Routing Attacks Detection in 6LoWPAN-Based Internet of Things

17Citations
Citations of this article
57Readers
Mendeley users who have this article in their library.

Abstract

The Internet of Things (IoT) has become increasingly popular, and opened new possibilities for applications in various domains. However, the IoT also poses security challenges due to the limited resources of the devices and its dynamic network topology. Routing attacks on 6LoWPAN-based IoT devices can be particularly challenging to detect because of its unique characteristics of the network. In recent years, several techniques have been proposed for detecting routing attacks, including anomaly detection. These techniques leverage different features of network traffic to identify and classify routing attacks. This paper focuses on routing attacks that target the Routing Protocol for Low-Power and Lossy Networks (RPL), which are widely used in 6LoWPAN-based IoT systems. The attacks discussed in this paper can be categorized as either inherited from Wireless Sensor Networks or exploiting vulnerabilities unique to RPL (known as RPL-specific attacks). The paper describes various RPL attacks, including Flood Attacks, Data-DoS/DDoS Attacks, Wormhole Attacks, RPL Rank Attacks, Blackhole Attacks, Version Attacks, and Sinkhole Attacks. In this paper, a novel Hybrid Intrusion Detection System (HIDS) that combines a decision tree classifier and a one-class Support Vector Machine classifier is proposed to detect routing attacks. The HIDS draws on the strengths of both a Signature Intrusion Detection System (SIDS) and an Anomaly-based Intrusion Detection System (AIDS) to identify routing attacks with a high degree of accuracy and a low false alarm rate. The routing dataset, which features genuine IoT network traffic and various kinds of routing attacks, was used to test the proposed HIDS. According to the findings, the hybrid IDS proposed in this study outperforms SIDS and AIDS approaches, with higher detection rates and lower false positive rates.

References Powered by Scopus

Induction of Decision Trees

15672Citations
N/AReaders
Get full text

Bagging predictors

2889Citations
N/AReaders
Get full text

Anomaly-based network intrusion detection: Techniques, systems and challenges

1446Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review

49Citations
N/AReaders
Get full text

Enhancing Privacy-Preserving Intrusion Detection through Federated Learning

27Citations
N/AReaders
Get full text

Detection and prevention of sinkhole attacks in MANETS based routing protocol using hybrid AdaBoost-Random forest algorithm

10Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Alazab, A., Khraisat, A., Singh, S., Bevinakoppa, S., & Mahdi, O. A. (2023). Routing Attacks Detection in 6LoWPAN-Based Internet of Things. Electronics (Switzerland), 12(6). https://doi.org/10.3390/electronics12061320

Readers over time

‘23‘24‘2508162432

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 9

56%

Lecturer / Post doc 5

31%

Professor / Associate Prof. 1

6%

Researcher 1

6%

Readers' Discipline

Tooltip

Computer Science 10

53%

Engineering 9

47%

Article Metrics

Tooltip
Mentions
Blog Mentions: 1
News Mentions: 1

Save time finding and organizing research with Mendeley

Sign up for free
0