Cargando…

RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things

Routing protocols transmit vast amounts of sensor data between the Wireless Sensor Network (WSN) and the Internet of Things (IoT) gateway. One of these routing protocols is Routing Protocol for Low Power and Lossy Networks (RPL). The Internet Engineering Task Force (IETF) defined RPL in March 2012 a...

Descripción completa

Detalles Bibliográficos
Autores principales: Alansari, Zainab, Anuar, Nor Badrul, Kamsin, Amirrudin, Belgaum, Mohammad Riyaz
Formato: Online Artículo Texto
Lenguaje:English
Publicado: PeerJ Inc. 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10280629/
https://www.ncbi.nlm.nih.gov/pubmed/37346586
http://dx.doi.org/10.7717/peerj-cs.1309
_version_ 1785060839218216960
author Alansari, Zainab
Anuar, Nor Badrul
Kamsin, Amirrudin
Belgaum, Mohammad Riyaz
author_facet Alansari, Zainab
Anuar, Nor Badrul
Kamsin, Amirrudin
Belgaum, Mohammad Riyaz
author_sort Alansari, Zainab
collection PubMed
description Routing protocols transmit vast amounts of sensor data between the Wireless Sensor Network (WSN) and the Internet of Things (IoT) gateway. One of these routing protocols is Routing Protocol for Low Power and Lossy Networks (RPL). The Internet Engineering Task Force (IETF) defined RPL in March 2012 as a de facto distance-vector routing protocol for wireless communications with lower energy. Although RPL messages use a cryptographic algorithm for security protection, it does not help prevent internal attacks. These attacks drop some or all packets, such as blackhole or selective forwarding attacks, or change data packets, like grayhole attacks. The RPL protocol needs to be strengthened to address such an issue, as only a limited number of studies have been conducted on detecting internal attacks. Moreover, earlier research should have considered the mobility framework, a vital feature of the IoT. This article presents a novel lightweight system for anomaly detection of grayhole, blackhole, and selective forwarding attacks. The study aims to use a trust model in the RPL protocol, considering attack detection under mobility frameworks. The proposed system, anomaly detection of three RPL attacks (RPLAD3), is designed in four layers and starts operating immediately after the initial state of the network. The experiments demonstrated that RPLAD3 outperforms the RPL protocol when defeating attacks with high accuracy and a true positive ratio while lowering power and energy consumption. In addition, it significantly improves the packet delivery ratio and decreases the false positive ratio to zero.
format Online
Article
Text
id pubmed-10280629
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher PeerJ Inc.
record_format MEDLINE/PubMed
spelling pubmed-102806292023-06-21 RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things Alansari, Zainab Anuar, Nor Badrul Kamsin, Amirrudin Belgaum, Mohammad Riyaz PeerJ Comput Sci Computer Networks and Communications Routing protocols transmit vast amounts of sensor data between the Wireless Sensor Network (WSN) and the Internet of Things (IoT) gateway. One of these routing protocols is Routing Protocol for Low Power and Lossy Networks (RPL). The Internet Engineering Task Force (IETF) defined RPL in March 2012 as a de facto distance-vector routing protocol for wireless communications with lower energy. Although RPL messages use a cryptographic algorithm for security protection, it does not help prevent internal attacks. These attacks drop some or all packets, such as blackhole or selective forwarding attacks, or change data packets, like grayhole attacks. The RPL protocol needs to be strengthened to address such an issue, as only a limited number of studies have been conducted on detecting internal attacks. Moreover, earlier research should have considered the mobility framework, a vital feature of the IoT. This article presents a novel lightweight system for anomaly detection of grayhole, blackhole, and selective forwarding attacks. The study aims to use a trust model in the RPL protocol, considering attack detection under mobility frameworks. The proposed system, anomaly detection of three RPL attacks (RPLAD3), is designed in four layers and starts operating immediately after the initial state of the network. The experiments demonstrated that RPLAD3 outperforms the RPL protocol when defeating attacks with high accuracy and a true positive ratio while lowering power and energy consumption. In addition, it significantly improves the packet delivery ratio and decreases the false positive ratio to zero. PeerJ Inc. 2023-03-27 /pmc/articles/PMC10280629/ /pubmed/37346586 http://dx.doi.org/10.7717/peerj-cs.1309 Text en © 2023 Alansari et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.
spellingShingle Computer Networks and Communications
Alansari, Zainab
Anuar, Nor Badrul
Kamsin, Amirrudin
Belgaum, Mohammad Riyaz
RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things
title RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things
title_full RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things
title_fullStr RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things
title_full_unstemmed RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things
title_short RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things
title_sort rplad3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based internet of things
topic Computer Networks and Communications
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10280629/
https://www.ncbi.nlm.nih.gov/pubmed/37346586
http://dx.doi.org/10.7717/peerj-cs.1309
work_keys_str_mv AT alansarizainab rplad3anomalydetectionofblackholegrayholeandselectiveforwardingattacksinwirelesssensornetworkbasedinternetofthings
AT anuarnorbadrul rplad3anomalydetectionofblackholegrayholeandselectiveforwardingattacksinwirelesssensornetworkbasedinternetofthings
AT kamsinamirrudin rplad3anomalydetectionofblackholegrayholeandselectiveforwardingattacksinwirelesssensornetworkbasedinternetofthings
AT belgaummohammadriyaz rplad3anomalydetectionofblackholegrayholeandselectiveforwardingattacksinwirelesssensornetworkbasedinternetofthings