Abstract
With the integration of efficient computation and communication technologies into sensory devices, the Internet of Things (IoT) applications have increased tremendously in recent decades. While these applications provide numerous benefits to our daily lives, they also pose a great potential risk in terms of security. One of the reasons for this is that devices in IoT-based networks are highly resource constrained and interconnected over lossy links that can be exposed by attackers. The Routing Protocol for Low-Power and Lossy Network (RPL) is the standard routing protocol for such lossy networks. Despite the efficient routing built by RPL, this protocol is susceptible to insider attacks. Therefore, researchers have been working on develo** effective intrusion detection systems for RPL-based IoT. However, most of these studies consume excessive resources (e.g., energy, memory, communication, etc.) and do not consider the constrained characteristics of the network. Hence, they might not be suitable for some devices/networks. Therefore, in this study, we aim to develop an intrusion detection system (IDS) that is both effective and efficient in terms of the cost consumed by intrusion detection (ID) nodes. For this multiple-objective problem, we investigate the use of evolutionary computation-based algorithms and show the performance of evolved intrusion detection algorithms against various RPL-specific attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Alexander, R., et al.: RPL: IPv6 routing protocol for low-power and lossy networks. RFC 6550, March 2012. https://doi.org/10.17487/RFC6550, https://www.rfc-editor.org/info/rfc6550
Arış, A., Oktuğ, S.F.: Analysis of the RPL version number attack with multiple attackers. In: 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), pp. 1–8. IEEE (2020)
Aydogan, E., Yilmaz, S., Sen, S., Butun, I., Forsström, S., Gidlund, M.: A central intrusion detection system for RPL-based industrial internet of things. In: 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS), pp. 1–5. IEEE (2019)
Cakir, S., Toklu, S., Yalcin, N.: RPL attack detection and prevention in the internet of things networks using a GRU based deep learning. IEEE Access 8, 183678–183689 (2020)
Canbalaban, E., Sen, S.: A cross-layer intrusion detection system for RPL-based internet of things. In: Grieco, L.A., Boggia, G., Piro, G., Jararweh, Y., Campolo, C. (eds.) ADHOC-NOW 2020. LNCS, vol. 12338, pp. 214–227. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-61746-2_16
Cisco: Visual networking index: Forecast and trends, 2017–2022 White paper. https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white-paper-c11-741490.html. Accessed 04 Apr 2020
Contiki-Ng: contiki-ng/contiki-ng (2004). https://github.com/contiki-ng/contiki-ng/wiki. Accessed 13 July 2021
Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6(2), 182–197 (2002)
Dogan, C., Yilmaz, S., Sen, S.: Analysis of RPL objective functions with security perspective. In: SENSORNETS, pp. 71–80 (2022)
ECJ: A Java-based evolutionary computation research system (2017). https://cs.gmu.edu/eclab/projects/ecj. Accessed 04 Apr 2022
Eiben, A.E., Smith, J.E., et al.: Introduction to Evolutionary Computing. Natural Computing Series, vol. 53. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-662-44874-8
Gothawal, D.B., Nagaraj, S.: Anomaly-based intrusion detection system in RPL by applying stochastic and evolutionary game models over IoT environment. Wirel. Pers. Commun. 110(3), 1323–1344 (2020)
Herberg, U., Clausen, T.: A comparative performance study of the routing protocols load and RPL with bi-directional traffic in low-power and lossy networks (LLN). In: Proceedings of the 8th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks. PE-WASUN 2011, pp. 73–80. Association for Computing Machinery, New York (2011). https://doi.org/10.1145/2069063.2069076
Koza, J.R.: Genetic programming as a means for programming computers by natural selection. Stat. Comput. 4(2), 87–112 (1994)
Li, F., Shinde, A., Shi, Y., Ye, J., Li, X.Y., Song, W.: System statistics learning-based IoT security: Feasibility and suitability. IEEE Internet Things J. 6(4), 6396–6403 (2019)
Mayzaud, A., Badonnel, R., Chrisment, I.: A taxonomy of attacks in RPL-based internet of things. Int. J. Netw. Secur. 18, 459–473 (2016)
Mayzaud, A., Badonnel, R., Chrisment, I.: A distributed monitoring strategy for detecting version number attacks in RPL-based networks. IEEE Trans. Netw. Serv. Manage. 14(2), 472–486 (2017)
Muzammal, S.M., Murugesan, R.K., Jhanjhi, N.Z., Humayun, M., Ibrahim, A.O., Abdelmaboud, A.: A trust-based model for secure routing against RPL attacks in internet of things. Sensors 22(18), 7052 (2022)
Osterlind, F., Dunkels, A., Eriksson, J., Finne, N., Voigt, T.: Cross-level sensor network simulation with Cooja. In: Proceedings. 2006 31st IEEE Conference on Local Computer Networks, pp. 641–648. IEEE (2006)
Raza, S., Wallgren, L., Voigt, T.: Svelte: real-time intrusion detection in the internet of things. Ad Hoc Netw. 11(8), 2661–2674 (2013)
Sen, S.: A survey of intrusion detection systems using evolutionary computation. In: Bio-inspired Computation in Telecommunications, pp. 73–94. Elsevier (2015)
Statista: Internet of things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions). https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/. Accessed 10 Apr 2022
Vu, L., Nguyen, Q.U., Nguyen, D.N., Hoang, D.T., Dutkiewicz, E.: Deep transfer learning for IoT attack detection. IEEE Access 8, 107335–107344 (2020)
Wu, S.X., Banzhaf, W.: The use of computational intelligence in intrusion detection systems: a review. Appl. Soft Comput. 10(1), 1–35 (2010)
Yavuz, F.Y., Devrim, Ü., Ensar, G.: Deep learning for detection of routing attacks in the internet of things. Int. J. Comput. Intell. Syst. 12(1), 39 (2018)
Yılmaz, S., Aydogan, E., Sen, S.: A transfer learning approach for securing resource-constrained IoT devices. IEEE Trans. Inf. Forensics Secur. 16, 4405–4418 (2021)
Zahra, F., Jhanjhi, N., Brohi, S.N., Khan, N.A., Masud, M., AlZain, M.A.: Rank and wormhole attack detection model for RPL-based internet of things using machine learning. Sensors 22(18), 6765 (2022)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Deveci, A., Yilmaz, S., Sen, S. (2023). Evolving Lightweight Intrusion Detection Systems for RPL-Based Internet of Things. In: Correia, J., Smith, S., Qaddoura, R. (eds) Applications of Evolutionary Computation. EvoApplications 2023. Lecture Notes in Computer Science, vol 13989. Springer, Cham. https://doi.org/10.1007/978-3-031-30229-9_12
Download citation
DOI: https://doi.org/10.1007/978-3-031-30229-9_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-30228-2
Online ISBN: 978-3-031-30229-9
eBook Packages: Computer ScienceComputer Science (R0)