Abstract
Routing Protocol for Low Power and Lossy Networks (RPL) is characterized by a reliable routing functionality compared with traditional protocols in IoT domains. However, it has basic security functionalities; therefore, many hackers exploit this characteristic to make various attacks. Extending RPL security presents a challenge, mainly due to the constrained devices and connectivity to unsecured Internet. In this paper, several routing attacks in RPL such as hello flood, decreased rank, and version number modification have been analyzed in different scenarios. In addition, an anomaly-based intrusion detection system using the XGBoost algorithm has been proposed. Several simulations have been conducted to generate normal and attack data. Results demonstrate a high detection accuracy of the XGBoost for the three considered types of attacks compared to Naive Bayes, Stochastic Gradient Descent, Multilayer Perceptron, and Support Vector Machines.
This work is supported by Prince Sultan University in Saudi Arabia.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ghaleb, A.F., et al.: Misbehavior-aware on-demand collaborative intrusion detection system using distributed ensemble learning for VANET. Electronics 9(9), 1411 (2020)
Boulila, W., Ghandorh, H., Khan, M.A., Ahmed, F., Ahmad, J.: A novel CNN-LSTM-based approach to predict urban expansion. Ecol. Inform. 64, 101325 (2021)
Cervantes, C., Poplade, D., Nogueira, M., Santos, A.: Detection of sinkhole attacks for supporting secure routing on 6lowpan for internet of things. In: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 606–611. IEEE (2015)
Chen, Z., Jiang, F., Cheng, Y., Gu, X., Liu, W., Peng, J.: XGBoost classifier for DDoS attack detection and analysis in SDN-based cloud. In: 2018 IEEE International Conference on Big Data and Smart Computing (bigcomp), pp. 251–256. IEEE (2018)
Deshmukh-Bhosale, S., Sonavane, S.S.: A real-time intrusion detection system for wormhole attack in the RPL based internet of things. Procedia Manuf. 32, 840–847 (2019)
Driss, M., Hasan, D., Boulila, W., Ahmad, J.: Microservices in IoT security: current solutions, research challenges, and future directions. arxiv 2021. arXiv preprint arXiv:2105.07722
Jemmali, M.: Intelligent algorithms and complex system for a smart parking for vaccine delivery center of COVID-19. Complex Intell. Syst. 8, 597–609 (2021)
Jemmali, M., Melhim, L.K.B., Alharbi, M.T., Bajahzar, A., Omri, M.N.: Smart-parking management algorithms in smart city. Sci. Rep. 12(1), 1–15 (2022)
Kasinathan, P., Costamagna, G., Khaleel, H., Pastrone, C., Spirito, M.A.: An IDS framework for internet of things empowered by 6LoWPAN. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 1337–1340 (2013)
Kfoury, E., Saab, J., Younes, P., Achkar, R.: A self organizing map intrusion detection system for RPL protocol attacks. Int. J. Interdiscip. Telecommun. Netw. (IJITN) 11(1), 30–43 (2019)
Khan, M.A., et al.: Voting classifier-based intrusion detection for IoT networks. In: Saeed, F., Al-Hadhrami, T., Mohammed, E., Al-Sarem, M. (eds.) Advances on Smart and Soft Computing. AISC, vol. 1399, pp. 313–328. Springer, Singapore (2022). https://doi.org/10.1007/978-981-16-5559-3_26
Kumar, A., Matam, R., Shukla, S.: Impact of packet dropping attacks on RPL. In: 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC), pp. 694–698. IEEE (2016)
Latif, S., et al.: Deep learning for the industrial internet of things (iiot): a comprehensive survey of techniques, implementation frameworks, potential applications, and future directions. Sensors 21(22), 7518 (2021)
Le, A., Loo, J., Luo, Y., Lasebae, A.: Specification-based ids for securing RPL from topology attacks. In: 2011 IFIP Wireless Days (WD), pp. 1–3. IEEE (2011)
Lee, T.-H., Wen, C.-H., Chang, L.-H., Chiang, H.-S., Hsieh, M.-C.: A lightweight intrusion detection scheme based on energy consumption analysis in 6LowPAN. In: Huang, Y.-M., Chao, H.-C., Deng, D.-J., Park, J.J.J.H. (eds.) Advanced Technologies, Embedded and Multimedia for Human-centric Computing. LNEE, vol. 260, pp. 1205–1213. Springer, Dordrecht (2014). https://doi.org/10.1007/978-94-007-7262-5_137
Levis, P., Clausen, T., Hui, J., Gnawali, O., Ko, J.: The trickle algorithm (rfc 6206). Internet Eng. Task Force (IETF) 1, 13 (2011)
Mayzaud, A., Badonnel, R., Chrisment, I.: A taxonomy of attacks in RPL-based internet of things. Int. J. Netw. Secur. 18(3), 459–473 (2016)
Midi, D., Rullo, A., Mudgerikar, A., Bertino, E.: Kalis-a system for knowledge-driven adaptable intrusion detection for the internet of things. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 656–666. IEEE (2017)
Osterlind, F., Dunkels, A., Eriksson, J., Finne, N., Voigt, T.: Cross-level sensor network simulation with COOJA. In: Proceedings. 2006 31st IEEE Conference on Local Computer Networks, pp. 641–648. IEEE (2006)
Pedregosa, F., et al.: Scikit-learn: machine learning in python. J. Mach. Learn. Res. 12, 2825–2830 (2011)
Perrey, H., Landsmann, M., Ugus, O., Schmidt, T.C., Wählisch, M.: Trail: topology authentication in RPL. arXiv preprint arXiv:1312.0984 (2013)
Pongle, P., Chavan, G.: Real time intrusion and wormhole attack detection in internet of things. Int. J. Comput. Appl. 121(9) (2015)
Raoof, A., Matrawy, A., Lung, C.H.: Routing attacks and mitigation methods for RPL-based internet of things. IEEE Commun. Surv. Tutor. 21(2), 1582–1606 (2018)
Sarhan, A., Jemmali, M., Ben Hmida, A.: Two routers network architecture and scheduling algorithms under packet category classification constraint. In: Proceedings of the 5th International Conference on Future Networks & Distributed Systems, pp. 119–127 (2021)
Sobral, J.V., Rodrigues, J.J., Rabêlo, R.A., Al-Muhtadi, J., Korotaev, V.: Routing protocols for low power and lossy networks in internet of things applications. Sensors 19(9), 2144 (2019)
Wallgren, L., Raza, S., Voigt, T.: Routing attacks and countermeasures in the RPL-based internet of things. Int. J. Distrib. Sens. Netw. 9(8), 794326 (2013)
Winter, T., et al.: RPL: ipv6 routing protocol for low-power and lossy networks. rfc 6550, 1–157 (2012)
Zhang, X., Li, T., Wang, J., Li, J., Chen, L., Liu, C.: Identification of cancer-related long non-coding RNAs using XGBoost with high accuracy. Front. Genet. 10, 735 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Yaakoubi, F., Yahyaoui, A., Boulila, W., Attia, R. (2022). An XGBoost-Based Approach for an Efficient RPL Routing Attack Detection. In: Nguyen, N.T., Manolopoulos, Y., Chbeir, R., Kozierkiewicz, A., Trawiński, B. (eds) Computational Collective Intelligence. ICCCI 2022. Lecture Notes in Computer Science(), vol 13501. Springer, Cham. https://doi.org/10.1007/978-3-031-16014-1_48
Download citation
DOI: https://doi.org/10.1007/978-3-031-16014-1_48
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-16013-4
Online ISBN: 978-3-031-16014-1
eBook Packages: Computer ScienceComputer Science (R0)