Exploring placement of intrusion detection systems in rpl-based internet of things

Intrusion detection is an indispensable part of RPL security due to its nature opening to attacks from insider attackers. While there are a good deal of studies that analyze different types of attack and propose intrusion detection systems based on various techniques that are proposed in the literature, how to place such intrusion detection systems on RPL topology is not investigated. This is the main contribution of this study, and three intrusion detection architectures based on central and distributed placement of intrusion detection nodes are analyzed rigorously against different types of attacks and attackers at various locations in the RPL topology and evaluated from different aspects including their effectiveness, cost, and security.

[1]  Ali Seyfollahi,et al.  A Review of Intrusion Detection Systems in RPL Routing Protocol Based on Machine Learning for Internet of Things Applications , 2021, Wirel. Commun. Mob. Comput..

[2]  Naghmeh Moradpoor,et al.  Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two Objective Functions Using a Novel Dataset , 2020, Secur. Commun. Networks.

[3]  Abhishek Verma,et al.  Mitigation of DIS flooding attacks in RPL‐based 6LoWPAN networks , 2019, Trans. Emerg. Telecommun. Technol..

[4]  Virender Ranga,et al.  ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things , 2019, 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU).

[5]  L Arockiam,et al.  E2V: Techniques for Detecting and Mitigating Rank Inconsistency Attack (RInA) in RPL based Internet of Things , 2018, Journal of Physics: Conference Series.

[6]  Abdur Rehman,et al.  Detection of rank attack in routing protocol for Low Power and Lossy Networks , 2018, Ann. des Télécommunications.

[7]  Ashwini Nikam,et al.  Opinion Metric Based Intrusion Detection Mechanism for RPL Protocol in IoT , 2018, 2018 3rd International Conference for Convergence in Technology (I2CT).

[8]  Ismail Ahmedy,et al.  Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol , 2018, IEEE Access.

[9]  David E. Culler,et al.  Challenging the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL): A Survey , 2017, IEEE Communications Surveys & Tutorials.

[10]  Prachi Shukla,et al.  ML-IDS: A machine learning approach to detect wormhole attacks in Internet of Things , 2017, 2017 Intelligent Systems Conference (IntelliSys).

[11]  Mansour Sheikhan,et al.  A Security Mechanism for Detecting Intrusions in Internet of Things Using Selected Features Based on MI-BGSA , 2017 .

[12]  Isabelle Chrisment,et al.  A Distributed Monitoring Strategy for Detecting Version Number Attacks in RPL-Based Networks , 2017, IEEE Transactions on Network and Service Management.

[13]  Imed Romdhani,et al.  A Trust-Based Intrusion Detection System for Mobile RPL Based Networks , 2017, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[14]  Sean Carlisto de Alvarenga,et al.  A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..

[15]  Peter Herrmann,et al.  A Trust Based Distributed Intrusion Detection Mechanism for Internet of Things , 2017, 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA).

[16]  Mansour Sheikhan,et al.  Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach , 2017, Comput. Commun..

[17]  Abbas Javed,et al.  Intelligent Intrusion Detection in Low-Power IoTs , 2016, ACM Trans. Internet Techn..

[18]  Sayan Kumar Ray,et al.  Securing RPL routing protocol from blackhole attacks using a trust-based mechanism , 2016, 2016 26th International Telecommunication Networks and Applications Conference (ITNAC).

[19]  Jonathan Loo,et al.  A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology , 2016, Inf..

[20]  Remi Badonnel,et al.  A Taxonomy of Attacks in RPL-based Internet of Things , 2016, Int. J. Netw. Secur..

[21]  Sema F. Oktug,et al.  RPL version number attacks: In-depth study , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.

[22]  Remi Badonnel,et al.  Addressing DODAG inconsistency attacks in RPL networks , 2014, 2014 Global Information Infrastructure and Networking Symposium (GIIS).

[23]  Remi Badonnel,et al.  A Study of RPL DODAG Version Attacks , 2014, AIMS.

[24]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[25]  Maurizio A. Spirito,et al.  Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[26]  Jonathan Loo,et al.  The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks , 2013, IEEE Sensors Journal.

[27]  Philip Levis,et al.  RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.

[28]  Jonathan Loo,et al.  Specification-based IDS for securing RPL from topology attacks , 2011, 2011 IFIP Wireless Days (WD).

[29]  Gaël Varoquaux,et al.  Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..

[30]  Adam Dunkels,et al.  Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.

[31]  L. Breiman Random Forests , 2001, Encyclopedia of Machine Learning and Data Mining.

[32]  Selim Yılmaz,et al.  Analysis of RPL Objective Functions with Security Perspective , 2022, SENSORNETS.

[33]  Emre Aydogan,et al.  A Transfer Learning Approach for Securing Resource-Constrained IoT Devices , 2021, IEEE Transactions on Information Forensics and Security.

[34]  Sevil Sen,et al.  A Cross-Layer Intrusion Detection System for RPL-Based Internet of Things , 2020, ADHOC-NOW.