14]  Noor Zaman,et al.  A review on smart home present state and challenges: linked to context-awareness internet of things (IoT) , 2019, Wirel. Networks.

[15]  Furkan Yusuf Yavuz,et al.  Deep Learning for Detection of Routing Attacks in the Internet of Things , 2018, Int. J. Comput. Intell. Syst..

[16]  Noor Zaman,et al.  Proposing secure and lightweight authentication scheme for IoT based E-health applications , 2018, 2018 20th International Conference on Advanced Communication Technology (ICACT).

[17]  Hon Sun Chiu,et al.  Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .

[18]  Remi Badonnel,et al.  Using the RPL protocol for supporting passive monitoring in the Internet of Things , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.

[19]  Chung-Horng Lung,et al.  Routing Attacks and Mitigation Methods for RPL-Based Internet of Things , 2019, IEEE Communications Surveys & Tutorials.

[20]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[21]  Noor Zaman,et al.  A Lightweight and Secure Authentication Scheme for IoT Based E-Health Applications , 2019 .

[22]  Michele Nogueira Lima,et al.  Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).

[23]  Seungjin Choi,et al.  Supervised Learning , 2009, Encyclopedia of Biometrics.

[24]  Imed Romdhani,et al.  Addressing the DAO Insider Attack in RPL’s Internet of Things Networks , 2019, IEEE Communications Letters.

[25]  Maysam Ghovanloo,et al.  A dual-mode passive rectifier for wide-range input power flow , 2017, 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS).

[26]  Mamoona Humayun,et al.  SYN Flood Attack Detection based on Bayes Estimator (SFADBE) For MANET , 2019, 2019 International Conference on Computer and Information Sciences (ICCIS).

[27]  Moirangthem Marjit Singh,et al.  Wormhole Attack in Wireless Sensor Networks: A Critical Review , 2018, Advanced Computing and Communication Technologies.

[28]  Sadiq Ur Rehman,et al.  Sinkhole Attacks in Wireless Sensor Networks: A Survey , 2018, Wirel. Pers. Commun..

[29]  Azzedine Boukerche,et al.  A Survey of Limitations and Enhancements of the IPv6 Routing Protocol for Low-Power and Lossy Networks: A Focus on Core Operations , 2019, IEEE Communications Surveys & Tutorials.

[30]  S. Sitharama Iyengar,et al.  A Survey on Malware Detection Using Data Mining Techniques , 2017, ACM Comput. Surv..

[31]  Remi Badonnel,et al.  A Taxonomy of Attacks in RPL-based Internet of Things , 2016, Int. J. Netw. Secur..