A Lightweight Intrusion Detection for Sybil Attack Under Mobile RPL in the Internet of Things

The routing protocol for low-power and lossy networks (RPLs) is a standard routing protocol for resource-constrained devices in the Internet of Things (IoT) networks. Primarily, RPL can support a dynamic range of mobility among the nodes in the network, which becomes a great demand now for real-time applications. At the same time, RPL is much vulnerable to various security attacks because of its resource-constrained nature. Such security attacks might cause severe threats and destructive behavior inside the network. In this article, we primarily focus on the Sybil attack, where an attacker claims multiple illegitimate identities either by fabricating or compromising the nodes. Also, in this type of attack, a single adversary is required to control multiple legitimate nodes in the network, and thereby, the adversary node saves the physical resources. In this article, we propose a novel artificial bee colony (ABC)-inspired mobile Sybil attack modeling and lightweight intrusion detection algorithm for the Sybil attack in mobile RPL. Moreover, we considered three different categories of Sybil attack based on its behavior, and we analyze the performance of the RPL under the Sybil attack in terms of packet delivery ratio, control traffic overhead, and energy consumption. Also, we examine the performance of the proposed algorithm in terms of accuracy, sensitivity, and specificity.

[1]  Farid Najafi,et al.  A Novel Hybrid Classification Model of Genetic Algorithms, Modified k-Nearest Neighbor and Developed Backpropagation Neural Network , 2014, PloS one.

[2]  Julien Montavont,et al.  Analysis and performance evaluation of RPL under mobility , 2014, 2014 IEEE Symposium on Computers and Communications (ISCC).

[3]  Thiemo Voigt,et al.  Intrusion Detection in the RPL-connected 6LoWPAN Networks , 2017, IoTPTS@AsiaCCS.

[4]  Gabriel Montenegro,et al.  IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.

[5]  Xiaohui Liang,et al.  Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.

[6]  Siarhei Kuryla,et al.  RPL: IPv6 Routing Protocol for Low power and Lossy Networks , 2010 .

[7]  Laurence T. Yang,et al.  Analytical Model for Sybil Attack Phases in Internet of Things , 2019, IEEE Internet of Things Journal.

[8]  Sayan Kumar Ray,et al.  SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things , 2019, Future Gener. Comput. Syst..

[9]  Deepak Goyal,et al.  A Review on Artificial Bee Colony in MANET , 2014 .

[10]  Raed A. Alsaqour,et al.  Mobile Ad Hoc Network Energy Cost Algorithm Based on Artificial Bee Colony , 2017, Wirel. Commun. Mob. Comput..

[11]  Dervis Karaboga,et al.  A comprehensive survey: artificial bee colony (ABC) algorithm and applications , 2012, Artificial Intelligence Review.

[12]  Philip Levis,et al.  The Minimum Rank with Hysteresis Objective Function , 2012, RFC.

[13]  Djamel Tandjaoui,et al.  Analytical evaluation of the impacts of Sybil attacks against RPL under mobility , 2015, 2015 12th International Symposium on Programming and Systems (ISPS).

[14]  Abbas Jamalipour,et al.  Mobility-Aware Energy-Efficient Parent Selection Algorithm for Low Power and Lossy Networks , 2019, IEEE Internet of Things Journal.

[15]  Mário Alves,et al.  mRPL: Boosting mobility in the Internet of Things , 2015, Ad Hoc Networks.