2021
DOI: 10.1007/978-3-030-85577-2_30
|View full text |Cite
|
Sign up to set email alerts
|

Comparison of ML Algorithms to Detect Vulnerabilities of RPL-Based IoT Devices in Intelligent and Fuzzy Systems

Abstract: The RPL protocol (Routing Protocol for Low-Power and Lossy Networks) was designed by IETF [1] for 6LoWPAN to optimize power consumption on the Internet of Things (IoT) devices. These devices have limited processing power, memory, and generally limited energy because they are battery-powered. RPL aims to establish the shortest distance by setting up n number of IoT devices through each other DAG (Directed Acyclic Graph) and therefore the most optimum energy consumption. However, due to the complex infrastructur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…This fact opens the possibility of applying it to relatively complicated problems to bring down the time required to obtain a solution by (roughly) an order of magnitude or, in a cloud environment, to reduce its cost; this will make this kind of system affordable to small and medium-sized enterprises who will be able to leverage it to add value to their portfolio. Since fuzzy controllers are used extensively on the Internet of Things [52], this could be an excellent area of application. This is left, however, as future work.…”
Section: Discussionmentioning
confidence: 99%
“…This fact opens the possibility of applying it to relatively complicated problems to bring down the time required to obtain a solution by (roughly) an order of magnitude or, in a cloud environment, to reduce its cost; this will make this kind of system affordable to small and medium-sized enterprises who will be able to leverage it to add value to their portfolio. Since fuzzy controllers are used extensively on the Internet of Things [52], this could be an excellent area of application. This is left, however, as future work.…”
Section: Discussionmentioning
confidence: 99%
“…Consequently, the decision tree -based approach efficiently processes and examines IoT data generated by the COOJA simulator to swiftly identify irregular actions and characterize detrimental behavior. According to [11], the Decision Tree, Logistic Regression, Random Forest, Fuzzy Pattern Tree, and Neural Network techniques demonstrated similar outcomes, with Random Forest showing superior overall accuracy. In a different study noted in [15], a machine learning approach centered on Kernel Density Estimation (KDE) was devised to identify Hello Flood ( HF) instances in RPL, achieving an average true positive rate of 84.91% and less than 0.5% false positive rate.…”
Section: Related Workmentioning
confidence: 94%
“…The dataset was first adjusted to provide an equal amount of normal and impaired flow data. Following that, the dataset was divided into two-thirds test and training datasets (2/3 training, 1/3 testing) [11]. Following this, the data sets were trained and evaluated using several ML algorithms for the detection of DOS attacks (Flooding).…”
Section: Detection Enginementioning
confidence: 99%
See 2 more Smart Citations