Machine Learning Algorithms to Defend Against Routing Attacks on the Internet of Things: A Systematic Literature Review
Abstract
The Internet of Things (IoT) has become increasingly popular, opening vast application possibilities in different fields including smart cities, healthcare, manufacturing, agriculture, etc. IoT comprises resource-constrained devices deployed in Low Power and Lossy Networks (LLNs). To satisfy the routing requirements of these networks, the Internet Engineering Task Force (IETF) created a standardised Routing Protocol for low-power and Lossy Networks (RPL). However, this routing protocol is vulnerable to routing attacks, prompting researchers to propose several techniques to defend the network against such attacks. Machine learning approaches demonstrate effective ways to detect such attacks in large quantities. Therefore, this paper systematically synthesised 17 publications to compare the performance of traditional and advanced machine learning algorithms to identify the best algorithm for detecting RPL-based IoT routing attacks. The findings of this paper show that machine learning algorithms are capable of effective detection of many routing attacks with high accuracy and a low False Positive Rate. Furthermore, the results demonstrate that on average, advanced machine learning algorithms can achieve an accuracy of 96.03% compared to traditional machine learning algorithms which achieved 91.67%. Traditional machine learning algorithms demonstrated the best performance on average False Positive Rate by achieving 2.75% compared to their counterparts which gained 4.79%. However, Random Forest showed the best performance and outperformed all the algorithms in the selected publications by achieving over 99% accuracy, precision and recall.
Downloads
References
A. O. Adebayo, M. S. Chaubey, and L. P. Numbu, "Industry 4.0: The fourth industrial revolution and how it relates to the application of internet of things (IoT)," Journal of Multidisciplinary Engineering Science Studies (JMESS), vol. 5, no. 2, pp. 2477-2482, 2019.
A. J. Witwit and A. K. Idrees, "A comprehensive review for RPL routing protocol in low power and lossy networks," in Proc. Int. Conf. New Trends Inf. Commun. Technol. Appl., Cham, Switzerland: Springer International Publishing, Sep. 2018, pp. 50-66.
F. Garba, "A Comprehensive Review of Routing for Low Power and Lossy Network (RPL) Protocol Challenges and Proposed Improvements," 2022.
A. Jahangeer, S. U. Bazai, S. Aslam, S. Marjan, M. Anas, and S. H. Hashemi, "A Review on the Security of IoT Networks: From Network Layer’s Perspective," IEEE Access, vol. 11, pp. 71073-71087, 2023.
J. Rani, A. Dhingra, and V. Sindhu, "A Detailed Review of the IoT with Detection of Sinkhole Attacks in RPL based network," in Proc. A Detailed Review of the IoT with Detection of Sinkhole Attacks in RPL based network, 2022, pp. 1-6.
A. Agiollo, M. Conti, P. Kaliyar, T. N. Lin, and L. Pajola, "DETONAR: Detection of Routing Attacks in RPL-Based IoT," IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 1178-1190, 2021.
H. Alam, M. S. Yaqub, and I. Nadir, "Detecting IoT Attacks using Multi-Layer Data Through Machine Learning," in Proc. Detecting IoT Attacks using Multi-Layer Data Through Machine Learning, 2022, pp. 52-59.
A. U. Gawade and N. M. Shekokar, "Lightweight Secure RPL: A Need in IoT," in Proc. Lightweight Secure RPL: A Need in IoT, 2017, pp. 214-219.
A. Alazab, A. Khraisat, S. Singh, S. Bevinakoppa, and O. A. Mahdi, "Routing Attacks Detection in 6LoWPAN-Based Internet of Things," in Proc. Routing Attacks Detection in 6LoWPAN-Based Internet of Things, 2023.
R. Ahmad and I. Alsmadi, "Machine learning approaches to IoT security: A systematic literature review," Internet of Things, vol. 14, pp. 100365, 2021.
T. A. Al-Amiedy, M. Anbar, B. Belaton, A. H. Kabla, I. H. Hasbullah, and Z. R. Alashhab, "A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things," in Proc. A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things, 2022.
A. M. Pasikhani, J. A. Clark, P. Gope, and A. Alshahrani, "Intrusion Detection Systems in RPL-Based 6LoWPAN: A Systematic Literature Review," IEEE Sensors Journal, vol. 21, no. 11, pp. 12940-12968, 2021.
T. A. Al-Amiedy, M. Anbar, B. Belaton, A. A. Bahashwan, I. H. Hasbullah, M. A. Aladaileh, and G. A. L. Mukhaini, "A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things," Internet of Things, vol. 22, pp. 100741, 2023.
G. A. L. Mukhaini, M. Anbar, S. Manickam, T. A. Al-Amiedy, and A. A. Momani, "A systematic literature review of recent lightweight detection approaches leveraging machine and deep learning mechanisms in Internet of Things networks," Journal of King Saud University - Computer and Information Sciences, vol. 36, no. 1, pp. 101866, 2024.
H. Xu, Z. Sun, Y. Cao, and H. Bilal, "A data-driven approach for intrusion and anomaly detection using automated machine learning for the Internet of Things," Soft Computing, vol. 27, no. 19, pp. 14469-14481, 2023.
M. D. Momand, M. K. Mohsin, and Ihsanulhaq, "Machine Learning-based Multiple Attack Detection in RPL over IoT," in Proc. Machine Learning-based Multiple Attack Detection in RPL over IoT, 2021, pp. 1-8.
Kamaldeep, M. Malik, M. Dutta, and J. Granjal, "IoT-Sentry: A Cross-Layer-Based Intrusion Detection System in Standardized Internet of Things," IEEE Sensors Journal, vol. 21, no. 24, pp. 28066-28076, 2021.
C. M. Moreira and G. Kaddoum, "QL vs. SARSA: Performance Evaluation for Intrusion Prevention Systems in Software-Defined IoT Networks," in Proc. QL vs. SARSA: Performance Evaluation for Intrusion Prevention Systems in Software-Defined IoT Networks, 2023, pp. 500-504.
A. R. L., B. S., and C. S. G., "An Effective Detection of Version Number Attacks in the IoT using Neural Networks," in Proc. An Effective Detection of Version Number Attacks in the IoT using Neural Networks, 2022, pp. 1-7.
A. M. Pasikhani, J. A. Clark, and P. Gope, "Incremental hybrid intrusion detection for 6LoWPAN," Computers & Security, vol. 135, pp. 103447, 2023.
T. Raghavendra, M. Anand, M. Selvi, K. Thangaramya, S. V. N. Santhosh Kumar, and A. Kannan, "An Intelligent RPL attack detection using Machine Learning-Based Intrusion Detection System for Internet of Things," Procedia Computer Science, vol. 215, pp. 61-70, 2022.
S. Rabhi, T. Abbes, and F. Zarai, "IoT Routing Attacks Detection Using Machine Learning Algorithms," Wireless Personal Communications, vol. 128, no. 3, pp. 1839-1857, 2022.
P. P. Ioulianou, V. G. Vassilakis, and S. F. Shahandashti, "ML-based Detection of Rank and Blackhole Attacks in RPL Networks," in Proc. ML-based Detection of Rank and Blackhole Attacks in RPL Networks, 2022, pp. 338-343.
W. Choukri, H. Lamaazi, and N. Benamar, "RPL rank attack detection using Deep Learning," in Proc. RPL rank attack detection using Deep Learning, 2020, pp. 1-6.
C. Ioannou and V. Vassiliou, "Accurate Detection of Sinkhole Attacks in IoT Networks Using Local Agents," in Proc. Accurate Detection of Sinkhole Attacks in IoT Networks Using Local Agents, 2020, pp. 1-8.
A. Verma and V. Ranga, "ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things," in Proc. ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things, 2019, pp. 1-6.
A. M. Pasikhani, J. A. Clark, and P. Gope, "Reinforcement-Learning-based IDS for 6LoWPAN," in Proc. Reinforcement-Learning-based IDS for 6LoWPAN, 2021, pp. 1049-1060.
S. Cakir, S. Toklu, and N. Yalcin, "RPL Attack Detection and Prevention in the Internet of Things Networks Using a GRU Based Deep Learning," IEEE Access, vol. 8, pp. 183678-183689, 2020.
Y. Al Sawafi, A. Touzene, and R. Hedjam, "Hybrid Deep Learning-Based Intrusion Detection System for RPL IoT Networks," in Proc. Hybrid Deep Learning-Based Intrusion Detection System for RPL IoT Networks, 2023.
F. Zahra, N. Z. Jhanjhi, S. N. Brohi, N. A. Khan, M. Masud, and M. A. AlZain, "Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning," in Proc. Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning, 2022.
F. Zahra, N. Z. Jhanjhi, N. A. Khan, S. N. Brohi, M. Masud, and S. Aljahdali, "Protocol-Specific and Sensor Network-Inherited Attack Detection in IoT Using Machine Learning," in Proc. Protocol-Specific and Sensor Network-Inherited Attack Detection in IoT Using Machine Learning, 2022.
Download PDF: 36 times
Copyright (c) 2024 Journal of Information Systems and Informatics
This work is licensed under a Creative Commons Attribution 4.0 International License.
- I certify that I have read, understand and agreed to the Journal of Information Systems and Informatics (Journal-ISI) submission guidelines, policies and submission declaration. Submission already using the provided template.
- I certify that all authors have approved the publication of this and there is no conflict of interest.
- I confirm that the manuscript is the authors' original work and the manuscript has not received prior publication and is not under consideration for publication elsewhere and has not been previously published.
- I confirm that all authors listed on the title page have contributed significantly to the work, have read the manuscript, attest to the validity and legitimacy of the data and its interpretation, and agree to its submission.
- I confirm that the paper now submitted is not copied or plagiarized version of some other published work.
- I declare that I shall not submit the paper for publication in any other Journal or Magazine till the decision is made by journal editors.
- If the paper is finally accepted by the journal for publication, I confirm that I will either publish the paper immediately or withdraw it according to withdrawal policies
- I Agree that the paper published by this journal, I transfer copyright or assign exclusive rights to the publisher (including commercial rights)