Skip to main content

An XGBoost-Based Approach for an Efficient RPL Routing Attack Detection

  • Conference paper
  • First Online:
Computational Collective Intelligence (ICCCI 2022)

Abstract

Routing Protocol for Low Power and Lossy Networks (RPL) is characterized by a reliable routing functionality compared with traditional protocols in IoT domains. However, it has basic security functionalities; therefore, many hackers exploit this characteristic to make various attacks. Extending RPL security presents a challenge, mainly due to the constrained devices and connectivity to unsecured Internet. In this paper, several routing attacks in RPL such as hello flood, decreased rank, and version number modification have been analyzed in different scenarios. In addition, an anomaly-based intrusion detection system using the XGBoost algorithm has been proposed. Several simulations have been conducted to generate normal and attack data. Results demonstrate a high detection accuracy of the XGBoost for the three considered types of attacks compared to Naive Bayes, Stochastic Gradient Descent, Multilayer Perceptron, and Support Vector Machines.

This work is supported by Prince Sultan University in Saudi Arabia.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ghaleb, A.F., et al.: Misbehavior-aware on-demand collaborative intrusion detection system using distributed ensemble learning for VANET. Electronics 9(9), 1411 (2020)

    Google Scholar 

  2. Boulila, W., Ghandorh, H., Khan, M.A., Ahmed, F., Ahmad, J.: A novel CNN-LSTM-based approach to predict urban expansion. Ecol. Inform. 64, 101325 (2021)

    Article  Google Scholar 

  3. Cervantes, C., Poplade, D., Nogueira, M., Santos, A.: Detection of sinkhole attacks for supporting secure routing on 6lowpan for internet of things. In: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 606–611. IEEE (2015)

    Google Scholar 

  4. Chen, Z., Jiang, F., Cheng, Y., Gu, X., Liu, W., Peng, J.: XGBoost classifier for DDoS attack detection and analysis in SDN-based cloud. In: 2018 IEEE International Conference on Big Data and Smart Computing (bigcomp), pp. 251–256. IEEE (2018)

    Google Scholar 

  5. Deshmukh-Bhosale, S., Sonavane, S.S.: A real-time intrusion detection system for wormhole attack in the RPL based internet of things. Procedia Manuf. 32, 840–847 (2019)

    Article  Google Scholar 

  6. Driss, M., Hasan, D., Boulila, W., Ahmad, J.: Microservices in IoT security: current solutions, research challenges, and future directions. arxiv 2021. arXiv preprint arXiv:2105.07722

  7. Jemmali, M.: Intelligent algorithms and complex system for a smart parking for vaccine delivery center of COVID-19. Complex Intell. Syst. 8, 597–609 (2021)

    Google Scholar 

  8. Jemmali, M., Melhim, L.K.B., Alharbi, M.T., Bajahzar, A., Omri, M.N.: Smart-parking management algorithms in smart city. Sci. Rep. 12(1), 1–15 (2022)

    Article  Google Scholar 

  9. Kasinathan, P., Costamagna, G., Khaleel, H., Pastrone, C., Spirito, M.A.: An IDS framework for internet of things empowered by 6LoWPAN. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 1337–1340 (2013)

    Google Scholar 

  10. Kfoury, E., Saab, J., Younes, P., Achkar, R.: A self organizing map intrusion detection system for RPL protocol attacks. Int. J. Interdiscip. Telecommun. Netw. (IJITN) 11(1), 30–43 (2019)

    Google Scholar 

  11. Khan, M.A., et al.: Voting classifier-based intrusion detection for IoT networks. In: Saeed, F., Al-Hadhrami, T., Mohammed, E., Al-Sarem, M. (eds.) Advances on Smart and Soft Computing. AISC, vol. 1399, pp. 313–328. Springer, Singapore (2022). https://doi.org/10.1007/978-981-16-5559-3_26

    Chapter  Google Scholar 

  12. Kumar, A., Matam, R., Shukla, S.: Impact of packet dropping attacks on RPL. In: 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC), pp. 694–698. IEEE (2016)

    Google Scholar 

  13. Latif, S., et al.: Deep learning for the industrial internet of things (iiot): a comprehensive survey of techniques, implementation frameworks, potential applications, and future directions. Sensors 21(22), 7518 (2021)

    Google Scholar 

  14. Le, A., Loo, J., Luo, Y., Lasebae, A.: Specification-based ids for securing RPL from topology attacks. In: 2011 IFIP Wireless Days (WD), pp. 1–3. IEEE (2011)

    Google Scholar 

  15. Lee, T.-H., Wen, C.-H., Chang, L.-H., Chiang, H.-S., Hsieh, M.-C.: A lightweight intrusion detection scheme based on energy consumption analysis in 6LowPAN. In: Huang, Y.-M., Chao, H.-C., Deng, D.-J., Park, J.J.J.H. (eds.) Advanced Technologies, Embedded and Multimedia for Human-centric Computing. LNEE, vol. 260, pp. 1205–1213. Springer, Dordrecht (2014). https://doi.org/10.1007/978-94-007-7262-5_137

    Chapter  Google Scholar 

  16. Levis, P., Clausen, T., Hui, J., Gnawali, O., Ko, J.: The trickle algorithm (rfc 6206). Internet Eng. Task Force (IETF) 1, 13 (2011)

    Google Scholar 

  17. Mayzaud, A., Badonnel, R., Chrisment, I.: A taxonomy of attacks in RPL-based internet of things. Int. J. Netw. Secur. 18(3), 459–473 (2016)

    Google Scholar 

  18. Midi, D., Rullo, A., Mudgerikar, A., Bertino, E.: Kalis-a system for knowledge-driven adaptable intrusion detection for the internet of things. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 656–666. IEEE (2017)

    Google Scholar 

  19. Osterlind, F., Dunkels, A., Eriksson, J., Finne, N., Voigt, T.: Cross-level sensor network simulation with COOJA. In: Proceedings. 2006 31st IEEE Conference on Local Computer Networks, pp. 641–648. IEEE (2006)

    Google Scholar 

  20. Pedregosa, F., et al.: Scikit-learn: machine learning in python. J. Mach. Learn. Res. 12, 2825–2830 (2011)

    Google Scholar 

  21. Perrey, H., Landsmann, M., Ugus, O., Schmidt, T.C., Wählisch, M.: Trail: topology authentication in RPL. arXiv preprint arXiv:1312.0984 (2013)

  22. Pongle, P., Chavan, G.: Real time intrusion and wormhole attack detection in internet of things. Int. J. Comput. Appl. 121(9) (2015)

    Google Scholar 

  23. Raoof, A., Matrawy, A., Lung, C.H.: Routing attacks and mitigation methods for RPL-based internet of things. IEEE Commun. Surv. Tutor. 21(2), 1582–1606 (2018)

    Article  Google Scholar 

  24. Sarhan, A., Jemmali, M., Ben Hmida, A.: Two routers network architecture and scheduling algorithms under packet category classification constraint. In: Proceedings of the 5th International Conference on Future Networks & Distributed Systems, pp. 119–127 (2021)

    Google Scholar 

  25. Sobral, J.V., Rodrigues, J.J., Rabêlo, R.A., Al-Muhtadi, J., Korotaev, V.: Routing protocols for low power and lossy networks in internet of things applications. Sensors 19(9), 2144 (2019)

    Article  Google Scholar 

  26. Wallgren, L., Raza, S., Voigt, T.: Routing attacks and countermeasures in the RPL-based internet of things. Int. J. Distrib. Sens. Netw. 9(8), 794326 (2013)

    Article  Google Scholar 

  27. Winter, T., et al.: RPL: ipv6 routing protocol for low-power and lossy networks. rfc 6550, 1–157 (2012)

    Google Scholar 

  28. Zhang, X., Li, T., Wang, J., Li, J., Chen, L., Liu, C.: Identification of cancer-related long non-coding RNAs using XGBoost with high accuracy. Front. Genet. 10, 735 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wadii Boulila .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yaakoubi, F., Yahyaoui, A., Boulila, W., Attia, R. (2022). An XGBoost-Based Approach for an Efficient RPL Routing Attack Detection. In: Nguyen, N.T., Manolopoulos, Y., Chbeir, R., Kozierkiewicz, A., Trawiński, B. (eds) Computational Collective Intelligence. ICCCI 2022. Lecture Notes in Computer Science(), vol 13501. Springer, Cham. https://doi.org/10.1007/978-3-031-16014-1_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-16014-1_48

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-16013-4

  • Online ISBN: 978-3-031-16014-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics