Protocol-Specific and Sensor Network-Inherited Attack Detection in IoT Using Machine Learning

Author:

Zahra F.,Jhanjhi N. Z.ORCID,Khan N. A.,Brohi Sarfraz Nawaz,Masud MehediORCID,Aljahdali Sultan

Abstract

For networks with limited resources, such as IoT-enabled smart homes, smart industrial equipment, and urban infrastructures, the Routing Protocol for Low-power and Lossy Networks (RPL) was developed. Additionally, a number of optimizations have been suggested for its application in other contexts, such as smart hospitals, etc. Although these networks offer efficient routing, the lack of active security features in RPL makes them vulnerable to attacks. The types of attacks include protocol-specific ones and those inherited by wireless sensor networks. They have been addressed by a number of different proposals, many of which have achieved substantial prominence. However, concurrent handling of both types of attacks is not considered while developing a machine-learning-based attack detection model. Therefore, the ProSenAD model is proposed for addressing the identified gap. Multiclass classification has been used to optimize the light gradient boosting machine model for the detection of protocol-specific rank attacks and sensor network-inherited wormhole attacks. The proposed model is evaluated in two different scenarios considering the number of attacks and the benchmarks for comparison in each scenario. The evaluation results demonstrate that the proposed model outperforms with respect to the metrics including accuracy, precision, recall, Cohen’s Kappa, cross entropy, and the Matthews correlation coefficient.

Funder

Taif University

Publisher

MDPI AG

Subject

Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science

Reference63 articles.

1. Using the Internet of Things in Smart Energy Systems and Networks;Sustain. Cities Soc.,2021

2. Systematic Review of Resource Allocation Methods Using Scheduling for M2M (Machine to Machine Communication) in IoT Network;Stud. Syst. Decis. Control,2021

3. Significance of Sensors for Industry 4.0: Roles, Capabilities, and Applications;Sens. Int.,2021

4. A Secure IoT Sensors Communication in Industry 4.0 Using Blockchain Technology;J. Ambient. Intell. Humaniz. Comput.,2020

5. Vailshery, L. (2022, June 13). Number of Internet of Things (IoT) Connected Devices Worldwide from 2019 to 2030 (In Billions). Available online: https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/.

Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Federated Learning for Collaborative Cyber Defense;Advances in Digital Crime, Forensics, and Cyber Terrorism;2024-09-13

2. FL-DSFA: Securing RPL-Based IoT Networks against Selective Forwarding Attacks Using Federated Learning;Sensors;2024-09-08

3. Explainable AI for Cybersecurity;Advances in Computational Intelligence and Robotics;2024-01-18

4. A Lightweight Mitigation Approach against a New Inundation Attack in RPL-Based IoT Networks;Applied Sciences;2023-09-16

5. Machine Learning-assisted Cluster-based Routing Protocol for Wireless Smart Grids;2023 International Conference on Data Science and Network Security (ICDSNS);2023-07-28

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3