Fatima Al-Quayed, Sana Rauf Awan, Noshina Tariq, Mamoona Humayun, Thanaa S Alnusairi, Tayyab Rehman
{"title":"CID-RPL: Clone ID Attack Detection Using Deep Neural Network for RPL-Based IoT Networks","authors":"Fatima Al-Quayed, Sana Rauf Awan, Noshina Tariq, Mamoona Humayun, Thanaa S Alnusairi, Tayyab Rehman","doi":"10.1049/cmu2.70067","DOIUrl":null,"url":null,"abstract":"<p>The proliferation of the Internet of Things (IoT) has reshaped industries based on seamless connectivity. However, it has also brought about immense security challenges, especially in the communication protocol of routing protocol for low-power and lossy networks (RPL). One of these security threats vital to the RPL-based IoT networks includes the Clone ID attack on malicious nodes when they clone the identity of legitimate nodes to access their sensitive data without authorization. Detecting Clone ID attacks in RPL-based IoT networks is complex because network traffic data has high dimensions and substantial data imbalances while facing limited resources in these environments. The unmanaged control message system and insufficient identity authentication methods within the RPL protocol directly expose networks to state-of-the-art cyber security threats. This paper proposes a new edge layer-based deep neural network (DNN) approach to detect Clone ID attacks from IoT sensor networks by network traffic pattern analysis. The proposed method is based on deep data features to distinguish legitimate nodes from cloned nodes and improve the overall security, resilience, and operational efficiency of RPL-based IoT networks. To check the efficiency of our proposed method, we designed a synthetic dataset called CID-RPL. The CID-RPL dataset consists of 25 attributes and 2,131,328 samples. The experimental results are best to describe that our proposed approach outperformed the previously designed methods by offering an accuracy improvement of 5.06%, precision improvement of 7.60%, recall increment of 7.0%, and F1 score enhancement of 11.0%. Similarly, residual energy at the network level increased by 32.84%, which infers that the lifetime of the network will be extended and its energy efficiency increased under attack situations. Thus, the results testify to the effectiveness of the DL-based solution proposed herein to detect Clone ID attacks in dynamic and evolving network environments.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6000,"publicationDate":"2025-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70067","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Communications","FirstCategoryId":"94","ListUrlMain":"https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/cmu2.70067","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
The proliferation of the Internet of Things (IoT) has reshaped industries based on seamless connectivity. However, it has also brought about immense security challenges, especially in the communication protocol of routing protocol for low-power and lossy networks (RPL). One of these security threats vital to the RPL-based IoT networks includes the Clone ID attack on malicious nodes when they clone the identity of legitimate nodes to access their sensitive data without authorization. Detecting Clone ID attacks in RPL-based IoT networks is complex because network traffic data has high dimensions and substantial data imbalances while facing limited resources in these environments. The unmanaged control message system and insufficient identity authentication methods within the RPL protocol directly expose networks to state-of-the-art cyber security threats. This paper proposes a new edge layer-based deep neural network (DNN) approach to detect Clone ID attacks from IoT sensor networks by network traffic pattern analysis. The proposed method is based on deep data features to distinguish legitimate nodes from cloned nodes and improve the overall security, resilience, and operational efficiency of RPL-based IoT networks. To check the efficiency of our proposed method, we designed a synthetic dataset called CID-RPL. The CID-RPL dataset consists of 25 attributes and 2,131,328 samples. The experimental results are best to describe that our proposed approach outperformed the previously designed methods by offering an accuracy improvement of 5.06%, precision improvement of 7.60%, recall increment of 7.0%, and F1 score enhancement of 11.0%. Similarly, residual energy at the network level increased by 32.84%, which infers that the lifetime of the network will be extended and its energy efficiency increased under attack situations. Thus, the results testify to the effectiveness of the DL-based solution proposed herein to detect Clone ID attacks in dynamic and evolving network environments.
期刊介绍:
IET Communications covers the fundamental and generic research for a better understanding of communication technologies to harness the signals for better performing communication systems using various wired and/or wireless media. This Journal is particularly interested in research papers reporting novel solutions to the dominating problems of noise, interference, timing and errors for reduction systems deficiencies such as wasting scarce resources such as spectra, energy and bandwidth.
Topics include, but are not limited to:
Coding and Communication Theory;
Modulation and Signal Design;
Wired, Wireless and Optical Communication;
Communication System
Special Issues. Current Call for Papers:
Cognitive and AI-enabled Wireless and Mobile - https://digital-library.theiet.org/files/IET_COM_CFP_CAWM.pdf
UAV-Enabled Mobile Edge Computing - https://digital-library.theiet.org/files/IET_COM_CFP_UAV.pdf