A Transfer Learning Approach for Securing Resource-Constrained IoT Devices

In recent years, Internet of Things (IoT) security has attracted significant interest by researchers due to new characteristics of IoT such as heterogeneity of devices, resource constraints, and new types of attacks targeting IoT. Intrusion detection, which is an indispensable part of a security system, is also included in these studies. In order to explore the complex characteristics of IoT, machine learning methods, which rely on long training time to generate intrusion detection models, are proposed in the literature. Furthermore, these systems need to learn a new/fresh model from scratch when the environment changes. This study explores the use of transfer learning in order to generate intrusion detection algorithms for such dynamically changing IoT. Transfer learning is an approach that stores knowledge learned from a problem domain/task and applies that knowledge to another problem domain/task. Here, it is employed in the following two settings: transferring knowledge for generating suitable intrusion algorithms for new devices, transferring knowledge for detecting new types of attacks. In this study, Routing Protocol for Low-Power and Lossy Network (RPL), a routing protocol for resource-constrained wireless networks, is used as an exemplar protocol and specific attacks against RPL are targeted. The experimental results show that the transfer learning approach gives better performance than the traditional approach. Moreover, the proposed approach significantly reduces learning time, which is an important factor for putting devices/networks in operation in a timely manner. Even though transfer learning has been considered a potential candidate for improving IoT security, to the best of our knowledge, this is the first application of transfer learning under these two settings in RPL-based IoT networks.

[1]  Gianluca Dini,et al.  DIO Suppression Attack Against Routing in the Internet of Things , 2017, IEEE Communications Letters.

[2]  Hui Xiong,et al.  A Comprehensive Survey on Transfer Learning , 2019, Proceedings of the IEEE.

[3]  Xiaojiang Du,et al.  A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security , 2018, IEEE Communications Surveys & Tutorials.

[4]  Abdur Rehman,et al.  Detection of rank attack in routing protocol for Low Power and Lossy Networks , 2018, Ann. des Télécommunications.

[5]  Remi Badonnel,et al.  A Study of RPL DODAG Version Attacks , 2014, AIMS.

[6]  Virender Ranga,et al.  Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review , 2020, IEEE Sensors Journal.

[7]  Remi Badonnel,et al.  A Taxonomy of Attacks in RPL-based Internet of Things , 2016, Int. J. Netw. Secur..

[8]  Dervis Karaboga,et al.  A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm , 2007, J. Glob. Optim..

[9]  Antonio Robles-Kelly,et al.  Toward a Deep Learning-Driven Intrusion Detection Approach for Internet of Things , 2020, ArXiv.

[10]  Furkan Yusuf Yavuz,et al.  Deep Learning for Detection of Routing Attacks in the Internet of Things , 2018, Int. J. Comput. Intell. Syst..

[11]  Sevil Sen,et al.  A Cross-Layer Intrusion Detection System for RPL-Based Internet of Things , 2020, ADHOC-NOW.

[12]  Sema F. Oktug,et al.  New lightweight mitigation techniques for RPL version number attacks , 2019, Ad Hoc Networks.

[13]  John R. Koza,et al.  Genetic programming as a means for programming computers by natural selection , 1994 .

[14]  Nguyen Quang Uy,et al.  Transfer learning in genetic programming , 2015, 2015 IEEE Congress on Evolutionary Computation (CEC).

[15]  Sema F. Oktug,et al.  RPL version number attacks: In-depth study , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.

[16]  Wen-Zhan Song,et al.  Enhanced Cyber-Physical Security in Internet of Things Through Energy Auditing , 2019, IEEE Internet of Things Journal.

[17]  Ismail Ahmedy,et al.  Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol , 2018, IEEE Access.

[18]  Philip Levis,et al.  RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.

[19]  Jonathan Loo,et al.  The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks , 2013, IEEE Sensors Journal.

[20]  Kalyanmoy Deb,et al.  A fast and elitist multiobjective genetic algorithm: NSGA-II , 2002, IEEE Trans. Evol. Comput..

[21]  Eryk Dutkiewicz,et al.  Deep Transfer Learning for IoT Attack Detection , 2020, IEEE Access.

[22]  Virender Ranga,et al.  Addressing Flooding Attacks in IPv6-based Low Power and Lossy Networks , 2019, TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON).

[23]  Xiang-Yang Li,et al.  System Statistics Learning-Based IoT Security: Feasibility and Suitability , 2019, IEEE Internet of Things Journal.

[24]  Jonathan Loo,et al.  A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology , 2016, Inf..

[25]  A. E. Eiben,et al.  Introduction to Evolutionary Computing , 2003, Natural Computing Series.

[26]  Hon Sun Chiu,et al.  Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .

[27]  Qiang Yang,et al.  A Survey on Transfer Learning , 2010, IEEE Transactions on Knowledge and Data Engineering.

[28]  David E. Culler,et al.  Challenging the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL): A Survey , 2017, IEEE Communications Surveys & Tutorials.

[29]  Antonio J. Nebro,et al.  jMetal: A Java framework for multi-objective optimization , 2011, Adv. Eng. Softw..

[30]  Riccardo Poli,et al.  Genetic Programming An Introductory Tutorial and a Survey of Techniques and Applications , 2011 .

[31]  Adam Dunkels,et al.  Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.

[32]  Mikael Gidlund,et al.  A Central Intrusion Detection System for RPL-Based Industrial Internet of Things , 2019, 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS).

[33]  Yuval Elovici,et al.  N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders , 2018, IEEE Pervasive Computing.

[34]  Isabelle Chrisment,et al.  A Distributed Monitoring Strategy for Detecting Version Number Attacks in RPL-Based Networks , 2017, IEEE Transactions on Network and Service Management.

[35]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.