SlideShare a Scribd company logo
1 of 28
A Lightweight Intrusion Detection for Sybil
Attack under Mobile RPL in the Internet of
Things
Introduction
 The Internet of Things (IoT) is an emerging technology that can monitor and
control the physical world by gathering and processing data generated by
the sensors.
 IoT for the connectivity of its devices makes use of protocols like 6LoWPAN,
RPL etc.
 Here we discuss RPL (Routing protocol for Low power and lossy networks)
which is a standard routing protocol for resource-constrained and lossy IoT
networks.
 RPL because of its flexible and dynamic nature is vulnerable to security
attacks, hence there is a need for detection and defense against these
attacks.
 Security in RPL is critical and Sybil Attack is one among such security issues
in RPL.
Index Terms
 Internet of Things (IoT)
 RPL
 Sybil Attack
 Mobility
 Intrusion Detection
 Lightweight Security
 Accuracy
Related Work
 Faiza Medjek et al. proposed the evaluation of the impacts of the Sybil
attack in RPL and analyzed the results.
 A. K. Mishra et al. proposed the general analytical model for Sybil attack in
IoT.
 According to Zhang et al. Sybil attack has become a severe threat to social
networks and distinguished the Sybil attack into three types based on the
nature of behavior.
 Karaboga et al. proposed the comprehensive survey on artificial bee
colony (ABC) algorithm and its applications.
Overview of RPL
 RPL is a distance-vector and source routing protocol which is working
under a tree-based topology, namely Destination Oriented Direct Acyclic
Graph (DODAG).
 A DODAG comprises of a sink node called border router(BR),which gathers
all sensed information from the remaining nodes in the DAG.
 Every DODAG is distinguished by its RPL instance ID, DODAG ID, DODAG
version number and Rank.
 There are three types of control messages have been exchanged in RPL:
• DIO - DODAG Information Object
• DAO - DODAG Advertisement Object
• DIS - DODAG Information Solicitation
Overview of RPL Cont.
 Rank is the relative position of the node from the border router.
 Rank is computed using the Equation:
R(N) = R(P) + 128 ∗ ETX(N)
R(N) is the rank value of each node.
R(P) is the rank of its parent node.
ETX(N) is the Expected Transmission Count.
 Expected Transmission Count denotes the number of expected
transmissions that a node required for the successful delivery of a packet.
RPL Network Overview
Border Router
Nodes
DIO DAO
DIS
1
2 3
4 5 6 7
Mobile RPL
 In this discussion, we considered and simulated RPL under mobility (mobile RPL).
 Mobile RPL or Mobility-aware RPL is an enhanced RPL protocol which supports
random mobility of the nodes in the network.
 Dynamic Trickle Timer (D-Trickle) has been used to optimize the number of control
message transfer under mobility.
 RPL determines the best parent from the preferred parent list under mobility by
considering the following metrics, namely, ETX, Expected Life Time (ELT) and RSSI
(Received Signal Strength Indicator).
Sybil Attack
 In Sybil attack, attacker claims multiple illegitimate identities either by
fabricating the identities or compromising the legitimate nodes in the
network.
 Sybil attack is the most serious threat to the mobile RPL which can
degrade the performance by exponentially increasing the control
overhead transmission, and in turn, reduces the overall lifetime of the
network.
 The attacker overloads the DODAG with fake control messages and try to
capture the identity of the border router to obtain the network authority.
Classification of Sybil Attack
 There are three kinds of Sybil attack:
• SA-1 Type Sybil Attack
• SA-2 Type Sybil Attack
• SA-3 Type Sybil Attack
 The classification of types of attacks is made on the basis of distribution,
position and movement of compromised nodes in the RPL.
SA-1 Type Attack
 In SA-1 type of Sybil attack, malicious nodes will target one fixed region, and they
will try to compromise the identities of the nearby nodes to perform the attack.
 All the sybil identities and attackers are fixed at one point in the DODAG.
SA-2 Type Attack
 In SA-2 type Sybil attack, malicious nodes are scattered among the legitimate
nodes in the DODAG and it won’t bound to one region.
 Though the nodes are fixed, the attacker compromises randomly distributed
nodes in the DODAG and makes the detection process complex by socializing with
the legitimate nodes.
SA-3 Type Attack
 In SA-3 type Sybil attack, Sybil nodes are under mobility and, also it is distributed
among the network.
 Sybil identities moves from one position to other position dynamically, and it tries
to attack the nearby nodes on the way of motion.
Artificial Bee Colony Overview
 ABC algorithm is a population-based algorithm and an optimization technique that
simulates the foraging behavior of honey bees.
 Foraging behavior refers to the act of searching food sources (nectar) by the
honey bees.
 Algorithm consists of four significant components:
• Food Sources: The gain of a food source depends on closeness to the
nest, ease of extracting the food and breeding.
• Employed Bees: The employed foragers are those that keep visiting the
food sources to obtain the nectar from the explored sources.
• Onlooker Bees: The onlooker bees are waiting in the nest and
establishing food source through the information shared by employed
foragers.
• Scout Bees: Scout foragers are searching the environment surrounding
the nest for new food sources.
ABC inspired Sybil Attack Model
 Employed bees are related to the compromised Sybil identities in the RPL
network.
 Food sources (Nectar collection) are correlated to the collecting of
compromised identities or stolen identities in the DODAG structure.
 Onlooker Bee (Main attacker) is the one which attempts to perform the
Sybil attack in the community to intrude the network.
 Scout bees are those who have been already compromised by the attacker
(Onlooker bee), and these scout bees try to compromise the nearby
neighboring nodes.
ABC inspired Sybil Attack Model Cont.
 The attacking scenario for ABC inspired attack is divided into 5 phases:
1. Initialization Phase: Initialize the Sybil nodes (Central attacker) to start foraging the
identities.
2. Fitness Factor Computation Phase: Sybil node attempt to select any arbitrary node
based on the following five fitness evaluation criteria.
3. Compromising Phase: Node compromising phase is the process of compromising
the legitimate nodes in the network.
4. Contagious phase: Contagious phase is the action of spreading from one node to
another node.
5. Hive selection and Launching phase: The node with the highest remaining residual
energy value and more compromised neighbor nodes nearby has been chosen as
Sybil node to perform the attack.
ABC inspired Sybil Attack Model Cont.
ABC inspired attack Algorithm
An example scenario of Sybil Attack
Lightweight Intrusion Detection Against
Sybil Attack in Mobile RPL
 A lightweight intrusion detection algorithm is introduced against the Sybil attack,
which needs less computation and provides high accuracy, which are quintessential
in the case of a resource-constrained network.
 Three new variables are introduced in DIO messages, they are:
• NONCE ID(Number used only once in a life): Nonce ID has been
created and allocated to each node when it is joining the DODAG
structure after receiving the DIO message for the first time.
If both the NONCE ID and DODAG ID match with the previous record
then the node is safe.
• Control Message Counter: A node attempts to establish a connection
with a nearby node, it can exchange a maximum of 5 control messages within 10
seconds of interval.
If it exceeds the threshold value, there is a potential sign of a malicious
attack.
Lightweight Intrusion Detection Against
Sybil Attack in Mobile RPL Cont.
• Time Stamp for Control Messages: It will track the time of arrival of the
control messages exchanged from the neighbors.
If the frequency of transmission of control messages within a speculative
period is more than it is a sign of malicious attack.
 Cumulative Trust Factor: The three trust factors are: α, β and γ.
• ρN[n] is the Cumulative Trust Factor.
• ρN[n] = α.[ω.β + (1−ω).γ]
 Pheromone Computation: Γ is the pheromone value, which has been used to
identify the set of best trusted node list.
•
Lightweight Intrusion Detection Algorithm
Performance Evaluation and Related
Metrics
 Confusion Matrix
Based on the confusion matrix the performance of the proposed algorithm has been
analyzed.
 Accuracy is used to estimate the probability of Sybil attack detection by the
proposed intrusion detection algorithm.
Performance Evaluation and Related
Metrics Cont.
 Sensitivity indicates the percentage of actual positive events correctly predicted.
 Specificity shows the rate of actual adverse events identified.
 Precision is positive predictive value (PPV) and NPV (Negative Predictive Value).
Performance Evaluation and Related
Metrics Cont.
 F-score rate represents higher detection performance.
 Simulation Results for the metrics.
Performance Evaluation Results
 Control traffic overhead is the cumulative sum of DIO, DAO, and DIS control
messages transfer in the DODAG.
Performance Evaluation Results Cont.
 Energy Consumption indicates the average energy consumption.

Conclusion
 A bio-inspired analytical model for Sybil attack and lightweight intrusion
detection algorithm for mobile RPL in the Internet of things network is
been designed.
 Considered different types of Sybil attacks and analyzed the performance
of the mobile RPL in terms of control traffic overhead, energy cost, and
accuracy.
 For Type-3 Sybil attack proposed algorithm gains an average accuracy of
95% under mobile RPL.

More Related Content

What's hot

Neighbor Node Trust Based Intrusion Detection System for WSN
Neighbor Node Trust Based Intrusion Detection System for WSNNeighbor Node Trust Based Intrusion Detection System for WSN
Neighbor Node Trust Based Intrusion Detection System for WSNHitesh Mohapatra
 
Routing attacks and counter measures in iot
Routing attacks and counter measures in iotRouting attacks and counter measures in iot
Routing attacks and counter measures in iotRishita Jaggi
 
Flow control & error control
Flow control & error controlFlow control & error control
Flow control & error controlManishTadhiyal
 
Introduction to Router and Routing Basics
Introduction to Router and Routing BasicsIntroduction to Router and Routing Basics
Introduction to Router and Routing BasicsDarwish Ahmad
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit iiJAIGANESH SEKAR
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point ProtocolPhan Vuong
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer NetworksIIIT Manipur
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path FirstKashif Latif
 
IoT Notes Syllabus .pdf
IoT Notes Syllabus .pdfIoT Notes Syllabus .pdf
IoT Notes Syllabus .pdfAnujashejwal
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSKABILESH RAMAR
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link controlVishal kakade
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
 

What's hot (20)

Neighbor Node Trust Based Intrusion Detection System for WSN
Neighbor Node Trust Based Intrusion Detection System for WSNNeighbor Node Trust Based Intrusion Detection System for WSN
Neighbor Node Trust Based Intrusion Detection System for WSN
 
OSPF by Abdullah Mukhtar
OSPF by Abdullah MukhtarOSPF by Abdullah Mukhtar
OSPF by Abdullah Mukhtar
 
Routing attacks and counter measures in iot
Routing attacks and counter measures in iotRouting attacks and counter measures in iot
Routing attacks and counter measures in iot
 
Flow control & error control
Flow control & error controlFlow control & error control
Flow control & error control
 
Introduction to Router and Routing Basics
Introduction to Router and Routing BasicsIntroduction to Router and Routing Basics
Introduction to Router and Routing Basics
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit ii
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 
Network address translation
Network address translationNetwork address translation
Network address translation
 
Routing ppt
Routing pptRouting ppt
Routing ppt
 
Router and types
Router and types Router and types
Router and types
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer Networks
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
 
IoT Notes Syllabus .pdf
IoT Notes Syllabus .pdfIoT Notes Syllabus .pdf
IoT Notes Syllabus .pdf
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
Ipv4 presentation
Ipv4 presentationIpv4 presentation
Ipv4 presentation
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 

Similar to Security of RPL in IoT

A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...Editor IJCATR
 
IRJET- Heterogeneous Network Based Intrusion Detection System in Mobile Ad Ho...
IRJET- Heterogeneous Network Based Intrusion Detection System in Mobile Ad Ho...IRJET- Heterogeneous Network Based Intrusion Detection System in Mobile Ad Ho...
IRJET- Heterogeneous Network Based Intrusion Detection System in Mobile Ad Ho...IRJET Journal
 
Multiple intrusion detection in RPL based networks
Multiple intrusion detection in RPL based networks  Multiple intrusion detection in RPL based networks
Multiple intrusion detection in RPL based networks IJECEIAES
 
Detection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manetsDetection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manetsEditor IJMTER
 
Behavioral Malware Detection in Dtn Using Intrusion Detection System
	Behavioral Malware Detection in Dtn Using Intrusion Detection System	Behavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection Systemtheijes
 
Behavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection SystemBehavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection Systemtheijes
 
Deep learning based hybrid intelligent intrusion detection system
Deep learning based hybrid intelligent intrusion detection systemDeep learning based hybrid intelligent intrusion detection system
Deep learning based hybrid intelligent intrusion detection systemshreya2597
 
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor NetworksNode Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor NetworksEswar Publications
 
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTIONCOMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTIONIJNSA Journal
 
Low Priced And Efficient Energy Replica Detection In WSN
Low Priced And Efficient Energy Replica Detection In WSNLow Priced And Efficient Energy Replica Detection In WSN
Low Priced And Efficient Energy Replica Detection In WSNIRJET Journal
 
A030101001006
A030101001006A030101001006
A030101001006theijes
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYJournal For Research
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...IOSR Journals
 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...gerogepatton
 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...ijaia
 
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...gerogepatton
 
Network Information And Security
Network Information And SecurityNetwork Information And Security
Network Information And Securityanandk10
 

Similar to Security of RPL in IoT (20)

A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
 
IRJET- Heterogeneous Network Based Intrusion Detection System in Mobile Ad Ho...
IRJET- Heterogeneous Network Based Intrusion Detection System in Mobile Ad Ho...IRJET- Heterogeneous Network Based Intrusion Detection System in Mobile Ad Ho...
IRJET- Heterogeneous Network Based Intrusion Detection System in Mobile Ad Ho...
 
Multiple intrusion detection in RPL based networks
Multiple intrusion detection in RPL based networks  Multiple intrusion detection in RPL based networks
Multiple intrusion detection in RPL based networks
 
Detection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manetsDetection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manets
 
06558266
0655826606558266
06558266
 
Behavioral Malware Detection in Dtn Using Intrusion Detection System
	Behavioral Malware Detection in Dtn Using Intrusion Detection System	Behavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection System
 
Behavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection SystemBehavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection System
 
Deep learning based hybrid intelligent intrusion detection system
Deep learning based hybrid intelligent intrusion detection systemDeep learning based hybrid intelligent intrusion detection system
Deep learning based hybrid intelligent intrusion detection system
 
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor NetworksNode Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
 
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTIONCOMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
 
Low Priced And Efficient Energy Replica Detection In WSN
Low Priced And Efficient Energy Replica Detection In WSNLow Priced And Efficient Energy Replica Detection In WSN
Low Priced And Efficient Energy Replica Detection In WSN
 
A030101001006
A030101001006A030101001006
A030101001006
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
 
I1802046780
I1802046780I1802046780
I1802046780
 
G0421040042
G0421040042G0421040042
G0421040042
 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
 
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
 
Network Information And Security
Network Information And SecurityNetwork Information And Security
Network Information And Security
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 

Security of RPL in IoT

  • 1. A Lightweight Intrusion Detection for Sybil Attack under Mobile RPL in the Internet of Things
  • 2. Introduction  The Internet of Things (IoT) is an emerging technology that can monitor and control the physical world by gathering and processing data generated by the sensors.  IoT for the connectivity of its devices makes use of protocols like 6LoWPAN, RPL etc.  Here we discuss RPL (Routing protocol for Low power and lossy networks) which is a standard routing protocol for resource-constrained and lossy IoT networks.  RPL because of its flexible and dynamic nature is vulnerable to security attacks, hence there is a need for detection and defense against these attacks.  Security in RPL is critical and Sybil Attack is one among such security issues in RPL.
  • 3. Index Terms  Internet of Things (IoT)  RPL  Sybil Attack  Mobility  Intrusion Detection  Lightweight Security  Accuracy
  • 4. Related Work  Faiza Medjek et al. proposed the evaluation of the impacts of the Sybil attack in RPL and analyzed the results.  A. K. Mishra et al. proposed the general analytical model for Sybil attack in IoT.  According to Zhang et al. Sybil attack has become a severe threat to social networks and distinguished the Sybil attack into three types based on the nature of behavior.  Karaboga et al. proposed the comprehensive survey on artificial bee colony (ABC) algorithm and its applications.
  • 5. Overview of RPL  RPL is a distance-vector and source routing protocol which is working under a tree-based topology, namely Destination Oriented Direct Acyclic Graph (DODAG).  A DODAG comprises of a sink node called border router(BR),which gathers all sensed information from the remaining nodes in the DAG.  Every DODAG is distinguished by its RPL instance ID, DODAG ID, DODAG version number and Rank.  There are three types of control messages have been exchanged in RPL: • DIO - DODAG Information Object • DAO - DODAG Advertisement Object • DIS - DODAG Information Solicitation
  • 6. Overview of RPL Cont.  Rank is the relative position of the node from the border router.  Rank is computed using the Equation: R(N) = R(P) + 128 ∗ ETX(N) R(N) is the rank value of each node. R(P) is the rank of its parent node. ETX(N) is the Expected Transmission Count.  Expected Transmission Count denotes the number of expected transmissions that a node required for the successful delivery of a packet.
  • 7. RPL Network Overview Border Router Nodes DIO DAO DIS 1 2 3 4 5 6 7
  • 8. Mobile RPL  In this discussion, we considered and simulated RPL under mobility (mobile RPL).  Mobile RPL or Mobility-aware RPL is an enhanced RPL protocol which supports random mobility of the nodes in the network.  Dynamic Trickle Timer (D-Trickle) has been used to optimize the number of control message transfer under mobility.  RPL determines the best parent from the preferred parent list under mobility by considering the following metrics, namely, ETX, Expected Life Time (ELT) and RSSI (Received Signal Strength Indicator).
  • 9. Sybil Attack  In Sybil attack, attacker claims multiple illegitimate identities either by fabricating the identities or compromising the legitimate nodes in the network.  Sybil attack is the most serious threat to the mobile RPL which can degrade the performance by exponentially increasing the control overhead transmission, and in turn, reduces the overall lifetime of the network.  The attacker overloads the DODAG with fake control messages and try to capture the identity of the border router to obtain the network authority.
  • 10. Classification of Sybil Attack  There are three kinds of Sybil attack: • SA-1 Type Sybil Attack • SA-2 Type Sybil Attack • SA-3 Type Sybil Attack  The classification of types of attacks is made on the basis of distribution, position and movement of compromised nodes in the RPL.
  • 11. SA-1 Type Attack  In SA-1 type of Sybil attack, malicious nodes will target one fixed region, and they will try to compromise the identities of the nearby nodes to perform the attack.  All the sybil identities and attackers are fixed at one point in the DODAG.
  • 12. SA-2 Type Attack  In SA-2 type Sybil attack, malicious nodes are scattered among the legitimate nodes in the DODAG and it won’t bound to one region.  Though the nodes are fixed, the attacker compromises randomly distributed nodes in the DODAG and makes the detection process complex by socializing with the legitimate nodes.
  • 13. SA-3 Type Attack  In SA-3 type Sybil attack, Sybil nodes are under mobility and, also it is distributed among the network.  Sybil identities moves from one position to other position dynamically, and it tries to attack the nearby nodes on the way of motion.
  • 14. Artificial Bee Colony Overview  ABC algorithm is a population-based algorithm and an optimization technique that simulates the foraging behavior of honey bees.  Foraging behavior refers to the act of searching food sources (nectar) by the honey bees.  Algorithm consists of four significant components: • Food Sources: The gain of a food source depends on closeness to the nest, ease of extracting the food and breeding. • Employed Bees: The employed foragers are those that keep visiting the food sources to obtain the nectar from the explored sources. • Onlooker Bees: The onlooker bees are waiting in the nest and establishing food source through the information shared by employed foragers. • Scout Bees: Scout foragers are searching the environment surrounding the nest for new food sources.
  • 15. ABC inspired Sybil Attack Model  Employed bees are related to the compromised Sybil identities in the RPL network.  Food sources (Nectar collection) are correlated to the collecting of compromised identities or stolen identities in the DODAG structure.  Onlooker Bee (Main attacker) is the one which attempts to perform the Sybil attack in the community to intrude the network.  Scout bees are those who have been already compromised by the attacker (Onlooker bee), and these scout bees try to compromise the nearby neighboring nodes.
  • 16. ABC inspired Sybil Attack Model Cont.
  • 17.  The attacking scenario for ABC inspired attack is divided into 5 phases: 1. Initialization Phase: Initialize the Sybil nodes (Central attacker) to start foraging the identities. 2. Fitness Factor Computation Phase: Sybil node attempt to select any arbitrary node based on the following five fitness evaluation criteria. 3. Compromising Phase: Node compromising phase is the process of compromising the legitimate nodes in the network. 4. Contagious phase: Contagious phase is the action of spreading from one node to another node. 5. Hive selection and Launching phase: The node with the highest remaining residual energy value and more compromised neighbor nodes nearby has been chosen as Sybil node to perform the attack. ABC inspired Sybil Attack Model Cont.
  • 18. ABC inspired attack Algorithm
  • 19. An example scenario of Sybil Attack
  • 20. Lightweight Intrusion Detection Against Sybil Attack in Mobile RPL  A lightweight intrusion detection algorithm is introduced against the Sybil attack, which needs less computation and provides high accuracy, which are quintessential in the case of a resource-constrained network.  Three new variables are introduced in DIO messages, they are: • NONCE ID(Number used only once in a life): Nonce ID has been created and allocated to each node when it is joining the DODAG structure after receiving the DIO message for the first time. If both the NONCE ID and DODAG ID match with the previous record then the node is safe. • Control Message Counter: A node attempts to establish a connection with a nearby node, it can exchange a maximum of 5 control messages within 10 seconds of interval. If it exceeds the threshold value, there is a potential sign of a malicious attack.
  • 21. Lightweight Intrusion Detection Against Sybil Attack in Mobile RPL Cont. • Time Stamp for Control Messages: It will track the time of arrival of the control messages exchanged from the neighbors. If the frequency of transmission of control messages within a speculative period is more than it is a sign of malicious attack.  Cumulative Trust Factor: The three trust factors are: α, β and γ. • ρN[n] is the Cumulative Trust Factor. • ρN[n] = α.[ω.β + (1−ω).γ]  Pheromone Computation: Γ is the pheromone value, which has been used to identify the set of best trusted node list. •
  • 23. Performance Evaluation and Related Metrics  Confusion Matrix Based on the confusion matrix the performance of the proposed algorithm has been analyzed.  Accuracy is used to estimate the probability of Sybil attack detection by the proposed intrusion detection algorithm.
  • 24. Performance Evaluation and Related Metrics Cont.  Sensitivity indicates the percentage of actual positive events correctly predicted.  Specificity shows the rate of actual adverse events identified.  Precision is positive predictive value (PPV) and NPV (Negative Predictive Value).
  • 25. Performance Evaluation and Related Metrics Cont.  F-score rate represents higher detection performance.  Simulation Results for the metrics.
  • 26. Performance Evaluation Results  Control traffic overhead is the cumulative sum of DIO, DAO, and DIS control messages transfer in the DODAG.
  • 27. Performance Evaluation Results Cont.  Energy Consumption indicates the average energy consumption. 
  • 28. Conclusion  A bio-inspired analytical model for Sybil attack and lightweight intrusion detection algorithm for mobile RPL in the Internet of things network is been designed.  Considered different types of Sybil attacks and analyzed the performance of the mobile RPL in terms of control traffic overhead, energy cost, and accuracy.  For Type-3 Sybil attack proposed algorithm gains an average accuracy of 95% under mobile RPL.