Research Article

Detection of RPL-based Routing Attacks Using Machine Learning Algorithms

Volume: 15 Number: 4 December 23, 2024
EN TR

Detection of RPL-based Routing Attacks Using Machine Learning Algorithms

Abstract

This study analyzes various machine learning techniques for detecting attacks against Routing Protocol for Low-Power and Lossy Networks (RPL), a routing protocol commonly used in Internet of Things (IoT) applications. RPL is often employed in IPv6-based IoT applications that require low power consumption and limited bandwidth. The research reviews recent literature examining attacks on RPL-based networks and utilizes the ROUT-4-2023 dataset for detecting routing attacks. This dataset, created using the Cooja simulator, encompasses four types of routing attacks: Blackhole Attack, Flooding Attack, DODAG Version Number Attack, and Decreased Rank Attack. The attack types are detected using machine learning techniques like AdaBoost, KNN, Random Forest, Decision Tree, and Bagging. In the combined dataset, the Decision Tree and Bagging algorithm exhibited the highest performance with a 99.99% accuracy. To create a more accurate representation of the real world, we incorporate a 10% level of noise into the dataset. On the noisy dataset, Random Forest algorithm performed the best with about 84.80% accuracy. The high accuracy show that the employed methods can be effectively used as an Intrusion Detection System (IDS) to protect IoT networks. As a result, this study demonstrates that machine learning techniques offer a promising approach for detecting routing attacks in the RPL protocol. The findings provide useful information for researchers and practitioners in the field of IoT security. This study contributes to the potential of machine learning-based algorithms to enhance the security of IoT networks and contributes to future research in this area.

Keywords

References

  1. [1] S. Görmüş, H. Aydın, and G. Ulutaş, “Security for the internet of things: a survey of existing mechanisms, protocols and open research issues,” Journal of the Faculty of Engineering and Architecture of Gazi University, vol. 33, no. 4, pp. 1247–1272, 2018.
  2. [2] Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security of the internet of things: perspectives and challenges,” Wireless networks, vol. 20, pp. 2481 2501, 2014.
  3. [3] R. Alexander, A. Brandt, J. Vasseur, J. Hui, K. Pister, P. Thubert, P. Levis, R. Struik, R. Kelsey, and T. Winter, “RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks,” RFC 6550, Mar. 2012. [Online]. Available: editor.org/info/rfc6550 https://www.rfc
  4. [4] A. Verma and V. Ranga, “Machine learning based intrusion detection systems for iot applications,” Wireless Personal Communications, vol. 111, no. 4, pp. 2287–2310, 2020.
  5. [5] T. Bekar, S. Görmüş, B. Aydın, and H. Aydın, “Q learning algorithm inspired objective function optimization for ietf 6tisch networks,” in 2023 International Conference on Smart Applications, Communications and Networking (SmartNets), 2023, pp. 1–6.
  6. [6] M. EMEÇ and M. H. ÖZCANHAN, “Rout-4-2023: Rpl based routing attack dataset for iot,” 2023. [Online]. Available: https://dx.doi.org/10.21227/3mbe-5j70
  7. [7] H. Aydin, S. Goermues, and Y. Jin, “A distributed user authentication mechanism for ietf 6tisch protocol,” in 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), 2018, pp. 1–7.
  8. [8] S. Külcü and S. Görmüş, “Improving synchronization time in 6tisch networks with smart antennas,” in 2022 30th Signal Processing and Communications Applications Conference (SIU). IEEE, 2022, pp. 1–4.

Details

Primary Language

English

Subjects

Machine Learning (Other), Electronics, Sensors and Digital Hardware (Other)

Journal Section

Research Article

Early Pub Date

December 23, 2024

Publication Date

December 23, 2024

Submission Date

May 27, 2024

Acceptance Date

November 25, 2024

Published in Issue

Year 2024 Volume: 15 Number: 4

APA
Aydın, B., Aydın, H., Görmüş, S., & Mollahasanoğlu, E. (2024). Detection of RPL-based Routing Attacks Using Machine Learning Algorithms. Dicle Üniversitesi Mühendislik Fakültesi Mühendislik Dergisi, 15(4), 783-796. https://doi.org/10.24012/dumf.1490367
AMA
1.Aydın B, Aydın H, Görmüş S, Mollahasanoğlu E. Detection of RPL-based Routing Attacks Using Machine Learning Algorithms. DUJE. 2024;15(4):783-796. doi:10.24012/dumf.1490367
Chicago
Aydın, Burak, Hakan Aydın, Sedat Görmüş, and Emin Mollahasanoğlu. 2024. “Detection of RPL-Based Routing Attacks Using Machine Learning Algorithms”. Dicle Üniversitesi Mühendislik Fakültesi Mühendislik Dergisi 15 (4): 783-96. https://doi.org/10.24012/dumf.1490367.
EndNote
Aydın B, Aydın H, Görmüş S, Mollahasanoğlu E (December 1, 2024) Detection of RPL-based Routing Attacks Using Machine Learning Algorithms. Dicle Üniversitesi Mühendislik Fakültesi Mühendislik Dergisi 15 4 783–796.
IEEE
[1]B. Aydın, H. Aydın, S. Görmüş, and E. Mollahasanoğlu, “Detection of RPL-based Routing Attacks Using Machine Learning Algorithms”, DUJE, vol. 15, no. 4, pp. 783–796, Dec. 2024, doi: 10.24012/dumf.1490367.
ISNAD
Aydın, Burak - Aydın, Hakan - Görmüş, Sedat - Mollahasanoğlu, Emin. “Detection of RPL-Based Routing Attacks Using Machine Learning Algorithms”. Dicle Üniversitesi Mühendislik Fakültesi Mühendislik Dergisi 15/4 (December 1, 2024): 783-796. https://doi.org/10.24012/dumf.1490367.
JAMA
1.Aydın B, Aydın H, Görmüş S, Mollahasanoğlu E. Detection of RPL-based Routing Attacks Using Machine Learning Algorithms. DUJE. 2024;15:783–796.
MLA
Aydın, Burak, et al. “Detection of RPL-Based Routing Attacks Using Machine Learning Algorithms”. Dicle Üniversitesi Mühendislik Fakültesi Mühendislik Dergisi, vol. 15, no. 4, Dec. 2024, pp. 783-96, doi:10.24012/dumf.1490367.
Vancouver
1.Burak Aydın, Hakan Aydın, Sedat Görmüş, Emin Mollahasanoğlu. Detection of RPL-based Routing Attacks Using Machine Learning Algorithms. DUJE. 2024 Dec. 1;15(4):783-96. doi:10.24012/dumf.1490367