2020
DOI: 10.1109/access.2020.3029191
|View full text |Cite
|
Sign up to set email alerts
|

RPL Attack Detection and Prevention in the Internet of Things Networks Using a GRU Based Deep Learning

Abstract: Cyberattacks targeting Internet of Things (IoT), have increased significantly, over the past decade, with the spread of internet-connected smart devices and applications. Routing Protocol for Low-Power and Lossy Network (RPL) enables messages to be routed between nodes for the Wireless Sensor Network in the network layer. RPL protocol, which is sensitive and difficult to protect, is exposed to various attacks. These attacks negatively affect data transmission and cause great destruction to the topology by cons… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 67 publications
(40 citation statements)
references
References 29 publications
0
40
0
Order By: Relevance
“…The difference of deep learning from ANN is the hidden layers in its structure. Successive layers take the output of the previous layer as input and its structure is based on learning the representation of data [39] [40] [41]. When deep learning techniques are used with very large data, they yield better results than traditional data processing methods [39] [40] [42] [43].…”
Section: Deep Learning Based Car Park Occupancy Predictionmentioning
confidence: 99%
See 1 more Smart Citation
“…The difference of deep learning from ANN is the hidden layers in its structure. Successive layers take the output of the previous layer as input and its structure is based on learning the representation of data [39] [40] [41]. When deep learning techniques are used with very large data, they yield better results than traditional data processing methods [39] [40] [42] [43].…”
Section: Deep Learning Based Car Park Occupancy Predictionmentioning
confidence: 99%
“…The computational complexity of the LSTM is ( 1 ( 2 + 0 )), where 1 is the number of features in inputs, is the number of the hidden units, and 0 is the number of outputs [41]. The computational complexity of operations performed in Jupiter Notebook has been computed as O (n).…”
Section: Figure 6 Flow Diagram Of Proposed Modelmentioning
confidence: 99%
“…Though many works proposed various IDS for IoT networks, only few literatures proposed IDS for RPL based IoT networks. Cakir et al [10] presented a deep-leaning-based gated recurrent unit (GRU) to detect hello flooding (HF) attacks with high accuracy rate in the RPL based IoT networks. They have compared the performance measures of proposed model with SVM and LR classifiers.…”
Section: Ids In Rpl Based Iotmentioning
confidence: 99%
“…These algorithms train a classifier with normal and anomaly data for attack detection in IoT network. Many literature works on IDSs are focused on different classification techniques like ML classifier [8,9], deep learning classifiers [10,11], or ensemble learning [12,13]. Of this, ensemble learning combines multiple classifiers to make better classification with reduced FPR compared to individual classifiers.…”
Section: Introductionmentioning
confidence: 99%
“…In that sense, the incorporation of Artificial Intelligence (AI), Machine Learning (ML), Deep Learning (DL), and Reinforcement Learning (RL) sensors has become imperative to deal with large amounts of samples, maximize feature engineering, learn from latent abnormal patterns, reduce the time for disclosing unknown vulnerabilities, and reinforce classification outcomes [ 19 ]. Despite this, AI-enhanced and semi-enhanced frameworks are more oriented towards easing flooding attacks [ 19 , 20 ], wormhole attacks [ 21 ], machine-driven hello-flood attacks [ 22 ], Received Signal Strength Indicator (RSSI) flooding attacks [ 23 ], and DDoS attacks [ 24 ], leaving Cloning ID attacks as a virtually unexplored area of research. In this work, we present a novel protection framework based on unsupervised ML pre-processing techniques, along with a Dense Neural Network (DNN) approach, to effectively detect counterfeiting attacks on RPL-based network conversations.…”
Section: Introductionmentioning
confidence: 99%