Evolving Lightweight Intrusion Detection Systems for RPL-Based Internet of Things

  • Conference paper
  • First Online:
Applications of Evolutionary Computation (EvoApplications 2023)

Abstract

With the integration of efficient computation and communication technologies into sensory devices, the Internet of Things (IoT) applications have increased tremendously in recent decades. While these applications provide numerous benefits to our daily lives, they also pose a great potential risk in terms of security. One of the reasons for this is that devices in IoT-based networks are highly resource constrained and interconnected over lossy links that can be exposed by attackers. The Routing Protocol for Low-Power and Lossy Network (RPL) is the standard routing protocol for such lossy networks. Despite the efficient routing built by RPL, this protocol is susceptible to insider attacks. Therefore, researchers have been working on develo** effective intrusion detection systems for RPL-based IoT. However, most of these studies consume excessive resources (e.g., energy, memory, communication, etc.) and do not consider the constrained characteristics of the network. Hence, they might not be suitable for some devices/networks. Therefore, in this study, we aim to develop an intrusion detection system (IDS) that is both effective and efficient in terms of the cost consumed by intrusion detection (ID) nodes. For this multiple-objective problem, we investigate the use of evolutionary computation-based algorithms and show the performance of evolved intrusion detection algorithms against various RPL-specific attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Alexander, R., et al.: RPL: IPv6 routing protocol for low-power and lossy networks. RFC 6550, March 2012. https://doi.org/10.17487/RFC6550, https://www.rfc-editor.org/info/rfc6550

  2. Arış, A., Oktuğ, S.F.: Analysis of the RPL version number attack with multiple attackers. In: 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), pp. 1–8. IEEE (2020)

    Google Scholar 

  3. Aydogan, E., Yilmaz, S., Sen, S., Butun, I., Forsström, S., Gidlund, M.: A central intrusion detection system for RPL-based industrial internet of things. In: 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS), pp. 1–5. IEEE (2019)

    Google Scholar 

  4. Cakir, S., Toklu, S., Yalcin, N.: RPL attack detection and prevention in the internet of things networks using a GRU based deep learning. IEEE Access 8, 183678–183689 (2020)

    Article  Google Scholar 

  5. Canbalaban, E., Sen, S.: A cross-layer intrusion detection system for RPL-based internet of things. In: Grieco, L.A., Boggia, G., Piro, G., Jararweh, Y., Campolo, C. (eds.) ADHOC-NOW 2020. LNCS, vol. 12338, pp. 214–227. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-61746-2_16

    Chapter  Google Scholar 

  6. Cisco: Visual networking index: Forecast and trends, 2017–2022 White paper. https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white-paper-c11-741490.html. Accessed 04 Apr 2020

  7. Contiki-Ng: contiki-ng/contiki-ng (2004). https://github.com/contiki-ng/contiki-ng/wiki. Accessed 13 July 2021

  8. Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6(2), 182–197 (2002)

    Article  Google Scholar 

  9. Dogan, C., Yilmaz, S., Sen, S.: Analysis of RPL objective functions with security perspective. In: SENSORNETS, pp. 71–80 (2022)

    Google Scholar 

  10. ECJ: A Java-based evolutionary computation research system (2017). https://cs.gmu.edu/eclab/projects/ecj. Accessed 04 Apr 2022

  11. Eiben, A.E., Smith, J.E., et al.: Introduction to Evolutionary Computing. Natural Computing Series, vol. 53. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-662-44874-8

    Book  MATH  Google Scholar 

  12. Gothawal, D.B., Nagaraj, S.: Anomaly-based intrusion detection system in RPL by applying stochastic and evolutionary game models over IoT environment. Wirel. Pers. Commun. 110(3), 1323–1344 (2020)

    Article  Google Scholar 

  13. Herberg, U., Clausen, T.: A comparative performance study of the routing protocols load and RPL with bi-directional traffic in low-power and lossy networks (LLN). In: Proceedings of the 8th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks. PE-WASUN 2011, pp. 73–80. Association for Computing Machinery, New York (2011). https://doi.org/10.1145/2069063.2069076

  14. Koza, J.R.: Genetic programming as a means for programming computers by natural selection. Stat. Comput. 4(2), 87–112 (1994)

    Article  Google Scholar 

  15. Li, F., Shinde, A., Shi, Y., Ye, J., Li, X.Y., Song, W.: System statistics learning-based IoT security: Feasibility and suitability. IEEE Internet Things J. 6(4), 6396–6403 (2019)

    Article  Google Scholar 

  16. Mayzaud, A., Badonnel, R., Chrisment, I.: A taxonomy of attacks in RPL-based internet of things. Int. J. Netw. Secur. 18, 459–473 (2016)

    Google Scholar 

  17. Mayzaud, A., Badonnel, R., Chrisment, I.: A distributed monitoring strategy for detecting version number attacks in RPL-based networks. IEEE Trans. Netw. Serv. Manage. 14(2), 472–486 (2017)

    Article  Google Scholar 

  18. Muzammal, S.M., Murugesan, R.K., Jhanjhi, N.Z., Humayun, M., Ibrahim, A.O., Abdelmaboud, A.: A trust-based model for secure routing against RPL attacks in internet of things. Sensors 22(18), 7052 (2022)

    Article  Google Scholar 

  19. Osterlind, F., Dunkels, A., Eriksson, J., Finne, N., Voigt, T.: Cross-level sensor network simulation with Cooja. In: Proceedings. 2006 31st IEEE Conference on Local Computer Networks, pp. 641–648. IEEE (2006)

    Google Scholar 

  20. Raza, S., Wallgren, L., Voigt, T.: Svelte: real-time intrusion detection in the internet of things. Ad Hoc Netw. 11(8), 2661–2674 (2013)

    Article  Google Scholar 

  21. Sen, S.: A survey of intrusion detection systems using evolutionary computation. In: Bio-inspired Computation in Telecommunications, pp. 73–94. Elsevier (2015)

    Google Scholar 

  22. Statista: Internet of things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions). https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/. Accessed 10 Apr 2022

  23. Vu, L., Nguyen, Q.U., Nguyen, D.N., Hoang, D.T., Dutkiewicz, E.: Deep transfer learning for IoT attack detection. IEEE Access 8, 107335–107344 (2020)

    Article  Google Scholar 

  24. Wu, S.X., Banzhaf, W.: The use of computational intelligence in intrusion detection systems: a review. Appl. Soft Comput. 10(1), 1–35 (2010)

    Article  Google Scholar 

  25. Yavuz, F.Y., Devrim, Ü., Ensar, G.: Deep learning for detection of routing attacks in the internet of things. Int. J. Comput. Intell. Syst. 12(1), 39 (2018)

    Article  Google Scholar 

  26. Yılmaz, S., Aydogan, E., Sen, S.: A transfer learning approach for securing resource-constrained IoT devices. IEEE Trans. Inf. Forensics Secur. 16, 4405–4418 (2021)

    Article  Google Scholar 

  27. Zahra, F., Jhanjhi, N., Brohi, S.N., Khan, N.A., Masud, M., AlZain, M.A.: Rank and wormhole attack detection model for RPL-based internet of things using machine learning. Sensors 22(18), 6765 (2022)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ali Deveci .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Deveci, A., Yilmaz, S., Sen, S. (2023). Evolving Lightweight Intrusion Detection Systems for RPL-Based Internet of Things. In: Correia, J., Smith, S., Qaddoura, R. (eds) Applications of Evolutionary Computation. EvoApplications 2023. Lecture Notes in Computer Science, vol 13989. Springer, Cham. https://doi.org/10.1007/978-3-031-30229-9_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-30229-9_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-30228-2

  • Online ISBN: 978-3-031-30229-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation