2022
DOI: 10.3390/jcp2010009
|View full text |Cite
|
Sign up to set email alerts
|

A Trust-Based Intrusion Detection System for RPL Networks: Detecting a Combination of Rank and Blackhole Attacks

Abstract: Routing attacks are a major security issue for Internet of Things (IoT) networks utilising routing protocols, as malicious actors can overwhelm resource-constrained devices with denial-of-service (DoS) attacks, notably rank and blackhole attacks. In this work, we study the impact of the combination of rank and blackhole attacks in the IPv6 routing protocol for low-power and lossy (RPL) networks, and we propose a new security framework for RPL-based IoT networks (SRF-IoT). The framework includes a trust-based m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 25 publications
(9 citation statements)
references
References 33 publications
(55 reference statements)
0
5
0
Order By: Relevance
“…The system utilized in this study was a 64-bit macOS Ventura with the following specifications: an eight-core Intel Core Xeon W processor running at 3.2 GHz, 32 GB of 2666 MHz DDR4 memory. Python version 3.11 environment was used, and the implementation and evaluation of the recommended model were carried out using NumPy [30], pandas [19], and sklearn [31] packages for data processing. Data handling, preprocessing, and analysis were performed using Pandas and NumPy libraries, while Scikit Learn was utilized for model training, evaluation, and evaluation metrics.…”
Section: Figure 1 the Flow Chart Of The Proposed Model 4 Experimental...mentioning
confidence: 99%
“…The system utilized in this study was a 64-bit macOS Ventura with the following specifications: an eight-core Intel Core Xeon W processor running at 3.2 GHz, 32 GB of 2666 MHz DDR4 memory. Python version 3.11 environment was used, and the implementation and evaluation of the recommended model were carried out using NumPy [30], pandas [19], and sklearn [31] packages for data processing. Data handling, preprocessing, and analysis were performed using Pandas and NumPy libraries, while Scikit Learn was utilized for model training, evaluation, and evaluation metrics.…”
Section: Figure 1 the Flow Chart Of The Proposed Model 4 Experimental...mentioning
confidence: 99%
“…Meanwhile, [55] used location information and received signal strength information in their detecting solution. Moving to another detection system approach proposed in [75], which utilized a trustbased mechanism to detect and isolate neighbor attackers. Another detection method was developed by Farzaneh et al [76] by considering the total received DIO messages and the number of neighbors.…”
Section: Solutions For Replay Attacksmentioning
confidence: 99%
“…The IDS components designed and implemented in previous works [1], [3], [8] may not be effective in detecting unknown attacks. They have been designed by relying on thresholdbased and trust-based mechanisms to detect flooding, rank, and blackhole attacks.…”
Section: Designmentioning
confidence: 99%
“…We have also designed and implemented an IDS prototype for protecting RPL networks and devices from battery-drain DoS attacks using rate thresholds [7]. Another recent work has developed a trust-based mechanism that detects and isolates complex routing attacks such as combined rank and blackhole attacks [8]. However, combinations of routing, flooding, and other types of attacks may bypass the thresholdbased and trust-based detection and cause serious damage to the network.…”
Section: Introductionmentioning
confidence: 99%