Cargando…
RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things
Routing protocols transmit vast amounts of sensor data between the Wireless Sensor Network (WSN) and the Internet of Things (IoT) gateway. One of these routing protocols is Routing Protocol for Low Power and Lossy Networks (RPL). The Internet Engineering Task Force (IETF) defined RPL in March 2012 a...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10280629/ https://www.ncbi.nlm.nih.gov/pubmed/37346586 http://dx.doi.org/10.7717/peerj-cs.1309 |
_version_ | 1785060839218216960 |
---|---|
author | Alansari, Zainab Anuar, Nor Badrul Kamsin, Amirrudin Belgaum, Mohammad Riyaz |
author_facet | Alansari, Zainab Anuar, Nor Badrul Kamsin, Amirrudin Belgaum, Mohammad Riyaz |
author_sort | Alansari, Zainab |
collection | PubMed |
description | Routing protocols transmit vast amounts of sensor data between the Wireless Sensor Network (WSN) and the Internet of Things (IoT) gateway. One of these routing protocols is Routing Protocol for Low Power and Lossy Networks (RPL). The Internet Engineering Task Force (IETF) defined RPL in March 2012 as a de facto distance-vector routing protocol for wireless communications with lower energy. Although RPL messages use a cryptographic algorithm for security protection, it does not help prevent internal attacks. These attacks drop some or all packets, such as blackhole or selective forwarding attacks, or change data packets, like grayhole attacks. The RPL protocol needs to be strengthened to address such an issue, as only a limited number of studies have been conducted on detecting internal attacks. Moreover, earlier research should have considered the mobility framework, a vital feature of the IoT. This article presents a novel lightweight system for anomaly detection of grayhole, blackhole, and selective forwarding attacks. The study aims to use a trust model in the RPL protocol, considering attack detection under mobility frameworks. The proposed system, anomaly detection of three RPL attacks (RPLAD3), is designed in four layers and starts operating immediately after the initial state of the network. The experiments demonstrated that RPLAD3 outperforms the RPL protocol when defeating attacks with high accuracy and a true positive ratio while lowering power and energy consumption. In addition, it significantly improves the packet delivery ratio and decreases the false positive ratio to zero. |
format | Online Article Text |
id | pubmed-10280629 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | PeerJ Inc. |
record_format | MEDLINE/PubMed |
spelling | pubmed-102806292023-06-21 RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things Alansari, Zainab Anuar, Nor Badrul Kamsin, Amirrudin Belgaum, Mohammad Riyaz PeerJ Comput Sci Computer Networks and Communications Routing protocols transmit vast amounts of sensor data between the Wireless Sensor Network (WSN) and the Internet of Things (IoT) gateway. One of these routing protocols is Routing Protocol for Low Power and Lossy Networks (RPL). The Internet Engineering Task Force (IETF) defined RPL in March 2012 as a de facto distance-vector routing protocol for wireless communications with lower energy. Although RPL messages use a cryptographic algorithm for security protection, it does not help prevent internal attacks. These attacks drop some or all packets, such as blackhole or selective forwarding attacks, or change data packets, like grayhole attacks. The RPL protocol needs to be strengthened to address such an issue, as only a limited number of studies have been conducted on detecting internal attacks. Moreover, earlier research should have considered the mobility framework, a vital feature of the IoT. This article presents a novel lightweight system for anomaly detection of grayhole, blackhole, and selective forwarding attacks. The study aims to use a trust model in the RPL protocol, considering attack detection under mobility frameworks. The proposed system, anomaly detection of three RPL attacks (RPLAD3), is designed in four layers and starts operating immediately after the initial state of the network. The experiments demonstrated that RPLAD3 outperforms the RPL protocol when defeating attacks with high accuracy and a true positive ratio while lowering power and energy consumption. In addition, it significantly improves the packet delivery ratio and decreases the false positive ratio to zero. PeerJ Inc. 2023-03-27 /pmc/articles/PMC10280629/ /pubmed/37346586 http://dx.doi.org/10.7717/peerj-cs.1309 Text en © 2023 Alansari et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. |
spellingShingle | Computer Networks and Communications Alansari, Zainab Anuar, Nor Badrul Kamsin, Amirrudin Belgaum, Mohammad Riyaz RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things |
title | RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things |
title_full | RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things |
title_fullStr | RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things |
title_full_unstemmed | RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things |
title_short | RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things |
title_sort | rplad3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based internet of things |
topic | Computer Networks and Communications |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10280629/ https://www.ncbi.nlm.nih.gov/pubmed/37346586 http://dx.doi.org/10.7717/peerj-cs.1309 |
work_keys_str_mv | AT alansarizainab rplad3anomalydetectionofblackholegrayholeandselectiveforwardingattacksinwirelesssensornetworkbasedinternetofthings AT anuarnorbadrul rplad3anomalydetectionofblackholegrayholeandselectiveforwardingattacksinwirelesssensornetworkbasedinternetofthings AT kamsinamirrudin rplad3anomalydetectionofblackholegrayholeandselectiveforwardingattacksinwirelesssensornetworkbasedinternetofthings AT belgaummohammadriyaz rplad3anomalydetectionofblackholegrayholeandselectiveforwardingattacksinwirelesssensornetworkbasedinternetofthings |