Machine Learning Algorithms to Defend Against Routing Attacks on the Internet of Things: A Systematic Literature Review

  • Lanka Chris Sejaphala North West University, South Africa
  • Vusimuzi Malele North West University, South Africa
  • Francis Lugayizi North West University, South Africa
Keywords: RPL, IoT, LNNs, Machine learning, routing attacks

Abstract

The Internet of Things (IoT) has become increasingly popular, opening vast application possibilities in different fields including smart cities, healthcare, manufacturing, agriculture, etc. IoT comprises resource-constrained devices deployed in Low Power and Lossy Networks (LLNs). To satisfy the routing requirements of these networks, the Internet Engineering Task Force (IETF) created a standardised Routing Protocol for low-power and Lossy Networks (RPL). However, this routing protocol is vulnerable to routing attacks, prompting researchers to propose several techniques to defend the network against such attacks. Machine learning approaches demonstrate effective ways to detect such attacks in large quantities. Therefore, this paper systematically synthesised 17 publications to compare the performance of traditional and advanced machine learning algorithms to identify the best algorithm for detecting RPL-based IoT routing attacks. The findings of this paper show that machine learning algorithms are capable of effective detection of many routing attacks with high accuracy and a low False Positive Rate. Furthermore, the results demonstrate that on average, advanced machine learning algorithms can achieve an accuracy of 96.03% compared to traditional machine learning algorithms which achieved 91.67%. Traditional machine learning algorithms demonstrated the best performance on average False Positive Rate by achieving 2.75% compared to their counterparts which gained 4.79%. However, Random Forest showed the best performance and outperformed all the algorithms in the selected publications by achieving over 99% accuracy, precision and recall.

Downloads

Download data is not yet available.

References

A. O. Adebayo, M. S. Chaubey, and L. P. Numbu, "Industry 4.0: The fourth industrial revolution and how it relates to the application of internet of things (IoT)," Journal of Multidisciplinary Engineering Science Studies (JMESS), vol. 5, no. 2, pp. 2477-2482, 2019.

A. J. Witwit and A. K. Idrees, "A comprehensive review for RPL routing protocol in low power and lossy networks," in Proc. Int. Conf. New Trends Inf. Commun. Technol. Appl., Cham, Switzerland: Springer International Publishing, Sep. 2018, pp. 50-66.

F. Garba, "A Comprehensive Review of Routing for Low Power and Lossy Network (RPL) Protocol Challenges and Proposed Improvements," 2022.

A. Jahangeer, S. U. Bazai, S. Aslam, S. Marjan, M. Anas, and S. H. Hashemi, "A Review on the Security of IoT Networks: From Network Layer’s Perspective," IEEE Access, vol. 11, pp. 71073-71087, 2023.

J. Rani, A. Dhingra, and V. Sindhu, "A Detailed Review of the IoT with Detection of Sinkhole Attacks in RPL based network," in Proc. A Detailed Review of the IoT with Detection of Sinkhole Attacks in RPL based network, 2022, pp. 1-6.

A. Agiollo, M. Conti, P. Kaliyar, T. N. Lin, and L. Pajola, "DETONAR: Detection of Routing Attacks in RPL-Based IoT," IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 1178-1190, 2021.

H. Alam, M. S. Yaqub, and I. Nadir, "Detecting IoT Attacks using Multi-Layer Data Through Machine Learning," in Proc. Detecting IoT Attacks using Multi-Layer Data Through Machine Learning, 2022, pp. 52-59.

A. U. Gawade and N. M. Shekokar, "Lightweight Secure RPL: A Need in IoT," in Proc. Lightweight Secure RPL: A Need in IoT, 2017, pp. 214-219.

A. Alazab, A. Khraisat, S. Singh, S. Bevinakoppa, and O. A. Mahdi, "Routing Attacks Detection in 6LoWPAN-Based Internet of Things," in Proc. Routing Attacks Detection in 6LoWPAN-Based Internet of Things, 2023.

R. Ahmad and I. Alsmadi, "Machine learning approaches to IoT security: A systematic literature review," Internet of Things, vol. 14, pp. 100365, 2021.

T. A. Al-Amiedy, M. Anbar, B. Belaton, A. H. Kabla, I. H. Hasbullah, and Z. R. Alashhab, "A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things," in Proc. A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things, 2022.

A. M. Pasikhani, J. A. Clark, P. Gope, and A. Alshahrani, "Intrusion Detection Systems in RPL-Based 6LoWPAN: A Systematic Literature Review," IEEE Sensors Journal, vol. 21, no. 11, pp. 12940-12968, 2021.

T. A. Al-Amiedy, M. Anbar, B. Belaton, A. A. Bahashwan, I. H. Hasbullah, M. A. Aladaileh, and G. A. L. Mukhaini, "A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things," Internet of Things, vol. 22, pp. 100741, 2023.

G. A. L. Mukhaini, M. Anbar, S. Manickam, T. A. Al-Amiedy, and A. A. Momani, "A systematic literature review of recent lightweight detection approaches leveraging machine and deep learning mechanisms in Internet of Things networks," Journal of King Saud University - Computer and Information Sciences, vol. 36, no. 1, pp. 101866, 2024.

H. Xu, Z. Sun, Y. Cao, and H. Bilal, "A data-driven approach for intrusion and anomaly detection using automated machine learning for the Internet of Things," Soft Computing, vol. 27, no. 19, pp. 14469-14481, 2023.

M. D. Momand, M. K. Mohsin, and Ihsanulhaq, "Machine Learning-based Multiple Attack Detection in RPL over IoT," in Proc. Machine Learning-based Multiple Attack Detection in RPL over IoT, 2021, pp. 1-8.

Kamaldeep, M. Malik, M. Dutta, and J. Granjal, "IoT-Sentry: A Cross-Layer-Based Intrusion Detection System in Standardized Internet of Things," IEEE Sensors Journal, vol. 21, no. 24, pp. 28066-28076, 2021.

C. M. Moreira and G. Kaddoum, "QL vs. SARSA: Performance Evaluation for Intrusion Prevention Systems in Software-Defined IoT Networks," in Proc. QL vs. SARSA: Performance Evaluation for Intrusion Prevention Systems in Software-Defined IoT Networks, 2023, pp. 500-504.

A. R. L., B. S., and C. S. G., "An Effective Detection of Version Number Attacks in the IoT using Neural Networks," in Proc. An Effective Detection of Version Number Attacks in the IoT using Neural Networks, 2022, pp. 1-7.

A. M. Pasikhani, J. A. Clark, and P. Gope, "Incremental hybrid intrusion detection for 6LoWPAN," Computers & Security, vol. 135, pp. 103447, 2023.

T. Raghavendra, M. Anand, M. Selvi, K. Thangaramya, S. V. N. Santhosh Kumar, and A. Kannan, "An Intelligent RPL attack detection using Machine Learning-Based Intrusion Detection System for Internet of Things," Procedia Computer Science, vol. 215, pp. 61-70, 2022.

S. Rabhi, T. Abbes, and F. Zarai, "IoT Routing Attacks Detection Using Machine Learning Algorithms," Wireless Personal Communications, vol. 128, no. 3, pp. 1839-1857, 2022.

P. P. Ioulianou, V. G. Vassilakis, and S. F. Shahandashti, "ML-based Detection of Rank and Blackhole Attacks in RPL Networks," in Proc. ML-based Detection of Rank and Blackhole Attacks in RPL Networks, 2022, pp. 338-343.

W. Choukri, H. Lamaazi, and N. Benamar, "RPL rank attack detection using Deep Learning," in Proc. RPL rank attack detection using Deep Learning, 2020, pp. 1-6.

C. Ioannou and V. Vassiliou, "Accurate Detection of Sinkhole Attacks in IoT Networks Using Local Agents," in Proc. Accurate Detection of Sinkhole Attacks in IoT Networks Using Local Agents, 2020, pp. 1-8.

A. Verma and V. Ranga, "ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things," in Proc. ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things, 2019, pp. 1-6.

A. M. Pasikhani, J. A. Clark, and P. Gope, "Reinforcement-Learning-based IDS for 6LoWPAN," in Proc. Reinforcement-Learning-based IDS for 6LoWPAN, 2021, pp. 1049-1060.

S. Cakir, S. Toklu, and N. Yalcin, "RPL Attack Detection and Prevention in the Internet of Things Networks Using a GRU Based Deep Learning," IEEE Access, vol. 8, pp. 183678-183689, 2020.

Y. Al Sawafi, A. Touzene, and R. Hedjam, "Hybrid Deep Learning-Based Intrusion Detection System for RPL IoT Networks," in Proc. Hybrid Deep Learning-Based Intrusion Detection System for RPL IoT Networks, 2023.

F. Zahra, N. Z. Jhanjhi, S. N. Brohi, N. A. Khan, M. Masud, and M. A. AlZain, "Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning," in Proc. Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning, 2022.

F. Zahra, N. Z. Jhanjhi, N. A. Khan, S. N. Brohi, M. Masud, and S. Aljahdali, "Protocol-Specific and Sensor Network-Inherited Attack Detection in IoT Using Machine Learning," in Proc. Protocol-Specific and Sensor Network-Inherited Attack Detection in IoT Using Machine Learning, 2022.

Published
2024-09-30
Abstract views: 66 times
Download PDF: 36 times
How to Cite
Sejaphala, L., Malele, V., & Lugayizi, F. (2024). Machine Learning Algorithms to Defend Against Routing Attacks on the Internet of Things: A Systematic Literature Review. Journal of Information Systems and Informatics, 6(3), 2048-2063. https://doi.org/10.51519/journalisi.v6i3.828