SlideShare a Scribd company logo
A Lightweight Intrusion Detection for Sybil
Attack under Mobile RPL in the Internet of
Things
Introduction
 The Internet of Things (IoT) is an emerging technology that can monitor and
control the physical world by gathering and processing data generated by
the sensors.
 IoT for the connectivity of its devices makes use of protocols like 6LoWPAN,
RPL etc.
 Here we discuss RPL (Routing protocol for Low power and lossy networks)
which is a standard routing protocol for resource-constrained and lossy IoT
networks.
 RPL because of its flexible and dynamic nature is vulnerable to security
attacks, hence there is a need for detection and defense against these
attacks.
 Security in RPL is critical and Sybil Attack is one among such security issues
in RPL.
Index Terms
 Internet of Things (IoT)
 RPL
 Sybil Attack
 Mobility
 Intrusion Detection
 Lightweight Security
 Accuracy
Related Work
 Faiza Medjek et al. proposed the evaluation of the impacts of the Sybil
attack in RPL and analyzed the results.
 A. K. Mishra et al. proposed the general analytical model for Sybil attack in
IoT.
 According to Zhang et al. Sybil attack has become a severe threat to social
networks and distinguished the Sybil attack into three types based on the
nature of behavior.
 Karaboga et al. proposed the comprehensive survey on artificial bee
colony (ABC) algorithm and its applications.
Overview of RPL
 RPL is a distance-vector and source routing protocol which is working
under a tree-based topology, namely Destination Oriented Direct Acyclic
Graph (DODAG).
 A DODAG comprises of a sink node called border router(BR),which gathers
all sensed information from the remaining nodes in the DAG.
 Every DODAG is distinguished by its RPL instance ID, DODAG ID, DODAG
version number and Rank.
 There are three types of control messages have been exchanged in RPL:
• DIO - DODAG Information Object
• DAO - DODAG Advertisement Object
• DIS - DODAG Information Solicitation
Overview of RPL Cont.
 Rank is the relative position of the node from the border router.
 Rank is computed using the Equation:
R(N) = R(P) + 128 ∗ ETX(N)
R(N) is the rank value of each node.
R(P) is the rank of its parent node.
ETX(N) is the Expected Transmission Count.
 Expected Transmission Count denotes the number of expected
transmissions that a node required for the successful delivery of a packet.
RPL Network Overview
Border Router
Nodes
DIO DAO
DIS
1
2 3
4 5 6 7
Mobile RPL
 In this discussion, we considered and simulated RPL under mobility (mobile RPL).
 Mobile RPL or Mobility-aware RPL is an enhanced RPL protocol which supports
random mobility of the nodes in the network.
 Dynamic Trickle Timer (D-Trickle) has been used to optimize the number of control
message transfer under mobility.
 RPL determines the best parent from the preferred parent list under mobility by
considering the following metrics, namely, ETX, Expected Life Time (ELT) and RSSI
(Received Signal Strength Indicator).
Sybil Attack
 In Sybil attack, attacker claims multiple illegitimate identities either by
fabricating the identities or compromising the legitimate nodes in the
network.
 Sybil attack is the most serious threat to the mobile RPL which can
degrade the performance by exponentially increasing the control
overhead transmission, and in turn, reduces the overall lifetime of the
network.
 The attacker overloads the DODAG with fake control messages and try to
capture the identity of the border router to obtain the network authority.
Classification of Sybil Attack
 There are three kinds of Sybil attack:
• SA-1 Type Sybil Attack
• SA-2 Type Sybil Attack
• SA-3 Type Sybil Attack
 The classification of types of attacks is made on the basis of distribution,
position and movement of compromised nodes in the RPL.
SA-1 Type Attack
 In SA-1 type of Sybil attack, malicious nodes will target one fixed region, and they
will try to compromise the identities of the nearby nodes to perform the attack.
 All the sybil identities and attackers are fixed at one point in the DODAG.
SA-2 Type Attack
 In SA-2 type Sybil attack, malicious nodes are scattered among the legitimate
nodes in the DODAG and it won’t bound to one region.
 Though the nodes are fixed, the attacker compromises randomly distributed
nodes in the DODAG and makes the detection process complex by socializing with
the legitimate nodes.
SA-3 Type Attack
 In SA-3 type Sybil attack, Sybil nodes are under mobility and, also it is distributed
among the network.
 Sybil identities moves from one position to other position dynamically, and it tries
to attack the nearby nodes on the way of motion.
Artificial Bee Colony Overview
 ABC algorithm is a population-based algorithm and an optimization technique that
simulates the foraging behavior of honey bees.
 Foraging behavior refers to the act of searching food sources (nectar) by the
honey bees.
 Algorithm consists of four significant components:
• Food Sources: The gain of a food source depends on closeness to the
nest, ease of extracting the food and breeding.
• Employed Bees: The employed foragers are those that keep visiting the
food sources to obtain the nectar from the explored sources.
• Onlooker Bees: The onlooker bees are waiting in the nest and
establishing food source through the information shared by employed
foragers.
• Scout Bees: Scout foragers are searching the environment surrounding
the nest for new food sources.
ABC inspired Sybil Attack Model
 Employed bees are related to the compromised Sybil identities in the RPL
network.
 Food sources (Nectar collection) are correlated to the collecting of
compromised identities or stolen identities in the DODAG structure.
 Onlooker Bee (Main attacker) is the one which attempts to perform the
Sybil attack in the community to intrude the network.
 Scout bees are those who have been already compromised by the attacker
(Onlooker bee), and these scout bees try to compromise the nearby
neighboring nodes.
ABC inspired Sybil Attack Model Cont.
 The attacking scenario for ABC inspired attack is divided into 5 phases:
1. Initialization Phase: Initialize the Sybil nodes (Central attacker) to start foraging the
identities.
2. Fitness Factor Computation Phase: Sybil node attempt to select any arbitrary node
based on the following five fitness evaluation criteria.
3. Compromising Phase: Node compromising phase is the process of compromising
the legitimate nodes in the network.
4. Contagious phase: Contagious phase is the action of spreading from one node to
another node.
5. Hive selection and Launching phase: The node with the highest remaining residual
energy value and more compromised neighbor nodes nearby has been chosen as
Sybil node to perform the attack.
ABC inspired Sybil Attack Model Cont.
ABC inspired attack Algorithm
An example scenario of Sybil Attack
Lightweight Intrusion Detection Against
Sybil Attack in Mobile RPL
 A lightweight intrusion detection algorithm is introduced against the Sybil attack,
which needs less computation and provides high accuracy, which are quintessential
in the case of a resource-constrained network.
 Three new variables are introduced in DIO messages, they are:
• NONCE ID(Number used only once in a life): Nonce ID has been
created and allocated to each node when it is joining the DODAG
structure after receiving the DIO message for the first time.
If both the NONCE ID and DODAG ID match with the previous record
then the node is safe.
• Control Message Counter: A node attempts to establish a connection
with a nearby node, it can exchange a maximum of 5 control messages within 10
seconds of interval.
If it exceeds the threshold value, there is a potential sign of a malicious
attack.
Lightweight Intrusion Detection Against
Sybil Attack in Mobile RPL Cont.
• Time Stamp for Control Messages: It will track the time of arrival of the
control messages exchanged from the neighbors.
If the frequency of transmission of control messages within a speculative
period is more than it is a sign of malicious attack.
 Cumulative Trust Factor: The three trust factors are: α, β and γ.
• ρN[n] is the Cumulative Trust Factor.
• ρN[n] = α.[ω.β + (1−ω).γ]
 Pheromone Computation: Γ is the pheromone value, which has been used to
identify the set of best trusted node list.
•
Lightweight Intrusion Detection Algorithm
Performance Evaluation and Related
Metrics
 Confusion Matrix
Based on the confusion matrix the performance of the proposed algorithm has been
analyzed.
 Accuracy is used to estimate the probability of Sybil attack detection by the
proposed intrusion detection algorithm.
Performance Evaluation and Related
Metrics Cont.
 Sensitivity indicates the percentage of actual positive events correctly predicted.
 Specificity shows the rate of actual adverse events identified.
 Precision is positive predictive value (PPV) and NPV (Negative Predictive Value).
Performance Evaluation and Related
Metrics Cont.
 F-score rate represents higher detection performance.
 Simulation Results for the metrics.
Performance Evaluation Results
 Control traffic overhead is the cumulative sum of DIO, DAO, and DIS control
messages transfer in the DODAG.
Performance Evaluation Results Cont.
 Energy Consumption indicates the average energy consumption.

Conclusion
 A bio-inspired analytical model for Sybil attack and lightweight intrusion
detection algorithm for mobile RPL in the Internet of things network is
been designed.
 Considered different types of Sybil attacks and analyzed the performance
of the mobile RPL in terms of control traffic overhead, energy cost, and
accuracy.
 For Type-3 Sybil attack proposed algorithm gains an average accuracy of
95% under mobile RPL.

More Related Content

What's hot

Snort
SnortSnort
Snort IDS
Snort IDSSnort IDS
Snort IDS
primeteacher32
 
Rpl
Rpl Rpl
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)
NetProtocol Xpert
 
Technology Introduction Series: Edge Computing tutorial.pdf
Technology Introduction Series: Edge Computing tutorial.pdfTechnology Introduction Series: Edge Computing tutorial.pdf
Technology Introduction Series: Edge Computing tutorial.pdf
3G4G
 
CoAP Course for m2m and Internet of Things scenarios
CoAP Course for m2m and Internet of Things scenariosCoAP Course for m2m and Internet of Things scenarios
CoAP Course for m2m and Internet of Things scenarios
carlosralli
 
RPL - Routing Protocol for Low Power and Lossy Networks
RPL - Routing Protocol for Low Power and Lossy NetworksRPL - Routing Protocol for Low Power and Lossy Networks
RPL - Routing Protocol for Low Power and Lossy Networks
Pradeep Kumar TS
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wireshark
Basaveswar Kureti
 
Intrusion Detection System using Snort
Intrusion Detection System using Snort Intrusion Detection System using Snort
Intrusion Detection System using Snort
webhostingguy
 
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT Security
SHAAMILIVARSAGV
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
Jayesh Rane
 
IGMP
IGMPIGMP
Kurumsal Ağlarda Saldırı Tespiti Amaçlı Honeypot Sistemlerin Efektif Kullanımı
Kurumsal Ağlarda Saldırı Tespiti Amaçlı Honeypot Sistemlerin Efektif KullanımıKurumsal Ağlarda Saldırı Tespiti Amaçlı Honeypot Sistemlerin Efektif Kullanımı
Kurumsal Ağlarda Saldırı Tespiti Amaçlı Honeypot Sistemlerin Efektif Kullanımı
BGA Cyber Security
 
Vlsm and supernetting
Vlsm and supernettingVlsm and supernetting
Vlsm and supernetting
Nahian Ahmed
 
Deep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection systemDeep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection system
Avinash Kumar
 
Network intrusion detection system and analysis
Network intrusion detection system and analysisNetwork intrusion detection system and analysis
Network intrusion detection system and analysis
Bikrant Gautam
 
Snort
SnortSnort
Snort IDS/IPS Basics
Snort IDS/IPS BasicsSnort IDS/IPS Basics
Snort IDS/IPS Basics
Mahendra Pratap Singh
 
Arp and rarp
Arp and rarpArp and rarp
How MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operationsHow MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operations
Sergey Soldatov
 

What's hot (20)

Snort
SnortSnort
Snort
 
Snort IDS
Snort IDSSnort IDS
Snort IDS
 
Rpl
Rpl Rpl
Rpl
 
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)
 
Technology Introduction Series: Edge Computing tutorial.pdf
Technology Introduction Series: Edge Computing tutorial.pdfTechnology Introduction Series: Edge Computing tutorial.pdf
Technology Introduction Series: Edge Computing tutorial.pdf
 
CoAP Course for m2m and Internet of Things scenarios
CoAP Course for m2m and Internet of Things scenariosCoAP Course for m2m and Internet of Things scenarios
CoAP Course for m2m and Internet of Things scenarios
 
RPL - Routing Protocol for Low Power and Lossy Networks
RPL - Routing Protocol for Low Power and Lossy NetworksRPL - Routing Protocol for Low Power and Lossy Networks
RPL - Routing Protocol for Low Power and Lossy Networks
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wireshark
 
Intrusion Detection System using Snort
Intrusion Detection System using Snort Intrusion Detection System using Snort
Intrusion Detection System using Snort
 
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT Security
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
IGMP
IGMPIGMP
IGMP
 
Kurumsal Ağlarda Saldırı Tespiti Amaçlı Honeypot Sistemlerin Efektif Kullanımı
Kurumsal Ağlarda Saldırı Tespiti Amaçlı Honeypot Sistemlerin Efektif KullanımıKurumsal Ağlarda Saldırı Tespiti Amaçlı Honeypot Sistemlerin Efektif Kullanımı
Kurumsal Ağlarda Saldırı Tespiti Amaçlı Honeypot Sistemlerin Efektif Kullanımı
 
Vlsm and supernetting
Vlsm and supernettingVlsm and supernetting
Vlsm and supernetting
 
Deep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection systemDeep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection system
 
Network intrusion detection system and analysis
Network intrusion detection system and analysisNetwork intrusion detection system and analysis
Network intrusion detection system and analysis
 
Snort
SnortSnort
Snort
 
Snort IDS/IPS Basics
Snort IDS/IPS BasicsSnort IDS/IPS Basics
Snort IDS/IPS Basics
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
How MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operationsHow MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operations
 

Similar to Security of RPL in IoT

A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
Editor IJCATR
 
Routing attacks and counter measures in iot
Routing attacks and counter measures in iotRouting attacks and counter measures in iot
Routing attacks and counter measures in iot
Rishita Jaggi
 
IRJET- Heterogeneous Network Based Intrusion Detection System in Mobile Ad Ho...
IRJET- Heterogeneous Network Based Intrusion Detection System in Mobile Ad Ho...IRJET- Heterogeneous Network Based Intrusion Detection System in Mobile Ad Ho...
IRJET- Heterogeneous Network Based Intrusion Detection System in Mobile Ad Ho...
IRJET Journal
 
Multiple intrusion detection in RPL based networks
Multiple intrusion detection in RPL based networks  Multiple intrusion detection in RPL based networks
Multiple intrusion detection in RPL based networks
IJECEIAES
 
Detection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manetsDetection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manets
Editor IJMTER
 
06558266
0655826606558266
06558266
Vidya Sagar
 
Behavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection SystemBehavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection System
theijes
 
Behavioral Malware Detection in Dtn Using Intrusion Detection System
	Behavioral Malware Detection in Dtn Using Intrusion Detection System	Behavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection System
theijes
 
Deep learning based hybrid intelligent intrusion detection system
Deep learning based hybrid intelligent intrusion detection systemDeep learning based hybrid intelligent intrusion detection system
Deep learning based hybrid intelligent intrusion detection system
shreya2597
 
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor NetworksNode Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
Eswar Publications
 
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTIONCOMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
IJNSA Journal
 
Low Priced And Efficient Energy Replica Detection In WSN
Low Priced And Efficient Energy Replica Detection In WSNLow Priced And Efficient Energy Replica Detection In WSN
Low Priced And Efficient Energy Replica Detection In WSN
IRJET Journal
 
A030101001006
A030101001006A030101001006
A030101001006
theijes
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
Journal For Research
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
IOSR Journals
 
I1802046780
I1802046780I1802046780
I1802046780
IOSR Journals
 
G0421040042
G0421040042G0421040042
G0421040042
ijceronline
 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
gerogepatton
 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
ijaia
 
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
gerogepatton
 

Similar to Security of RPL in IoT (20)

A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
 
Routing attacks and counter measures in iot
Routing attacks and counter measures in iotRouting attacks and counter measures in iot
Routing attacks and counter measures in iot
 
IRJET- Heterogeneous Network Based Intrusion Detection System in Mobile Ad Ho...
IRJET- Heterogeneous Network Based Intrusion Detection System in Mobile Ad Ho...IRJET- Heterogeneous Network Based Intrusion Detection System in Mobile Ad Ho...
IRJET- Heterogeneous Network Based Intrusion Detection System in Mobile Ad Ho...
 
Multiple intrusion detection in RPL based networks
Multiple intrusion detection in RPL based networks  Multiple intrusion detection in RPL based networks
Multiple intrusion detection in RPL based networks
 
Detection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manetsDetection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manets
 
06558266
0655826606558266
06558266
 
Behavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection SystemBehavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection System
 
Behavioral Malware Detection in Dtn Using Intrusion Detection System
	Behavioral Malware Detection in Dtn Using Intrusion Detection System	Behavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection System
 
Deep learning based hybrid intelligent intrusion detection system
Deep learning based hybrid intelligent intrusion detection systemDeep learning based hybrid intelligent intrusion detection system
Deep learning based hybrid intelligent intrusion detection system
 
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor NetworksNode Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
 
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTIONCOMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
 
Low Priced And Efficient Energy Replica Detection In WSN
Low Priced And Efficient Energy Replica Detection In WSNLow Priced And Efficient Energy Replica Detection In WSN
Low Priced And Efficient Energy Replica Detection In WSN
 
A030101001006
A030101001006A030101001006
A030101001006
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
 
I1802046780
I1802046780I1802046780
I1802046780
 
G0421040042
G0421040042G0421040042
G0421040042
 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
 
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ...
 
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
A Survey on Different Machine Learning Algorithms and Weak Classifiers Based ...
 

Recently uploaded

CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
PKavitha10
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
shahdabdulbaset
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
GauravCar
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
SakkaravarthiShanmug
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
MiscAnnoy1
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
Madan Karki
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 

Security of RPL in IoT

  • 1. A Lightweight Intrusion Detection for Sybil Attack under Mobile RPL in the Internet of Things
  • 2. Introduction  The Internet of Things (IoT) is an emerging technology that can monitor and control the physical world by gathering and processing data generated by the sensors.  IoT for the connectivity of its devices makes use of protocols like 6LoWPAN, RPL etc.  Here we discuss RPL (Routing protocol for Low power and lossy networks) which is a standard routing protocol for resource-constrained and lossy IoT networks.  RPL because of its flexible and dynamic nature is vulnerable to security attacks, hence there is a need for detection and defense against these attacks.  Security in RPL is critical and Sybil Attack is one among such security issues in RPL.
  • 3. Index Terms  Internet of Things (IoT)  RPL  Sybil Attack  Mobility  Intrusion Detection  Lightweight Security  Accuracy
  • 4. Related Work  Faiza Medjek et al. proposed the evaluation of the impacts of the Sybil attack in RPL and analyzed the results.  A. K. Mishra et al. proposed the general analytical model for Sybil attack in IoT.  According to Zhang et al. Sybil attack has become a severe threat to social networks and distinguished the Sybil attack into three types based on the nature of behavior.  Karaboga et al. proposed the comprehensive survey on artificial bee colony (ABC) algorithm and its applications.
  • 5. Overview of RPL  RPL is a distance-vector and source routing protocol which is working under a tree-based topology, namely Destination Oriented Direct Acyclic Graph (DODAG).  A DODAG comprises of a sink node called border router(BR),which gathers all sensed information from the remaining nodes in the DAG.  Every DODAG is distinguished by its RPL instance ID, DODAG ID, DODAG version number and Rank.  There are three types of control messages have been exchanged in RPL: • DIO - DODAG Information Object • DAO - DODAG Advertisement Object • DIS - DODAG Information Solicitation
  • 6. Overview of RPL Cont.  Rank is the relative position of the node from the border router.  Rank is computed using the Equation: R(N) = R(P) + 128 ∗ ETX(N) R(N) is the rank value of each node. R(P) is the rank of its parent node. ETX(N) is the Expected Transmission Count.  Expected Transmission Count denotes the number of expected transmissions that a node required for the successful delivery of a packet.
  • 7. RPL Network Overview Border Router Nodes DIO DAO DIS 1 2 3 4 5 6 7
  • 8. Mobile RPL  In this discussion, we considered and simulated RPL under mobility (mobile RPL).  Mobile RPL or Mobility-aware RPL is an enhanced RPL protocol which supports random mobility of the nodes in the network.  Dynamic Trickle Timer (D-Trickle) has been used to optimize the number of control message transfer under mobility.  RPL determines the best parent from the preferred parent list under mobility by considering the following metrics, namely, ETX, Expected Life Time (ELT) and RSSI (Received Signal Strength Indicator).
  • 9. Sybil Attack  In Sybil attack, attacker claims multiple illegitimate identities either by fabricating the identities or compromising the legitimate nodes in the network.  Sybil attack is the most serious threat to the mobile RPL which can degrade the performance by exponentially increasing the control overhead transmission, and in turn, reduces the overall lifetime of the network.  The attacker overloads the DODAG with fake control messages and try to capture the identity of the border router to obtain the network authority.
  • 10. Classification of Sybil Attack  There are three kinds of Sybil attack: • SA-1 Type Sybil Attack • SA-2 Type Sybil Attack • SA-3 Type Sybil Attack  The classification of types of attacks is made on the basis of distribution, position and movement of compromised nodes in the RPL.
  • 11. SA-1 Type Attack  In SA-1 type of Sybil attack, malicious nodes will target one fixed region, and they will try to compromise the identities of the nearby nodes to perform the attack.  All the sybil identities and attackers are fixed at one point in the DODAG.
  • 12. SA-2 Type Attack  In SA-2 type Sybil attack, malicious nodes are scattered among the legitimate nodes in the DODAG and it won’t bound to one region.  Though the nodes are fixed, the attacker compromises randomly distributed nodes in the DODAG and makes the detection process complex by socializing with the legitimate nodes.
  • 13. SA-3 Type Attack  In SA-3 type Sybil attack, Sybil nodes are under mobility and, also it is distributed among the network.  Sybil identities moves from one position to other position dynamically, and it tries to attack the nearby nodes on the way of motion.
  • 14. Artificial Bee Colony Overview  ABC algorithm is a population-based algorithm and an optimization technique that simulates the foraging behavior of honey bees.  Foraging behavior refers to the act of searching food sources (nectar) by the honey bees.  Algorithm consists of four significant components: • Food Sources: The gain of a food source depends on closeness to the nest, ease of extracting the food and breeding. • Employed Bees: The employed foragers are those that keep visiting the food sources to obtain the nectar from the explored sources. • Onlooker Bees: The onlooker bees are waiting in the nest and establishing food source through the information shared by employed foragers. • Scout Bees: Scout foragers are searching the environment surrounding the nest for new food sources.
  • 15. ABC inspired Sybil Attack Model  Employed bees are related to the compromised Sybil identities in the RPL network.  Food sources (Nectar collection) are correlated to the collecting of compromised identities or stolen identities in the DODAG structure.  Onlooker Bee (Main attacker) is the one which attempts to perform the Sybil attack in the community to intrude the network.  Scout bees are those who have been already compromised by the attacker (Onlooker bee), and these scout bees try to compromise the nearby neighboring nodes.
  • 16. ABC inspired Sybil Attack Model Cont.
  • 17.  The attacking scenario for ABC inspired attack is divided into 5 phases: 1. Initialization Phase: Initialize the Sybil nodes (Central attacker) to start foraging the identities. 2. Fitness Factor Computation Phase: Sybil node attempt to select any arbitrary node based on the following five fitness evaluation criteria. 3. Compromising Phase: Node compromising phase is the process of compromising the legitimate nodes in the network. 4. Contagious phase: Contagious phase is the action of spreading from one node to another node. 5. Hive selection and Launching phase: The node with the highest remaining residual energy value and more compromised neighbor nodes nearby has been chosen as Sybil node to perform the attack. ABC inspired Sybil Attack Model Cont.
  • 18. ABC inspired attack Algorithm
  • 19. An example scenario of Sybil Attack
  • 20. Lightweight Intrusion Detection Against Sybil Attack in Mobile RPL  A lightweight intrusion detection algorithm is introduced against the Sybil attack, which needs less computation and provides high accuracy, which are quintessential in the case of a resource-constrained network.  Three new variables are introduced in DIO messages, they are: • NONCE ID(Number used only once in a life): Nonce ID has been created and allocated to each node when it is joining the DODAG structure after receiving the DIO message for the first time. If both the NONCE ID and DODAG ID match with the previous record then the node is safe. • Control Message Counter: A node attempts to establish a connection with a nearby node, it can exchange a maximum of 5 control messages within 10 seconds of interval. If it exceeds the threshold value, there is a potential sign of a malicious attack.
  • 21. Lightweight Intrusion Detection Against Sybil Attack in Mobile RPL Cont. • Time Stamp for Control Messages: It will track the time of arrival of the control messages exchanged from the neighbors. If the frequency of transmission of control messages within a speculative period is more than it is a sign of malicious attack.  Cumulative Trust Factor: The three trust factors are: α, β and γ. • ρN[n] is the Cumulative Trust Factor. • ρN[n] = α.[ω.β + (1−ω).γ]  Pheromone Computation: Γ is the pheromone value, which has been used to identify the set of best trusted node list. •
  • 23. Performance Evaluation and Related Metrics  Confusion Matrix Based on the confusion matrix the performance of the proposed algorithm has been analyzed.  Accuracy is used to estimate the probability of Sybil attack detection by the proposed intrusion detection algorithm.
  • 24. Performance Evaluation and Related Metrics Cont.  Sensitivity indicates the percentage of actual positive events correctly predicted.  Specificity shows the rate of actual adverse events identified.  Precision is positive predictive value (PPV) and NPV (Negative Predictive Value).
  • 25. Performance Evaluation and Related Metrics Cont.  F-score rate represents higher detection performance.  Simulation Results for the metrics.
  • 26. Performance Evaluation Results  Control traffic overhead is the cumulative sum of DIO, DAO, and DIS control messages transfer in the DODAG.
  • 27. Performance Evaluation Results Cont.  Energy Consumption indicates the average energy consumption. 
  • 28. Conclusion  A bio-inspired analytical model for Sybil attack and lightweight intrusion detection algorithm for mobile RPL in the Internet of things network is been designed.  Considered different types of Sybil attacks and analyzed the performance of the mobile RPL in terms of control traffic overhead, energy cost, and accuracy.  For Type-3 Sybil attack proposed algorithm gains an average accuracy of 95% under mobile RPL.