You are on page 1of 7

ML-based NIDS to secure RPL from Routing

Attacks
Mohammed Aman Kareem Shahab Tayeb
Department of Electrical and Computer Engineering Department of Electrical and Computer Engineering
California State University, Fresno California State University, Fresno
2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC) | 978-1-6654-1490-6/21/$31.00 ©2021 IEEE | DOI: 10.1109/CCWC51732.2021.9375844

Fresno, USA Fresno, USA


amankareem@mail.fresnostate.edu tayeb@csufresno.edu

Abstract—Low power and lossy networks (LLNs) devices methods are possible to defend against routing attacks on
resource-constrained nature make it difficult to implement se- RPL i.e. Mitigation-based methods and Intrusion Detection
curity mechanisms to defend against RPL routing attacks. RPLs System (IDS). Mitigation-based schemes require some sort
inbuilt security functions are not efficient in preventing a wide
majority of routing attacks. RPLs optional security schemes can of modifications to the RPL protocol or nodes participating
defend against external attacks, but cannot mitigate internal in the RPL topology. These modifications can increase the
attacks. Moreover, RPL does not have any mechanism to verify load on already resource-constrained devices and may not be
the integrity of control messages used to keep topology updated scalable as the network grows. Furthermore, the Mitigation-
and route the traffic. All these factors play a major role in based scheme cannot tackle a wide variety of attacks with
increasing the RPLs threat level against routing attacks. In this
paper, a comparative literature review of various researchers minimum modifications. However, in the IDS approach, the
suggesting security mechanisms to mitigate security attacks operations of IDS can be offloaded to different servers or
aimed at RPL has been performed and methods have been cloud services and can be performed majorly in parallel thus
contrasted. reducing the computational load on IoT devices. Therefore,
Index Terms—IoT, 6LoWPAN, LLNs, RPL, NIDS for RPL in this paper, we will explore the Machine Learning based
Network Intrusion Detection System to overcome the routing
I. I NTRODUCTION
attacks on RPL.
Low power and lossy networks consist of many devices with The remainder of the paper is organized as follows: Section
scarce resources. These devices are resource-constrained in II provides the background on RPL by discussing the technical
terms of memory, power consumption, computational power, aspects, operations, and security threats aimed at RPL. In
etc. Because of their resource constraint nature, traditional Section III a comparative analysis of various schemes pro-
routing algorithms are not suitable for LLNs. 6LoWPAN posed by different researchers to tackle RPL routing attacks is
provides IPV6 based end-to-end connectivity to the resource performed, their work and methods are contrasted and results
constraint devices in LLNs. However, to address the routing have been highlighted. Section IV presents the method used
protocol requirements of the LLNs Internet Engineering Task in this study and Section V summarizes this paper.
Force (IETF) created a working group called Routing Over
Low Power and Lossy networks (RoLL). RoLL designed and II. BACKGROUND
developed the routing protocol called Routing Protocol for RPL is an acronym for Routing Protocol for Low Power
Low Power and Lossy Networks (RPL) to suffice the routing and Lossy Networks (LLNs). IETF’s working group called
needs of LLNs. RPL still faces many challenges with respect RoLL created RPL tailoring it to match the requirements of
to power consumption, latency, Mobility, QoS, Security, etc. the LLNs. RPL operates at the network layer and uses the
Of all these challenges, the security aspects of the RPL is distance-vector algorithm to perform routing functionalities.
one of the major concerns for its wide adoption in real-time In RPL, the network topology is organized as the Destination
implementations. IoT devices are known to sense, monitor, and Oriented Directed Acyclic Graph (DODAG) as shown in fig.1
collect very sensitive and crucial information from the users below.
and that is why security plays a vital role in its successful It’s called destination-oriented because the RPL topology
deployment. RPL provides optional security mechanisms but only has a single destination, and it is termed as directed
these de-facto mechanisms cannot mitigate most of the routing because the paths are highly directional and acyclic as the
attacks faced by RPL. network is a spanning tree with no cycles. In fig.1, node 1
The focus of this paper is to perform a comparative lit- marked as yellow is the root, and the rest of the nodes marked
erature review of various research fraternities, compare their in green are the participating nodes. The node from where the
proposed mitigation strategies to defend against RPL rout- arrow originates is the child, and the node where the arrow
ing attacks, and identify the research gap. Two prevention terminates is the parent node. The RPL has four factors, and
978-0-7381-4394-1/21/$31.00 ©2021 IEEE they are as follows:

1000

Authorized licensed use limited to: Tsinghua University. Downloaded on June 16,2021 at 16:01:38 UTC from IEEE Xplore. Restrictions apply.
Fig. 2. Root node starting DODAG construction by multicasting DIO control
messages

Fig. 1. DODAG

Fig. 3. Nodes 2 and 3 select the root node 1 as the parent


1. DODAG ID
2. RPL Instance ID
3. DODAG Version Number and to keep topology updated. Trickle timer controls how
4. Rank frequently these control messages are exchanged. It tries to
DODAG ID is the IPV6 based ID assigned only to the keep the exchange of control messages to a minimum to reduce
root node, and it does not change as long as the root remains energy consumption. Every node in the RPL topology has a
the same. Every RPL instance has an RPL instance ID as in trickle timer, and when the timer expires the node transmits
RPL multiple instances can coexist. RPL instance ID along the control messages.
with the DODAG ID is used to uniquely identify the DODAG C. Objective Function
network. In the RPL DODAG version number is bound to the
orientation of the topology. Only the root node can update the In RPL, every node has the objective function and the
version number, and whenever the version number changes, objective function along with the rank property is used by the
the topology rebuilds itself discarding any previous routing nodes to select the parent. There are two types of objective
information stored. The Rank property indicates the level of functions, and they are as follows:
the node with respect to the neighbors and it is also used to 1. Objective function zero (OF0)
select parents. Rank increases as we move away from the root 2. Minimum Rank with Hysteresis Objective Function
node and it decreases as we approach the root node. (MRHOF)
OF0 uses the rank property as the metric to select parents
A. RPL Control messages
whereas in MRHOF the routing metrics are configurable by the
RPL uses control messages to keep the DODAG updated, programmer or designer such as minimize energy, minimize
pass the routing information among the nodes in the DODAG, latency, etc.
and to route the traffic. RPL uses four types of control
messages which are as follows: D. RPL Operation
1. DIO (DODAG Information Object) In this section, we will discuss how RPLs control messages
2. DIS (DODAG Information Solicitation) are used in the formation of the DODAG topology. Let us con-
3. DAO (Destination Advertisement Object) sider three nodes as shown in fig.2 where node 1 highlighted
4. DAO-ACK (DAO Acknowledgement) in yellow is the root node. The root node starts the DODAG
The DIO control message is used by the existing RPL creation by multicasting DIO messages to the neighboring
instance to announce its existence so that other new nodes nodes. The DIO message consists of Rank, objective function,
that are interested to join can discover it. The DIO message and other routing metrics.
consists of the Rank property, Objective function, and other The neighboring nodes 2 and 3 after receiving the DIO
routing metrics that could help the new node in the decision message compute their rank from the root node. They both
making such as Rank calculation and parent selection. The send a DAO control message to the root node requesting to
DIS control message is used by the new node to discover the join as shown in fig.3. The root node sends DAO-ACK to
RPL instance that it can join. The DAO message is sent by the nodes 2 and 3 and hence establishes the path as shown in
child node to the parent node requesting it to join as a child. fig.4 and fig.5 respectively.
The DAO-ACK control message is sent by the parent node to Now consider two other nodes 4 and 5, the DODAG
the child node in response to the DAO control message sent multicasts again DIO messages to these nodes. After receiving
by the child node. the DIO messages both nodes 4 and 5 learn their ranks with
respect to nodes 2 and 3 respectively as shown in fig.6.
B. Trickle Timer Both nodes 4 and 5 select their parents based on the lowest
RPL regularly exchanges control messages to route the rank by sending DAO messages to their respective parents as
traffic, communicate the routing metrics among the nodes, shown in fig.7.

1001

Authorized licensed use limited to: Tsinghua University. Downloaded on June 16,2021 at 16:01:38 UTC from IEEE Xplore. Restrictions apply.
Fig. 4. Root node 1 accepts node 2 and 3 as children

Fig. 8. Parent nodes 2 and 3 accept nodes 4 and 5 as children

Fig. 5. Node 2 and 3 join the root node 1 by establishing paths

Then the parent nodes 2 and 3 send DAO-ACK messages to


their children 4 and 5 and the routes are established as shown
in fig.8 and fig.9 respectively.
Now let us consider another node 6 which has not received
any DIO message from the RPL instance and to speed-up the
process node 6 sends a DIS control message to discover the
DODAG as shown in fig.10. After receiving the DIS message
the DODAG sends a DIO message to the node using which Fig. 9. New nodes 4 and 5 join the DODAG
node 6 learns its rank with respect to nodes 4 and 5 as shown
in fig.11.
Then the node 6 selects node 5 as the parent and the DAO
and DAO-ACK messages are exchanged between them and
finally, the route is established as shown in fig.12

E. RPL Routing Attacks


RPL suffers from a wide range of routing attacks, but in
this section, some important routing attacks which apply to
this study are discussed as follows:

Fig. 10. A new node 6 transmits a DIS control message to discover DODAG

Fig. 6. Nodes 2 and 3 multicast DIO control message to discover new nodes

Fig. 11. Existing DODAG responds with DIO message to new node 6
Fig. 7. New nodes 4 and 5 choose parents by sending DAO control messages

1002

Authorized licensed use limited to: Tsinghua University. Downloaded on June 16,2021 at 16:01:38 UTC from IEEE Xplore. Restrictions apply.
forged ranks so that the attacker can introduce delays in
the network.
9. Version number attack:
Here the attacker illegally modifies the version number
unnecessarily triggering the route build process and
hence increasing the resource consumption of the net-
work without any need.
10. Local repair attack:
The attacker unnecessarily starts the local repairs in
the network by falsely setting repair flags such as
“R”. This causes the child nodes to discard any stored
Fig. 12. New node 6 joins the DODAG routing information and remove themselves from the
parent’s sub DODAG. This attack introduces loops and
inconsistencies in the DODAG topology.
1. Blackhole attack:
In this type of attack, an attacker node drops all the III. L ITERATURE R EVIEW
packets instead of forwarding them. The goal of this In this section, a comparative literature review of the rele-
attack is to launch a DoS attack. This attack can be vant work by various research fraternities is performed. Their
removed by RPLs self-healing mechanism, so it is alone proposed mitigation strategies are contrasted, and the results
not very effective but, when it’s combined with other are highlighted below.
attacks, the damage can be more grave. Several authors examined the influence of version number
2. Selective forwarding attack: attacks on the RPL topology using different approaches.
In this attack, the adversary forwards packets from From their study, it has been observed that packet-delivery-
chosen protocols and drops the remaining packets. It is ratio (PDR), control packet overhead, inconsistencies, and
also known as the Greyhole attack. loops have a strong correlation with the attacker’s position
3. Sinkhole attack: whereas power consumption and delay do not correlate with
Here the attacker node uses fake routing metrics such as the attacker’s locale. During the simulation grid topology with
the rank to deceive neighboring nodes into choosing it as about less than 50 nodes was considered. A. Aris et al. [2]
the preferred parent and route the traffic via it allowing implemented a probabilistic model in which the attack was
it to eavesdrop on the data. performed with different probabilities (i.e. 0, 0.3, 0.5, 0.7,
4. Wormhole attack: and 1) and by arbitrarily varying the attacker’s position. A
In this attack, two attacker nodes get together and total of about 44 nodes which consisted of a combination
coordinate to form a link such that it is longer than of both static and mobile nodes (No. of mobile nodes =
the regular path. Instead of sending traffic through the 4, No. of static nodes = 38) was used. It was noted that
regular path they route it via the established link and as the probability gets higher the chances of the attacker
hence inducing longer delays. getting detected rises and the network performance decreases.
5. Clone ID attack: However, only a single attacker with multiple probabilities was
In a Clone ID attack, the attacker node steals the identity used in their analysis. A. Dvir et al. [3] introduced the VeRA
of a legitimate node to modify the data. scheme (Version number and rank authentication scheme) to
6. Sybil attack: deal with the version number attacks. In this approach the
This attack is similar to the clone ID attack, but here the DIO control messages are bound with the digital signature to
attacker is capable of stealing multiple identities from validate their integrity. The time overhead of this approach is
the legitimate nodes. found to be small, but this scheme was not verified under the
7. Hello flooding attack: real-time deployment with a larger node size. Mayzaud A et
In this attack, an adversary with better range and routing al. [4] have observed that as the attacker gets closer to the root
metrics such as a better rank transmits false DIO mes- more loop formations and rank inconsistencies occur.
sages. The victim node after receiving the DIO message Few other authors evaluated the performance of the RPL
with better metrics attempts to join the attacker node through simulation. Different simulation time and a varying
which is out of range. It periodically makes this attempt number of nodes were taken into account in their study. The
and ends up exhausting its resources and increasing the performance of the RPLs objective functions (i.e. objective
network overhead. function zero - OF0 and minimum rank with hysteresis objec-
8. Rank attack: tive function - MRHOF) was also tested. A. N. Abbou et al. [6]
In this type of attack an attacker alters the rank attribute evaluated the objective functions with 18 different scenarios
by either changing the objective function or by changing using different combinations of nodes (i,e 30,60 and 120)
the rank directly. The goal of the attacker in this type and simulation times (i,e 5min, and 10min). All nodes used
of attack is to deceive neighboring nodes using false or were stationary and they concluded that MRHOF outperforms

1003

Authorized licensed use limited to: Tsinghua University. Downloaded on June 16,2021 at 16:01:38 UTC from IEEE Xplore. Restrictions apply.
OF0 in the long term and MRHOF is more complex but its simulation with 30 nodes of which 3 were the attacker nodes.
performance gets better over time. On the flip side, Foley With 60 minutes of simulation time, the packet loss rate in
et al. [13] proposed the use of a machine learning-based the case of standard-RPL was 60-73% whereas in the case of
anomaly detection approach to defending the RPLs two objec- SecTrust-RPL it was found to be much lower i.e. 15-28%.
tive functions against the combination of attacks (for example Further, some authors studied the machine learning-based
Rank and Version attack, Rank and Blackhole attack, etc.). approach to design a network intrusion detection system
They employed 5 types of classifiers (Naive Bayes, Support (NIDS) to secure RPL from routing attacks. The majority
vector machines, multilayer perceptron, Random forest, and of the authors here developed novel datasets and the various
ZeroR) to detect any deviations related to power consumption machine learning algorithms such as deep learning, classi-
and other network metrics. They also developed a dataset fication techniques, decision trees, supervised learning, etc
consisting of 24 attributes and 418 instances. Feature selection were studied in their approach to tackling a wide range
was applied to the dataset which boosted the attack detection of routing attacks against RPL. For instance, A. Verma et
rate by about 30%. Further, it was identified that the ensemble al. [8] proposed Ensemble learning-based NIDS to defend
voting technique using MLP and RF models is the most against 7 types of routing attacks (i.e. Sinkhole, Blackhole,
appropriate implementation for the combined attacks detection Sybil, Clone ID, Selective forwarding, Hello flooding, and
against the two objective functions. Moreover, Q. Zhang et al. Local repair attacks). Their approach applies four types of
[5] aimed to enhance the RPL’s performance by improving classification techniques (i.e. Bagged Trees, Boosted Trees,
the coverage and QoS of IoT devices. They proposed the use Subspace Discriminant, RUSBoosted Trees) with the help
of layered network architecture and organizing the unmanned of their self-developed dataset called RPL-NIDDS17. The
aerial vehicles (UAVs) in the proposed architecture to meet observations demonstrate that ensemble classifiers built on
their goals. Additionally, the design of a low power optimal Boosted Trees and RUSBoosted trees outshine with respect
routing algorithm (LLRA) for their layered network architec- to accuracy and area under the ROC and perform better than
ture was also proposed. It was theoretically concluded that the AdaBoost and Random forest. On the contrary, S. Cakir et
LLRA outperforms traditional routing algorithms (like AODV al. [9] introduced a GRU-based deep learning algorithm to
and GPSR) with respect to average delay and packet delivery mitigate the Hello flooding attack. Three different types of
ratio (PDR). datasets which they called SSN1, SSN2, and SSN3 were
Many others investigated the impact of the Rank attack used in the study and the deep learning operations were
and proposed strategies to mitigate attacks aimed at the rank performed on separate servers and hence avoiding any resource
property of the RPL. The various solutions proposed here consumption or computational loads on nodes. About 20% of
require state management or additional monitoring nodes. The the data was used for testing and the rest was used for training
nodes are required to perform calculations and analysis to and the highest accuracy of about 99.96% was achieved. On
defend against the discussed attack. A. Le et al. [7] have the other hand, M. Sharma et al. [10] applied the supervised
identified that in the presence of multiple attackers and areas learning mechanism and generated a multi-class dataset by
where the forwarding of control messages is high the impact applying feature reduction techniques to defend against four
of the attack is more grave. On the other hand, Neerugatti types of routing attacks (i.e. Hello Flooding attack, DIS
et al. [12] introduced the MLTKNN based on the K-nearest attack, Increased version attack, and Reduced rank attack).
neighbor technique to mitigate the above attack. This method Feature reduction techniques optimized the dataset in terms
calculates the distance among nodes and further computes of complexity and energy consumption and a total of about
the rank based on the distance metric. The computed rank 63.7% reduction was performed. To detect the attacks Naive
based on the distance metric and original rank is compared Bayes, Random forest, and C4.5 classifiers were employed on
to determine the malicious nodes. For the simulation, a total the optimized dataset and the highest accuracy of 99.3% was
of 30 nodes were used which consisted of 28 normal nodes, obtained with Random forest. Additionally, P. Shukla [19] and
1 attacker node, and 1 border router. This approach is found Liu, J et al. [20] proposed the use of three different IDS based
to have high detection and a high delivery rate. Whereas A. on ML to mitigate against wormhole attacks and the use of the
Le et al. [14] suggested the use of specification-based IDS to NSL-KDD dataset to evaluate the impact of 7 different attacks
prevent the attack. This approach employs statistical analysis, using 11 machine learning algorithms respectively. In the
finite state machines, and ML-based pattern recognition with former approach K-means clustering unsupervised learning,
the help of additional monitoring nodes sniffing the com- Supervised decision tree and a 2-stage hybrid of both K-means
munication among neighbors. The simulation was performed and the decision tree is applied to deal with wormhole attacks
with a small number of nodes (node size = 12). In contrast, by creating safe zones by learning the safe distance using
David Airehrour et al. [18] contemplated a secure trust-aware decision trees. When a router attempts to add a node outside
RPL protocol to deal with the issue. The proposed scheme the safe zone, the wormhole attack is identified. During the
computes the trustworthiness of the neighboring nodes where simulation, about 100-200 nodes were considered and were
lower trust values indicate the malicious nodes. This scheme organized in different topologies (i.e. Mesh, Ring, and Star).
also mitigates the Sybil attack and is scalable. The authors Results indicate that the hybrid IDS significantly diminishes
compare the SecTrust-RPL and standard RPL by performing the false positives and has a lower detection rate, but with more

1004

Authorized licensed use limited to: Tsinghua University. Downloaded on June 16,2021 at 16:01:38 UTC from IEEE Xplore. Restrictions apply.
accuracy concerning the other two IDS. While in the latter nodes whereas in SecRPL2 the parent node tracks the total
approach the authors used 11 machine learning algorithms DAOs forwarded by all child nodes combined. In a threshold-
(i.e. AdaBoost, Random Forest, Decision Tree, Bagging, XG- based approach once a limit is reached further DAOs are
Boost, SVM, Naive Bayes, Bayes network, KMeans, and DB- not forwarded for that interval. For simulation 50 nodes
SCAN) to evaluate 7 attacks (i.e. SynFlood, Land, UDP flood, of which 10 were attacker nodes distributed uniformly was
Ping of Death, Smurf, IP sweeping and Port sweeping). In their considered and the objective function used was MRHOF.
conclusion, they stated that Tree-based and ensemble methods Results demonstrate that InSecRPL was adversely affected by
outperform others by attaining more than 96% accuracy. the attack and SecRPL2 outperforms SecRPL1. In the presence
Moreover, some researchers contemplated different cate- of 10 attackers SecRPL1 when compared with the InSecRPL
gories of IDS for example anomaly-based, signature-based, decreases DAO overhead by 76.36% whereas the SecRPL2
specification-based, and hybrid-based IDS to tackle various reduces it by about 205%. Alternatively, B. Groves et al. [11]
routing attacks targeting RPL. Most of the proposed methods introduced the Gini-based approach to deal with Sybil attacks.
here can be extended further to deal with other types of In this approach nodes compute the dispersity and based
attacks and are scalable. Some metrics considered in their on this the attack is detected. The proposed approach was
work are detection rate, accuracy, true positive rate, false- compared with the fixed threshold-based scheme called CT
positive rate, etc. The nature of the nodes considered in and it was found that the Gini-based approach performs better
their evaluation was static. Shahid Raza et al. [15] proposed than the CT method. Gini index-based mechanism detects the
SVELTE IDS which implemented a combination of signature- Sybil attack with great accuracy and efficiency. This approach
based and anomaly-based models to tackle sinkhole and se- also improves performance with respect to the detection rate,
lective forwarding attacks. In this approach, two lists namely energy consumption, and detection latency.
whitelist and blacklist are maintained and nodes are added In conclusion, the majority of the work by various authors
to these lists based on their activity. A detection rate of reviewed here in this section employed static nodes with uni-
about 100% was observed for sinkhole attacks whereas in form distribution. Only a few authors in their work considered
the case of selective forwarding attacks this rate was in the nodes size greater than 100 whereas majorly the studies were
range of 80-100%. It was also stated that the alarming rate performed on about 10-50 nodes. The impact in the presence
might decrease as the network grows. Conversely, B. Farzaneh of multiple attacker nodes was not evaluated by a large number
[16] et al. and H. Bostani et al. [17] presented anomaly- of authors. Moreover, no real-time implementations to verify
based and hybrid of the anomaly and specification-based IDS the proposed methods have been performed.
respectively. In the former approach neighbor, and DIS attacks
are addressed by creating node profiles by monitoring the IV. R ESEARCH G APS
node’s behavior. Any deviation from this normal profile is By studying the work of various research fraternities, it was
termed as abnormal and indicates an attack. The IDS was observed that only a few of them have used more than 100
placed in a distributed manner and different network sizes nodes in their analysis, and most of the research work did
(20,30, 40 nodes) were considered during the simulation. A not take into account the mobility of the nodes. Moreover,
true positive rate of 100% and a false positive rate of 0% was the presence of multiple attackers was also not considered in
obtained for the majority of the scenarios. Alternatively, in the the majority of the work. Furthermore, the majority of the
latter approach, a hybrid of anomaly-based and specification- proposed schemes to prevent RPL attacks were not evaluated
based methods is suggested to tackle selective forwarding, in real-time. Another challenge researchers face is regarding
sinkhole, and wormhole attacks. The router nodes are config- the availability of the dataset. Because of privacy issues,
ured with specification-based modules whereas the anomaly- many organizations cannot share real-time data from the IoT
based modules are installed in root nodes. Anomaly-based networks that could help researchers in their further study.
modules employ unsupervised optimum-path forest algorithm
based on the map-reduce architecture. It was simulated with V. M ETHOD
about 20 nodes and a total of 10 simulations were performed. The approach followed in this paper is the comparative
The sinkhole and selective forwarding attack detection showed analysis of the related work of different authors. Their pro-
a TPR of 76.19% and an FPR of 5.92% whereas the wormhole posed methodology was compared and contrasted, used algo-
attack identification demonstrated a TRP of 96.02% and an rithms were studied and analyzed. Further, common metrics
FPR of 2.08%. used to evaluate the performance of the proposed schemes
Finally, a group of authors put forth various value-based were compared and observations were made. The Pros and
mechanisms for preventing RPL routing attacks. For example, cons of suggested strategies were also thoroughly discussed,
C. Thomson et al. [1] presented a threshold-based mecha- simulation trends, testbed set-up, and simulation parameters
nism for overcoming the DAO attack. The authors propose were studied and compared. Moreover, the results of various
two secure versions of RPL i.e. SecRPL1, and SecRPL2, proposed methods were examined, compared and necessary
and compare them with standard RPL and InSecRPL (RPL observations were made. It was also noted that there are two
with no defense mechanism). In SecRPL1 the parent node possible approaches namely mitigation-based and IDS based
keeps track of the amount of DAOs sent by individual child strategies to overcome the RPL routing attacks. The mitigation

1005

Authorized licensed use limited to: Tsinghua University. Downloaded on June 16,2021 at 16:01:38 UTC from IEEE Xplore. Restrictions apply.
based schemes require some enhancement in the RPL design to [8] A. Verma and V. Ranga, ”ELNIDS: Ensemble Learning based Network
target a particular attack. They can prevent only a specific type Intrusion Detection System for RPL based Internet of Things,” 2019 4th
International Conference on Internet of Things: Smart Innovation and
of attack by making some modifications in the implementation. Usages (IoT-SIU), Ghaziabad, India, 2019, pp. 1-6, doi: 10.1109/IoT-
They cannot be extended to tackle different types of attacks. SIU.2019.8777504.
Such a method also needs to manage and maintain the state [9] S. Cakir, S. Toklu and N. Yalcin, ”RPL Attack Detection and Prevention
in the Internet of Things Networks Using a GRU Based Deep Learning,”
of the topology to function. It can be cumbersome to include in IEEE Access, vol. 8, pp. 183678-183689, 2020, doi: 10.1109/AC-
such modifications in the design to overcome a wide range CESS.2020.3029191.
of attacks by taking into account different permutations and [10] M. Sharma, H. Elmiligi, F. Gebali and A. Verma, ”Simulating Attacks
for RPL and Generating Multi-class Dataset for Supervised Machine
combinations. This approach can increase memory consump- Learning,” 2019 IEEE 10th Annual Information Technology, Electronics
tion, power consumption, computational loads, and design and Mobile Communication Conference (IEMCON), Vancouver, BC,
complexity. On the other hand, the IDS approach can prevent Canada, 2019, pp. 0020-0026, doi: 10.1109/IEMCON.2019.8936142.
[11] B. Groves and C. Pu, ”A Gini Index-Based Countermeasure Against
a wide variety of attacks and can also be extended to other Sybil Attack in the Internet of Things,” MILCOM 2019 - 2019 IEEE
attacks easily. The IDS operations can be offloaded to a Military Communications Conference (MILCOM), Norfolk, VA, USA,
different server and can majorly be run in parallel, hence 2019, pp. 1-6, doi: 10.1109/MILCOM47813.2019.9021050.
[12] Neerugatti, Vikram and Mohan Reddy, A. Rama, Machine Learning
causing no overhead on the resource-constrained RPL devices. Based Technique for Detection of Rank Attack in RPL based Internet
IDS algorithms can easily be improved or changed with no of Things Networks (July 10, 2019). International Journal of Innovative
RPL design modifications. Therefore, by using the above Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075,
Volume-8 Issue-9S3, July 2019.
arguments we can justify the use of IDS to tackle RPL routing [13] Foley, J., Moradpoor, N., & Ochen, H. (2020). Employing a Machine
attacks Learning Approach to Detect Combined Internet of Things Attacks
against Two Objective Functions Using a Novel Dataset. Security and
VI. C ONCLUSION Communication Networks, 2020.
In conclusion, this paper discussed and contrasted the dif- [14] A. Le, J. Loo, Y. Luo and A. Lasebae, ”Specification-based IDS for
securing RPL from topology attacks,” 2011 IFIP Wireless Days (WD),
ferent methods of various research fraternities to tackle RPL Niagara Falls, ON, 2011, pp. 1-3, doi: 10.1109/WD.2011.6098218.
routing attacks. The methods proposed by various researchers [15] Shahid Raza, Linus Wallgren, Thiemo Voigt, SVELTE: Real-time intru-
should be examined using large network sizes under the sion detection in the Internet of Things, Ad Hoc Networks, Volume 11,
Issue 8, 2013, Pages 2661-2674, ISSN 1570-8705.
presence of multiple attackers and should also be further tested [16] B. Farzaneh, M. A. Montazeri and S. Jamali, ”An Anomaly-Based
and verified in a real-time setting. Tackling RPL’s security IDS for Detecting Attacks in RPL-Based Internet of Things,” 2019 5th
issues are vital to the successful deployment of the RPL International Conference on Web Research (ICWR), Tehran, Iran, 2019,
pp. 61-66, doi: 10.1109/ICWR.2019.8765272.
protocol. RPL’s self-organizing nature, the absence of robust [17] H. Bostani, M. Sheikhan, “Hybrid of anomaly-based and specification-
security mechanisms in the design, and lack of methods to based IDS for internet of things using unsupervised OPF based on
verify the integrity of control messages being exchanged make mapreduce approach”, Computer Communications, Volume 98, 2017,
Pages 52-71, ISSN 0140-3664.
it vulnerable to a wide variety of security attacks. [18] David Airehrour, Jairo A. Gutierrez, Sayan Kumar Ray, SecTrust-RPL:
A secure trust-aware RPL routing protocol for Internet of Things, Future
R EFERENCES Generation Computer Systems, Volume 93, 2019, Pages 860-876, ISSN
[1] I. Wadhaj, B. Ghaleb, C. Thomson, A. Al-Dubai and W. J. Buchanan, 0167-739X.
”Mitigation Mechanisms Against the DAO Attack on the Routing [19] P. Shukla, ”ML-IDS: A machine learning approach to detect worm-
Protocol for Low Power and Lossy Networks (RPL),” in IEEE Access, hole attacks in Internet of Things,” 2017 Intelligent Systems Con-
vol. 8, pp. 43665-43675, 2020, doi: 10.1109/ACCESS.2020.2977476. ference (IntelliSys), London, 2017, pp. 234-240, doi: 10.1109/Intel-
[2] A. Aris, S. F. Oktug and S. Berna Ors Yalcin, ”RPL version number liSys.2017.8324298.
attacks: In-depth study,” NOMS 2016 - 2016 IEEE/IFIP Network [20] Liu, J., Kantarci, B., & Adams, C. (2020). Machine Learning-Driven
Operations and Management Symposium, Istanbul, 2016, pp. 776-779, Intrusion Detection for Contiki-NG-Based IoT Networks Exposed to
doi: 10.1109/NOMS.2016.7502897. NSL-KDD Dataset. In Proceedings of the 2nd ACM Workshop on
[3] A. Dvir, T. Holczer and L. Buttyan, ”VeRA - Version Number and Rank Wireless Security and Machine Learning (pp. 25–30). Association for
Authentication in RPL,” 2011 IEEE Eighth International Conference on Computing Machinery.
Mobile Ad-Hoc and Sensor Systems, Valencia, 2011, pp. 709-714, doi: [21] A. Davis, S. Gill, R. Wong and S. Tayeb, ”Feature Selection for Deep
10.1109/MASS.2011.76. Neural Networks in Cyber Security Applications,” 2020 IEEE Inter-
[4] Mayzaud A., Sehgal A., Badonnel R., Chrisment I., Schönwälder J. national IOT, Electronics and Mechatronics Conference (IEMTRON-
(2014) A Study of RPL DODAG Version Attacks. In: Sperotto A., ICS), Vancouver, BC, Canada, 2020, pp. 1-7, doi: 10.1109/IEMTRON-
Doyen G., Latré S., Charalambides M., Stiller B. (eds) Monitoring and ICS51293.2020.9216403.
Securing Virtualized Networks and Services. AIMS 2014. Lecture Notes [22] Airehrour, David, et al. “Secure Routing for Internet of Things: A
in Computer Science, vol 8508. Springer, Berlin, Heidelberg. Survey.” Journal of Network and Computer Applications, vol. 66, May
[5] Q. Zhang, M. Jiang, Z. Feng, W. Li, W. Zhang and M. Pan, ”IoT 2016, pp. 198–213. ScienceDirect, doi:10.1016/j.jnca.2016.03.006.
Enabled UAV: Network Architecture and Routing Algorithm,” in IEEE [23] H. Kharrufa, H. A. A. Al-Kashoash and A. H. Kemp, ”RPL-Based
Internet of Things Journal, vol. 6, no. 2, pp. 3727-3742, April 2019, Routing Protocols in IoT Applications: A Review,” in IEEE Sen-
doi: 10.1109/JIOT.2018.2890428. sors Journal, vol. 19, no. 15, pp. 5952-5967, 1 Aug.1, 2019, doi:
[6] A. N. Abbou, Y. Baddi and A. Hasbi, ”Routing over Low Power 10.1109/JSEN.2019.2910881.
and Lossy Networks protocol: Overview and performance evaluation,” [24] H. Kim, J. Ko, D. E. Culler and J. Paek, ”Challenging the IPv6 Routing
2019 International Conference of Computer Science and Renewable Protocol for Low-Power and Lossy Networks (RPL): A Survey,” in IEEE
Energies (ICCSRE), Agadir, Morocco, 2019, pp. 1-6, doi: 10.1109/ICC- Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2502-2525,
SRE.2019.8807584. Fourthquarter 2017, doi: 10.1109/COMST.2017.2751617.
[7] A. Le, J. Loo, A. Lasebae, A. Vinel, Y. Chen and M. Chai, ”The Impact [25] Anthéa Mayzaud, Rémi Badonnel, Isabelle Chrisment. A Taxonomy
of Rank Attack on Network Topology of Routing Protocol for Low- of Attacks in RPL-based Internet of Things. International Journal of
Power and Lossy Networks,” in IEEE Sensors Journal, vol. 13, no. 10, Network Security, ACEEE a Division of Engineers Network, 2016, 18
pp. 3685-3692, Oct. 2013, doi: 10.1109/JSEN.2013.2266399. (3), pp.459 - 473.

1006

Authorized licensed use limited to: Tsinghua University. Downloaded on June 16,2021 at 16:01:38 UTC from IEEE Xplore. Restrictions apply.

You might also like