Securing IoT Attacks: A Machine Learning Approach for Developing Lightweight Trust-Based Intrusion Detection System

Main Article Content

Anup W. Burange
Vaishali M. Deshmukh

Abstract

The routing process in the Internet of Things (IoT) presents challenges in industrial applications due to its complexity, involving multiple devices, critical decision-making, and accurate data transmission. The complexity further increases with dynamic IoT devices, which creates opportunities for potential intruders to disrupt routing. Traditional security measures are inadequate for IoT devices with limited battery capabilities. Although RPL (Routing Protocol for Low Energy and Lossy Networks) is commonly used for IoT routing, it remains vulnerable to security threats. This study aims to detect and isolate three routing attacks on RPL: Rank, Sybil, and Wormhole. To achieve this, a lightweight trust-based secured routing system is proposed, utilizing machine learning techniques to derive values for devices in new networks, where initial trust values are unavailable. The system demonstrates successful detection and isolation of attacks, achieving an accuracy of 98.59%, precision of 98%, recall of 99%, and f-score of 98%, thereby reinforcing its effectiveness. Attacker nodes are identified and promptly disabled, ensuring a secure routing environment. Validation on a generated dataset further confirms the reliability of the system.

Article Details

How to Cite
Burange, A. W. ., & Deshmukh, V. M. . (2023). Securing IoT Attacks: A Machine Learning Approach for Developing Lightweight Trust-Based Intrusion Detection System. International Journal on Recent and Innovation Trends in Computing and Communication, 11(7), 14–22. https://doi.org/10.17762/ijritcc.v11i7.7788
Section
Articles

References

M. AL-Hawawreh, N. Moustafa, and E. Sitnikova, “Identification of malicious activities in industrial internet of things based on deep learning models,” Journal of Information Security Application, vol. 41, pp. 1–11, 2018.

Deshmukh, Amruta & Pund, Mahendra. “Optimizing Routing Performance in P2P Networks Using Machine Learning.” Advanced Informatics for Computing Research, 10.1007/978-981-15-0111-1_20., 2019

E. Canbalaban and S. Sen, “A Cross-Layer Intrusion Detection System for RPL-Based Internet of Things,” in Ad-Hoc, Mobile, and Wireless Networks, pp. 214–227, 2020.

R. Mehta and M. M. Parmar, “Trust based mechanism for Securing IoT Routing Protocol RPL against Wormhole & Grayhole Attacks,” In: 3rd International Conference for Convergence in Technology (I2CT), 2018.

S. Raza, L. Wallgren, and T. Voigt, “SVELTE: Real-time intrusion detection in the Internet of Things,” Ad Hoc Networks, vol. 11, no. 8, pp. 2661–2674, 2013.

J. Pacheco and S. Hariri, “IoT Security Framework for Smart Cyber Infrastructures,” In: IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W),2016.

Garg, P. ., Sharma, N. ., Sonal, & Shukla, B. . (2023). Predicting the Risk of Cardiovascular Diseases using Machine Learning Techniques. International Journal of Intelligent Systems and Applications in Engineering, 11(2s), 165 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2520

D. Arshad, M. Asim, N. Tariq, T. Baker, H. Tawfik, and D. Al-Jumeily OBE, “THC-RPL: A lightweight Trust-enabled routing in RPL-based IoT networks against Sybil attack,” PLoS One, vol. 17, no. 7, p. e0271277, 2022.

G. Thamilarasu and S. Chawla, “Towards deep-learning-driven intrusion detection for the Internet of Things,” Sensors (Basel), vol. 19, no. 9, p. 1977, 2019.

M. D. Alshehri and F. K. Hussain, “A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT),” Computing, vol. 101, no. 7, pp. 791–818, 2019.

I.-R. Chen and J. Guo, “Hierarchical trust management of community of interest groups in mobile ad hoc networks,” Ad Hoc Networks, vol. 33, pp. 154–167, 2015.

U. Jayasinghe, G. M. Lee, T.-W. Um, and Q. Shi, “Machine learning based trust computational model for IoT services,” IEEE Transactions on Sustainable Computing., vol. 4, no. 1, pp. 39–52, 2019.

A. H. Farea and K. Küçük, “EAI Endorsed Transactions Detections of IoT Attacks via Machine Learning Based Approaches with Cooja,” in EAI, vol. 7, pp. 1–12, 2022.

Raza, S., Wallgren, L., & Voigt, T. “SVELTE: Real-time intrusion detection in the Internet of Things”. Ad Hoc Networks, 11(8), 2661–2674. https://doi.org/10.1016/j.adhoc.2013.04.014, 2013.

L. Xiao, X. Wan, X. Lu, Y. Zhang, and D. Wu, “IoT security techniques based on machine learning: How do IoT devices use AI to enhance security?,” IEEE Signal Processing Magazine, vol. 35, no. 5, pp. 41–49, 2018.

Prof. Bhushan Thakre, Dr. R.M Thakre. (2017). Analysis of Modified Current Controller and its Implementation in Automotive LED. International Journal of New Practices in Management and Engineering, 6(04), 01 - 06. https://doi.org/10.17762/ijnpme.v6i04.60

M. A. Boudouaia, A. Ali-Pacha, A. Abouaissa, and P. Lorenz, “Security against rank attack in RPL protocol,” IEEE Network., vol. 34, no. 4, pp. 133–139, 2020.

S. Deshmukh-Bhosale and S. S. Sonavane, “A real-time intrusion detection system for wormhole attack in the RPL based internet of things,” Procedia Manufacturing., vol. 32, pp. 840–847, 2019.

F. Medjek, D. Tandjaoui, I. Romdhani, and N. Djedjig, “A trust-based intrusion detection system for mobile RPL based networks,” In: IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2017

Z. A. Khan and P. Herrmann, “A trust based distributed intrusion detection mechanism for internet of things,” In: IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), 2017.

M. M. Ozcelik, E. Irmak, and S. Ozdemir, “A hybrid trust based intrusion detection system for wireless sensor networks,” In: International Symposium on Networks, Computers and Communications (ISNCC), 2017.

X. Yang, G. Peng, D. Zhang, and Y. Lv, “An enhanced intrusion detection system for IoT networks based on deep learning and knowledge graph,” Secure Communication Network, vol. 2022, pp. 1–21, 2022.

S. M. Muzammal, R. K. Murugesan, N. Z. Jhanjhi, M. Humayun, A. O. Ibrahim, and A. Abdelmaboud, “A trust-based model for secure routing against RPL attacks in internet of things,” Sensors (Basel), vol. 22, no. 18, 2022.

S. B. Thigale, R. K. Pandey, P. R. Gadekar, V. A. Dhotre, and A. A. Junnarkar, “Lightweight novel trust based framework for IoT enabled wireless network communications,” Periodicals of Engineering and Natural Sciences (PEN), vol. 7, no. 3, p. 1126, 2019.

J. Canedo and A. Skjellum, “Using machine learning to secure IoT systems,” In: 14th Annual Conference on Privacy, Security and Trust (PST), 2016.

Jang Bahadur Saini, D. . (2022). Pre-Processing Based Wavelets Neural Network for Removing Artifacts in EEG Data. Research Journal of Computer Systems and Engineering, 3(1), 43–47. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/40

D. Airehrour, J. A. Gutierrez, and S. K. Ray, “SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things,” Future Generation Computer Systems, vol. 93, pp. 860–876, 2019.

E. Kfoury, J. Saab, P. Younes, and R. Achkar, “A self organizing map intrusion detection system for RPL protocol attacks,” International Journal of Interdisciplinary Telecommunication Networks, vol. 11, no. 1, pp. 30–43, 2019.

Omid Mahdi Ebadati E, Farshad Eshghi, Amin Zamani, “Security Enhancement of Wireless Sensor Networks: A Hybrid Efficient Encryption Algorithm Approach.” Journal of Information System and Telecommunication, vol. 6, no. 23, pp. 180–192, 2018.

García, A., Petrovi?, M., Ivanov, G., Smith, J., & Cohen, D. Enhancing Medical Diagnosis with Machine Learning and Image Processing. Kuwait Journal of Machine Learning, 1(4). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/143

N. Farzaneh and R. Hoseini, “Confronting DDoS attacks in software-defined wireless sensor networks based on evidence theory,” Journal of Information Systems and Telecommunication, vol. 9, no. 33, pp. 25–36, 2021.