Abstract
The Internet of Things (IoT) is evolving rapidly, increasing demand for safeguarding data against routing attacks. While achieving complete security for RPL protocols remains an ongoing challenge, this paper introduces an innovative hybrid autoencoder–decision tree framework (HADTF) designed to detect four types of RPL attacks: decreased rank, version number, DIS flooding, and blackhole attacks. The HADTF comprises three key components: enhanced feature extraction, feature selection, and a hybrid autoencoder–decision tree classifier. The enhanced feature extraction module identifies the most pertinent features from the raw data collected, while the feature selection component carefully curates’ optimal features to reduce dimensionality. The hybrid autoencoder–decision tree classifier synergizes the strengths of both techniques, resulting in high accuracy and detection rates while effectively minimizing false positives and false negatives. To assess the effectiveness of the HADTF, we conducted evaluations using a self-generated dataset. The results demonstrate impressive performance with an accuracy of 97.41%, precision of 97%, recall of 97%, and F1-score of 97%. These findings underscore the potential of the HADTF as a promising solution for detecting RPL attacks within IoT networks.









Similar content being viewed by others
Data Availability
The dataset of this manuscript is under development to add more attacks.
References
Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed internet of things. Comput Netw 57(10):2266–2279. https://doi.org/10.1016/j.comnet.2012.12.018
Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of Things (IoT): a vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645–1660. https://doi.org/10.1016/j.future.2013.01.010
Ge M, Syed NF, Fu X, Baig Z, Robles-Kelly A (2021) Towards a deep learning-driven intrusion detection approach for Internet of Things. Comput Netw 186:107784. https://doi.org/10.1016/j.comnet.2020.107784
Firouzi F, Farahani B, Marinšek A (2022) The convergence and interplay of edge, fog, and cloud in the AI-driven Internet of Things (IoT). Inf Syst 107:101840. https://doi.org/10.1016/j.is.2021.101840
Ogonji MM, Okeyo G, Wafula JM (2020) A survey on privacy and security of Internet of Things. Comput Sci Rev 38:100312. https://doi.org/10.1016/j.cosrev.2020.100312
Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W (2017) A Survey on Internet of Things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J 4(5):1125–1142. https://doi.org/10.1109/JIOT.2017.2683200
Yang Y, Wu L, Yin G, Li L, Zhao H (2017) A survey on security and privacy issues in Internet-of-Things. IEEE Internet Things J 4(5):1250–1258. https://doi.org/10.1109/JIOT.2017.2694844
MusaddiqZikriaZulqarnainKim AYBSW (2020) Routing protocol for low-power and lossy networks for heterogeneous traffic network. EURASIP J Wirel Commun Netw. https://doi.org/10.1186/s13638-020-1645-4
Vasseur A (2011) RPL the IP routing protocol designed for low power and lossy networks. Internet Protoc Smart Objects ( IPSO ) 36:1–20
Gaddour O, Koubâa A (2012) RPL in a nutshell: a survey. Comput Netw 56(14):3163–3178. https://doi.org/10.1016/j.comnet.2012.06.016
Medjek F, Tandjaoui D, Djedjig N, Romdhani I (2021) Multicast DIS attack mitigation in RPL-based IoT-LLNs. J Inf Secur Appl 61:102939. https://doi.org/10.1016/j.jisa.2021.102939
Mayzaud A, Badonnel R, Chrisment I (2016) A taxonomy of attacks in RPL-based internet of things. Int J Netw Secur 18(3):459–473
Kamgueu PO, Nataf E, Ndie TD (2018) Survey on RPL enhancements: a focus on topology, security and mobility. Comput Commun 120:10–21. https://doi.org/10.1016/j.comcom.2018.02.011
Muzammal SM, Murugesan RK, Jhanjhi NZ (2021) A comprehensive review on secure routing in Internet of Things: mitigation methods and trust-based approaches. IEEE Internet Things J 8(6):4186–4210. https://doi.org/10.1109/JIOT.2020.3031162
Pasikhani AM, Clark JA, Gope P, Alshahrani A (2021) Intrusion detection systems in RPL-based 6LoWPAN: a systematic literature review. IEEE Sens J 21(11):12940–12968. https://doi.org/10.1109/JSEN.2021.3068240
Mayzaud A, Badonnel R, Chrisment I (2017) A distributed monitoring strategy for detecting version number attacks in RPL-based networks. IEEE Trans Netw Serv Manag 14(2):472–486. https://doi.org/10.1109/TNSM.2017.2705290
Aris A, Oktug SF, Yalcin SBO (Apr. 2016) “RPL version number attacks: In-depth study,” In: NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, IEEE, pp. 776–779. https://doi.org/10.1109/NOMS.2016.7502897.
Yavuz FY, Ünal D, Gül E (2018) Deep learning for detection of routing attacks in the internet of things. Int J Comput Intell Syst 12(1):39–58. https://doi.org/10.2991/ijcis.2018.25905181
Osman M, He J, Mahiuob F, Mokbal M, Zhu N (2021) Artificial neural network model for decreased rank attack detection in RPL based on IoT networks. Int J Netw Secur 23(3):496–503. https://doi.org/10.6633/IJNS.20210523(3).15
Çakir S, Yalçin N (2021) Detection of DIS flooding attacks in IoT networks using machine learning methods. Eur J Sci Technol. https://doi.org/10.31590/ejosat.1014917
Verma A, Ranga V (2020) Mitigation of DIS flooding attacks in RPL-based 6LoWPAN networks. Trans Emerg Telecommun Technol 31(2):e3802
Airehrour D, Gutierrez J, Ray SK (Dec. 2016) “Securing RPL routing protocol from blackhole attacks using a trust-based mechanism,” In: 2016 26th International Telecommunication Networks and Applications Conference (ITNAC), IEEE, pp. 115–120. https://doi.org/10.1109/ATNAC.2016.7878793.
Airehrour D, Gutierrez JA, Ray SK (2017) A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks. J Telecommun Digit Econ 5(1):50–69. https://doi.org/10.18080/jtde.v5n1.88
Verma A, Ranga V (2019) Evaluation of network intrusion detection systems for RPL based 6LoWPAN networks in IoT. Wirel Pers Commun 108(3):1571–1594. https://doi.org/10.1007/s11277-019-06485-w
Agiollo A, Conti M, Kaliyar P, Lin TN, Pajola L (2021) DETONAR: detection of routing attacks in RPL-based IoT. IEEE Trans Netw Serv Manag 18(2):1178–1190. https://doi.org/10.1109/TNSM.2021.3075496
Momand MD, Mohsin MK, Ihsanulhaq (Jan. 2021) “Machine learning-based multiple attack detection in RPL over IoT,” In: 2021 International Conference on Computer Communication and Informatics (ICCCI), IEEE, pp. 1–8. https://doi.org/10.1109/ICCCI50826.2021.9402388.
Almusaylim ZA, Jhanjhi N, Alhumam A (2020) Detection and mitigation of RPL rank and version number attacks in the Internet of Things: SRPL-RP. Sensors 20(21):5997. https://doi.org/10.3390/s20215997
Reshi IA, Sholla S, Najar ZA (2024) Safeguarding IoT networks: mitigating black hole attacks with an innovative defense algorithm. J Eng Res. https://doi.org/10.1016/j.jer.2024.01.014
Al-Amiedy TA et al (2023) A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things. Internet of Things 22:100741. https://doi.org/10.1016/j.iot.2023.100741
Al-Amiedy TA, Anbar M, Belaton B, Kabla AHH, Hasbullah IH, Alashhab ZR (2022) A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of Internet of Things. Sensors 22(9):3400. https://doi.org/10.3390/s22093400
Babu MR, Veena KN (May 2021) “A survey on attack detection methods for IOT using machine learning and deep learning,” In: 2021 3rd International Conference on Signal Processing and Communication, ICPSC 2021, IEEE, pp. 625–630. https://doi.org/10.1109/ICSPC51351.2021.9451740.
Salloum SA, Alshurideh M, Elnagar A, Shaalan K (2020) “Machine learning and deep learning techniques for cybersecurity: a review,” In: Advances in Intelligent Systems and Computing, vol. 1153 AISC, pp. 50–57. https://doi.org/10.1007/978-3-030-44289-7_5.
Zantalis F, Koulouras G, Karabetsos S, Kandris D (2019) A review of machine learning and IoT in smart transportation. Futur Internet 11(4):94. https://doi.org/10.3390/fi11040094
Verma A, Ranga V (Apr. 2019) “ELNIDS: Ensemble learning based network intrusion detection system for RPL based Internet of Things,” In: Proceedings - 2019 4th International Conference on Internet of Things: Smart Innovation and Usages, IoT-SIU 2019, IEEE, pp. 1–6. https://doi.org/10.1109/IoT-SIU.2019.8777504.
Choukri W, Lamaazi H, Benamar N (Dec. 2020) “RPL rank attack detection using deep learning,” In: 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies, 3ICT 2020, IEEE, pp. 1–6. https://doi.org/10.1109/3ICT51146.2020.9311983.
Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for Internet of Things. Futur Gener Comput Syst 82:761–768. https://doi.org/10.1016/j.future.2017.08.043
Sahay R, Geethakumari G, Mitra B, Sahoo I (2020) “Efficient framework for detection of version number attack in Internet of Things,” in Advances in Intelligent Systems and Computing, vol. 941, pp. 480–492. https://doi.org/10.1007/978-3-030-16660-1_47.
Bokka R, Sadasivam T (2021) “Deep learning model for detection of attacks in the Internet of Things based smart home environment,” In: Advances in Intelligent Systems and Computing, vol. 1245, pp. 725–735. https://doi.org/10.1007/978-981-15-7234-0_69.
Mohy-eddine M, Guezzaz A, Benkirane S, Azrour M (2023) An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection. Multimed Tools Appl 82(15):23615–23633. https://doi.org/10.1007/s11042-023-14795-2
Albishari M, Li M, Zhang R, Almosharea E (2023) Deep learning-based early stage detection (DL-ESD) for routing attacks in Internet of Things networks. J Supercomput 79(3):2626–2653. https://doi.org/10.1007/s11227-022-04753-4
Nayak S, Ahmed N, Misra S (2021) Deep learning-based reliable routing attack detection mechanism for industrial Internet of Things. Ad Hoc Netw 123:102661. https://doi.org/10.1016/j.adhoc.2021.102661
Ahmadi K, Javidan R (2024) A novel RPL defense mechanism based on trust and deep learning for internet of things. J Supercomput. https://doi.org/10.1007/s11227-024-06118-5
Kumar V, Malik N (Mar. 2024) “Machine learning-based attacks detection in loT networks routing protocols,” In: 2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), IEEE, pp. 1–6. https://doi.org/10.1109/ICRITO61523.2024.10522321.
Thirimanne SP, Jayawardana L, Yasakethu L, Liyanaarachchi P, Hewage C (2022) Deep neural network based real-time intrusion detection system. SN Comput Sci 3(2):145. https://doi.org/10.1007/s42979-022-01031-1
Qu K, Xu J, Hou Q, Qu K, Sun Y (2023) Feature selection using Information gain and decision information in neighborhood decision system. Appl Soft Comput 136:110100. https://doi.org/10.1016/j.asoc.2023.110100
Brezocnik L (Jul. 2017) “Feature selection for classification using particle swarm optimization,” In: 17th IEEE International Conference on Smart Technologies, EUROCON 2017 - Conference Proceedings, IEEE, pp. 966–971. https://doi.org/10.1109/EUROCON.2017.8011255.
Rostami M, Forouzandeh S, Berahmand K, Soltani M (2020) Integration of multi-objective PSO based feature selection and node centrality for medical datasets. Genomics 112(6):4370–4384. https://doi.org/10.1016/j.ygeno.2020.07.027
Kurniawati I, Pardede HF (Oct. 2018) Hybrid method of information gain and particle swarm optimization for selection of features of SVM-based sentiment analysis. In: 2018 International Conference on Information Technology Systems and Innovation, ICITSI 2018 - Proceedings, IEEE, pp.1–5 https://doi.org/10.1109/ICITSI.2018.8695953.
Lin TH, Jiang JR (Dec. 2020) “Anomaly Detection with Autoencoder and Random Forest,” In: Proceedings - 2020 International Computer Symposium, ICS 2020, IEEE, pp. 96–99. https://doi.org/10.1109/ICS51289.2020.00028.
Petscharnig S, Lux M, Chatzichristofis S (Jun. 2017) “Dimensionality reduction for image features using deep learning and autoencoders,” in ACM International Conference Proceeding Series, New York, NY, USA: ACM, pp. 1–6. https://doi.org/10.1145/3095713.3095737.
Hastie T, Tibshirani R, James G, Witten D (2006) An Introduction to Statistical Learning Second Edition, vol. 102. in Springer Texts in Statistics, vol. 102. New York, NY: Springer US, https://doi.org/10.1007/978-1-0716-1418-1.
Mokbal FMM, Dan W, Imran A, Jiuchuan L, Akhtar F, Xiaoxi W (2019) MLPXSS: an integrated XSS-based attack detection scheme in web applications using multilayer perceptron technique. IEEE Access 7:100567–100580. https://doi.org/10.1109/ACCESS.2019.2927417
Mokbal FMM, Dan W, Xiaoxi W, Wenbin Z, Lihua F (2021) XGBXSS: an extreme gradient boosting detection framework for cross-site scripting attacks based on hybrid feature selection approach and parameters optimization. J Inf Secur Appl 58:102813. https://doi.org/10.1016/j.jisa.2021.102813
Moustafa N, Slay J (2016) The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf Secur J 25(1–3):18–31. https://doi.org/10.1080/19393555.2015.1125974
Ashiku L, Dagli C (2021) Network intrusion detection system using deep learning. Procedia Comput Sci 185:239–247. https://doi.org/10.1016/j.procs.2021.05.025
Tama BA, Comuzzi M, Rhee K-H (2019) TSE-IDS: a two-stage classifier ensemble for intelligent anomaly-based intrusion detection system. IEEE Access 7:94497–94507. https://doi.org/10.1109/ACCESS.2019.2928048
Acknowledgements
Not Applicable
Funding
The work reported in this paper has been supported by Beijing Natural Science Foundation (IS23054).
Author information
Authors and Affiliations
Contributions
Musa Osman likely led the development of the proposed framework (HADTF) and conducted experiments. He contributed to the paper’s technical content and analysis. Jingsha He (PhD supervisor) provided guidance and expertise in machine learning and autoencoder models. He played a mentorship role in the research and paper writing. Nafei Zhu (corresponding author) coordinated the research efforts and communication. She contributed to the research design, objectives, and manuscript preparation. Fawaz Mahiuob Mohammed Mokbal was involved in data collection and experiment design. He contributed to results analysis and practical implications. Asaad Ahmed provided domain-specific knowledge in IoT security. He contributed to defining threat models and background information.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no competing interests.
Ethical Approval
The manuscript does not contain human or animal studies.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Osman, M., He, J., Zhu, N. et al. HADTF: a hybrid autoencoder–decision tree framework for improved RPL-based attack detection in IoT networks based on enhanced feature selection approach. J Supercomput 80, 26333–26362 (2024). https://doi.org/10.1007/s11227-024-06453-7
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-024-06453-7