R. Sahay, G. Geethakumari, Koushik Modugu, Barsha Mitra
{"title":"Traffic Convergence Detection in IoT LLNs: A Multilayer Perceptron based Mechanism","authors":"R. Sahay, G. Geethakumari, Koushik Modugu, Barsha Mitra","doi":"10.1109/SSCI.2018.8628921","DOIUrl":null,"url":null,"abstract":"The Low power and Lossy Networks (LLNs) form an important segment of the Internet of Things (IoT). LLNs comprise of sensors and RFIDs which are constrained and not IP-enabled. IPv6 over Low power Personal Area Networks (6LoWPAN) enables connectivity of constrained non IP-enabled devices to the Internet. The routing protocol used in 6LoWPAN is IPv6 Routing Protocol over Low power and lossy networks (RPL). Though RPL meets all the routing requirements of LLNs, it is prone to several attacks. Among the several RPL attacks, misappropriation attacks are those which disrupt the legitimate path of traffic flow in the lossy network and causes convergence of a large section of traffic towards a particular malicious node. Also, misappropriation attacks can make the LLNs vulnerable to several other security attacks. Hence, it is important to timely detect misappropriation attacks. In this paper, we propose a mechanism to detect misappropriation attacks in IoT LLNs. Our approach makes use of Multilayer Perceptron (MLP) neural network as a classification tool. The MLP classifies the network data as normal or as under attack. Our proposed mechanism also identifies the nodes affected by the attack and identifies the attacker node.","PeriodicalId":235735,"journal":{"name":"2018 IEEE Symposium Series on Computational Intelligence (SSCI)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE Symposium Series on Computational Intelligence (SSCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SSCI.2018.8628921","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
The Low power and Lossy Networks (LLNs) form an important segment of the Internet of Things (IoT). LLNs comprise of sensors and RFIDs which are constrained and not IP-enabled. IPv6 over Low power Personal Area Networks (6LoWPAN) enables connectivity of constrained non IP-enabled devices to the Internet. The routing protocol used in 6LoWPAN is IPv6 Routing Protocol over Low power and lossy networks (RPL). Though RPL meets all the routing requirements of LLNs, it is prone to several attacks. Among the several RPL attacks, misappropriation attacks are those which disrupt the legitimate path of traffic flow in the lossy network and causes convergence of a large section of traffic towards a particular malicious node. Also, misappropriation attacks can make the LLNs vulnerable to several other security attacks. Hence, it is important to timely detect misappropriation attacks. In this paper, we propose a mechanism to detect misappropriation attacks in IoT LLNs. Our approach makes use of Multilayer Perceptron (MLP) neural network as a classification tool. The MLP classifies the network data as normal or as under attack. Our proposed mechanism also identifies the nodes affected by the attack and identifies the attacker node.
低功耗和有损网络(lln)是物联网(IoT)的重要组成部分。lln由传感器和rfid组成,它们是受限的,不支持ip。IPv6 over Low power Personal Area Networks (6LoWPAN)使受限制的非ip设备能够连接到Internet。6LoWPAN使用的路由协议是IPv6 routing protocol over Low power and lossy networks (RPL)。RPL虽然能满足lln的所有路由需求,但也容易受到多种攻击。在各种RPL攻击中,盗用攻击是指在有损耗网络中破坏流量的合法路径,导致大量流量向特定恶意节点汇聚的攻击。此外,盗用攻击会使lln容易受到其他几种安全攻击。因此,及时发现盗用攻击是非常重要的。在本文中,我们提出了一种检测物联网lln中的盗用攻击的机制。我们的方法利用多层感知器(MLP)神经网络作为分类工具。MLP将网络数据分为正常和受攻击两类。我们提出的机制还可以识别受攻击影响的节点并识别攻击者节点。