Proposing a Hybrid RPL Protocol for Rank and Wormhole Attack Mitigation using Machine Learning

Fatima-tuz-Zahra, Noor Zaman Jhanjhi, S. Brohi, Nazir A. Malik, M. Humayun
{"title":"Proposing a Hybrid RPL Protocol for Rank and Wormhole Attack Mitigation using Machine Learning","authors":"Fatima-tuz-Zahra, Noor Zaman Jhanjhi, S. Brohi, Nazir A. Malik, M. Humayun","doi":"10.1109/ICCIS49240.2020.9257607","DOIUrl":null,"url":null,"abstract":"Internet of Things have profoundly transformed the way technology is deployed today in different domains of life. However, its widescale implementation has also caused major security concerns in context of data communication because of escalating interconnectivity of resource-constrained smart devices. Due to the exacerbating security attack vulnerability, it has become necessary to address the issue of insecure routing in these devices. Low-power and lossy IoT networks on which they run commonly use RPL for routing due to its lightweight nature and compatibility for data transmission. However, RPL is prone to both WSN-inherited and RPL-specific attacks. Several existing solutions have addressed the detection of some of them. However, lack of mitigation techniques is observed which can extenuate attacks of both types such as wormhole as well as rank attack; when they are launched on an RPL-based network. Therefore, the aim of this study is to introduce RPL, its vulnerability to the two attacks, and the proposition that machine learning techniques like support vector machines can be effectively used to develop a secure and improved version of RPL for mitigation of both WSN-inherited and RPL-specific attacks in an RPL-based IoT network.","PeriodicalId":425637,"journal":{"name":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"27","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 2nd International Conference on Computer and Information Sciences (ICCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIS49240.2020.9257607","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 27

Abstract

Internet of Things have profoundly transformed the way technology is deployed today in different domains of life. However, its widescale implementation has also caused major security concerns in context of data communication because of escalating interconnectivity of resource-constrained smart devices. Due to the exacerbating security attack vulnerability, it has become necessary to address the issue of insecure routing in these devices. Low-power and lossy IoT networks on which they run commonly use RPL for routing due to its lightweight nature and compatibility for data transmission. However, RPL is prone to both WSN-inherited and RPL-specific attacks. Several existing solutions have addressed the detection of some of them. However, lack of mitigation techniques is observed which can extenuate attacks of both types such as wormhole as well as rank attack; when they are launched on an RPL-based network. Therefore, the aim of this study is to introduce RPL, its vulnerability to the two attacks, and the proposition that machine learning techniques like support vector machines can be effectively used to develop a secure and improved version of RPL for mitigation of both WSN-inherited and RPL-specific attacks in an RPL-based IoT network.
提出一种基于机器学习的混合RPL协议,用于Rank和虫洞攻击缓解
物联网深刻地改变了当今技术在不同生活领域的部署方式。然而,由于资源受限的智能设备的互联性不断升级,其广泛实施也引起了数据通信背景下的重大安全问题。由于安全攻击漏洞的加剧,有必要解决这些设备中不安全路由的问题。由于RPL的轻量级和数据传输兼容性,它们运行的低功耗和损耗物联网网络通常使用RPL进行路由。但是,RPL容易受到wsn继承攻击和特定于RPL的攻击。一些现有的解决方案已经解决了其中一些问题的检测。然而,观察到缺乏缓解技术,可以减轻两种类型的攻击,如虫洞攻击和等级攻击;当它们在基于rpl的网络上发射时。因此,本研究的目的是介绍RPL及其对这两种攻击的脆弱性,并提出可以有效地使用机器学习技术(如支持向量机)开发安全和改进版本的RPL,以缓解基于RPL的物联网网络中的wsn继承和特定于RPL的攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信