Securing IoT Networks: RPL Attack Detection with Deep Learning GRU Networks

  IJRES-book-cover  International Journal of Recent Engineering Science (IJRES)          
  
© 2023 by IJRES Journal
Volume-10 Issue-2
Year of Publication : 2023
Authors : Raveendranadh Bokka, Tamilselvan Sadasivam
DOI : 10.14445/23497157/IJRES-V10I2P103

How to Cite?

Raveendranadh Bokka, Tamilselvan Sadasivam, "Securing IoT Networks: RPL Attack Detection with Deep Learning GRU Networks," International Journal of Recent Engineering Science, vol. 10, no. 2, pp. 13-21, 2023. Crossref, https://doi.org/10.14445/23497157/IJRES-V10I2P103

Abstract
The Internet of Things (IoT) can be defined as the internet-based connectivity of heterogeneous intelligent devices to control and run them. Smart gadgets and wireless networks are vulnerable to numerous routing attacks due to their open nature, worldwide connection, and resource constraints. The Routing Protocol for Low-Power Lossy Networks (RPL) is a prominent routing protocol used in IoT-based networks to design routing paths for resource-constrained devices. However, RPL's built-in security features do not prevent most routing attacks. Because IoT devices generate a vast quantity of data, we presented a Deep Learning-based GRU network in this study for detecting threats in RPL-based IoT networks. Our proposed data set contains traffic traces for normal scenarios and attack scenarios such as Sinkhole, Blackhole, Sybil, Selective Forwarding, DIS flooding, and DIO suppression with 21 features for 20 static nodes generated using the NetSim Standard version 12.1 software tool. The GRU model was trained and tested with 80% and 20% of the dataset. Metrics, including accuracy, precision, recall, f1-score, and AUC, are used to evaluate the model's performance. The model attained a testing accuracy of 95.51 percent, precision, recall, and f1-score values of 0.94, 0.81, and 0.87 for an attack class and 0.96, 0.99, and 0.97 for a normal class, respectively. The model's AUC value is 0.899, indicating that our suggested model can differentiate the attack and normal classes by almost 90%.

Keywords
Internet of Things (IoT), 6LoWPAN, RPL, Security, Attacks Detection, Deep Learning, GRU, NetSim.

Reference
[1] S. K. Fahmida Islam, Morium Akter, and Mohammad Shorif Uddin, “Design and Implementation of an Internet of things Based Low-cost Smart Weather Prediction System,” International Journal of Information Technology, vol. 13, no. 5, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Carlos D. Morales-Molina et al., “A Dense Neural Network Approach for Detecting Clone id Attacks on the RPL Protocol of the IoT,” Sensors, vol. 21, no. 9, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Sarumathi Murali, and Abbas Jamalipour, “A Lightweight Intrusion Detection for Sybil Attack under Mobile RPL in the Internet of Things,” IEEE Internet of Things Journal, vol. 7, no. 1, pp. 379–388, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Etsuko Sugawara, and Hiroshi Nikaido, “Properties of AdeABC and AdeIJK Efflux Systems of Acinetobacter Baumannii Compared with Those of the AcrAB-TolC System of Escherichia Coli,” Antimicrobial Agents and Chemotherapy, vol. 58, no. 12, pp. 7250–7257, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Abhishek Verma, and Virender Ranga, “Analysis of Routing Attacks on RPL Based 6LoWPAN Networks,” International Journal of Grid and Distributed Computing, vol. 11, no. 8, pp. 43–56, 2018.
[CrossRef] [Google Scholar]
[6] Aryan Mohammadi Pasikhani et al., “Intrusion Detection Systems in RPL-Based 6LoWPAN: A Systematic Literature Review,” IEEE Sensors Journal, vol. 21, no. 11, pp. 12940–12968, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Wijdan Choukri, Hanane Lamaazi, and Nabil Benamar, “RPL Rank Attack Detection using Deep Learning,” 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Musa Osman et al., “ML-LGBM: A Machine Learning Model Based on Light Gradient Boosting Machine for the Detection of Version Number Attacks in RPL-Based Networks,” IEEE Access, vol. 9, pp. 83654-83665, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Imtiaz Ullah, Ayaz Ullah, and Mazhar Sajjad, “Towards a Hybrid Deep Learning Model for Anomalous Activities Detection in Internet of Things Networks,” IoT, vol. 2, no. 3, pp. 428-448, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Semih Cakir, Sinan Toklu, and Nesibe Yalcin, “RPL Attack Detection and Prevention in the Internet of Things Networks Using a GRU Based Deep Learning,” IEEE Access, vol. 8, pp. 183678–183689, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Anita Patrot, “Internet of Things (IoT) Security Issues and Challenges,” International Journal of Computer Trends and Technology, vol. 70, no. 6, pp. 72-75, 2022.
[CrossRef] [Publisher Link]
[12] Furkan Yusuf Yavuz, Devrim Ünal, and Ensar Gül, “Deep Learning for Detection of Routing Attacks in the Internet of Things,” International Journal of Computational Intelligence Systems, vol. 12, no. 1, pp. 39–58, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Prachi Shukla, “ML-IDS: A Machine Learning Approach to Detect Wormhole Attacks in Internet of Things,” 2017 Intelligent Systems Conference, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Yakubu Imrana et al., “A Bidirectional LSTM Deep Learning Approach for Intrusion Detection,” Expert Systems with Applications, vol. 185, p. 115524, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Chuanlong Yin et al., “A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks,” IEEE Access, vol. 5, pp. 21954–21961, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Thien Nguyen et al., “DÏoT: A Federated Self-learning Anomaly Detection System for IoT,” 2019 IEEE 39th International Conference on Distributed Computing Systems, pp. 756–767, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Fangyu Li et al.,”System Statistics Learning-Based IoT Security: Feasibility and Suitability,” IEEE Internet of Things Journal, vol. 6, no. 4, pp. 6396–6403, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Zhida Li et al., “Machine Learning Techniques for Classifying Network Anomalies and Intrusions,” IEEE International Symposium on Circuits and Systems, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[19] B.B. Borisenko et al., “Intrusion Detection using Multi-layer Perceptron and Neural Networks with Long Short-term Memory,” 2021 Systems of Signal Synchronization, Generating and Processing in Telecommunications, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Anthea Mayzaud, Remi Badonnel, and Isabelle Chrisment, “A Distributed Monitoring Strategy for Detecting Version Number Attacks in RPL-based Networks,” IEEE Transactions on Network and Service Management, vol. 14, no. 2, pp. 472–486, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Hanane Lamaazi, and Nabil Benamar, “OF-EC: A Novel Energy Consumption Aware Objective Function for RPL Based on Fuzzy Logic,” Journal of Network and Computer Applications, vol. 117, pp. 42–58, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Nadia Chaabouni et al., “Network Intrusion Detection for IoT Security Based on Learning Techniques,” IEEE Communications Surveys and Tutorials, vol. 21, no. 3, pp. 2671–2701, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Yirui Wu, Dabao Wei, and Jun Feng, “Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey,” Security and Communication Networks, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[24] A. Anandhavalli, and A. Bhuvaneswari, “IoT Based Wireless Sensor Networks – A Survey,” International Journal of Computer Trends and Technology, vol. 65, no. 1, pp. 21-28, 2018.
[CrossRef] [Publisher Link]
[25] Devika Chhachhiya, Amita Sharma, and Manish Gupta, “Designing Optimal Architecture of Recurrent Neural Network (LSTM) with Particle Swarm Optimization Technique Specifically for Educational Dataset,” International Journal of Information Technology, vol. 11, pp. 159–163, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Rui Fu, Zuo Zhang, and Li Li, “Using LSTM and GRU Neural Network Methods for Traffic Flow Prediction,” 2016 31st Youth Academic Annual Conference of Chinese Association of Automation, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Michael Phi, Illustrated Guide to LSTM's and GRU's: A Step by Step Explanation. [Online]. Available: https://towardsdatascience.com/illustrated-guide-to-lstms-and-gru-s-a-step-by-step-explanation-44e9eb85bf21
[28] Simeon Kostadinov, Understanding GRU Networks. [Online]. Available: https://towardsdatascience.com/understanding-gru-networks-2ef37df6c9be
[29] Amit Sagu, Nasib Singh Gill, and PreetiGulia, “Artificial Neural Network for the Internet of Things Security,” International Journal of Engineering Trends and Technology, vol. 68, no. 11, pp. 129-136, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Network Simulator, NetSim, Emulator, 5G, Military Communication, Vehicular networks. [Online]. Available: https://www.tetcos.com/
[31] Sohom Ghosh, “Identifying Click Baits using Various Machine Learning and Deep Learning Techniques,” International Journal of Information Technology, vol. 13, no. 1, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Raveendranadh Bokka, and Tamilselvan Sadasivam, “Machine Learning Techniques to Detect Routing Attacks in RPL Based,” International Journal of Electrical Engineering and Technology (IJEET), vol. 12, no. 6, pp. 346–356, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Abhishek Verma, and Virender Ranga, “ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things,” 2019 4th International Conference on Internet of Things: Smart Innovation and Usages, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Gauri Jain, Manisha Sharma, and Basant Agarwal, “Optimizing Semantic LSTM for Spam Detection,” International Journal of Information Technology, vol. 11, pp. 239–250, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[35] Abhishek Verm, and Virender Ranga, “Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review,” IEEE Sensors Journal, vol. 20, no. 11, pp. 5666–5690, 2020.
[CrossRef] [Google Scholar] [Publisher Link]