Skip to main content
Log in

A novel RPL defense mechanism based on trust and deep learning for internet of things

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Along with the significant growth of applications and facilities provided by the Internet of Things (IoT) in recent years, security challenges and related issues to privacy become considerable interest of researchers. On the other hand, the de facto IoT routing protocol for low-power and lossy networks called RPL is vulnerable to various types of routing attacks. Many researchers have investigated RPL security solutions focusing on effective detection of prevalent and destructive routing attacks such as blackhole attack, selective forwarding attack, rank attack and so on. Recent studies are proposing trust-based mechanisms with the aim of replacing traditional cryptography-based operations with lightweight security models in order to cover the inherent challenges of IoT devices, including energy and computational limitations. Therefore, in this paper, focusing on the problem of RPL vulnerability against well-known routing attacks, we have proposed a trust-based attack detection model, which investigates traffic behavior in different attack scenarios and detects malicious nodes relying on behavior deviation exactly at the same time as the start of any attack activity. Expected behavior is predicted by our learning model trained from the historical routing behavior pattern, using recurrent neural networks as a powerful deep learning method, which leads to attack detection with high-level accuracy and precision. Both mathematical analysis and simulation results on multiple RPL attack scenarios show clearly that the proposed trust-based defense mechanism is an effective approach capable of timely and precisely detection of routing behavior pattern deviation of malicious nodes exactly at the start time of the attack occurrence, which leads to attack detection and attacker identification based on trust scores extracted from the detected fluctuations between expected and real routing behavior patterns.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Availability of data and materials

No specific dataset is generated for this paper. Only a generally available dataset is used.

Notes

  1. Machine to Machine.

  2. Low power and lossy networks.

  3. Packet Forwarding Ratio.

  4. DODAG Information Solicitation.

  5. K-Nearest Neighbor.

References

  1. Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645–1660

    Article  Google Scholar 

  2. Ammar M, Russello G, Crispo B (2018) Internet of things: a survey on the security of IoT frameworks. J Inf Secur Appl 38:8–27

    Google Scholar 

  3. Winter T, Thubert P, Brandt A et al (2012) RPL: IPv6 Routing Protocol for Low Power and Lossy Networks. RFC 6550, Int Eng Task Force

  4. Medjek F, Tanjaoui D, Romdhani I, DJedjig N (2018) Security threats in the internet of things: RPL’s attacks and countermeasures. In: Security and Privacy in Smart Sensor Networks, IGI Global, pp 147–178

  5. Muzammal SM, Murugesan RK, Jhanjhi NZ (2021) A comprehensive review on secure routing in internet of things: mitigation methods and trust-based approaches. IEEE Internet Things J 8:4186–4210

    Article  Google Scholar 

  6. Yavuz FY, Unal D, Gul E (2018) Deep learning for detection of routing attacks in the internet of things. Int J Comput Intell Syst 12:39–58

    Article  Google Scholar 

  7. Medjek F, Tanjaoui D, Romdhani I, Djedjig N (2020) Trust-aware and cooperative routing protocol for IoT security. J Inf Secur Appl 52:102467

    Google Scholar 

  8. Airehrour D, Gutierrez J, Ray SK (2016) Securing RPL routing protocol from blackhole attacks using a trust-based mechanism. In: 2016 26th International Telecommunication Networks and Applications Conference (ITNAC)

  9. Airehrour D, Gutierrez J, Ray SK (2017) A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks. Aust J Telecommun Digit Econ 5(1):50–69

    Google Scholar 

  10. Jyothisree MVR, Sreekanth S (2019) Attacks in RPL and detection technique used for internet of things. Int J Recent Technol Eng (IJRTE) 8(1):1876–1879

    Google Scholar 

  11. Jiang J, Liu Y (2022) Secure IoT routing: selective forwarding attacks and trust-based defenses in RPL network. Networking and Internet Architecture (cs.NI)

  12. Kiran V, Sardana A, Kaur P et al (2022) Defending against DDoS attacks in RPL using subjective logic based trust approach for IOT. In: 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)

  13. Loulianou PP, Vassilakis VG, Shahandashti SF (2022) A trust-based intrusion detection system for RPL networks: detecting a combination of rank and blackhole attacks. J Cyber Secur Priv 2(1):124–153

    Google Scholar 

  14. Azzedin F (2023) Mitigating denial of service attacks in RPL-based IoT environments: trust-based approach. IEEE Access 11:129077–129089

    Article  Google Scholar 

  15. Diro AA, Chilamkurti M (2018) Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener Comput Syst 82:761–768

    Article  Google Scholar 

  16. Campos EM, Saura PF et al. (2021) Evaluating federated learning for intrusion detection in internet of things: review and challenges. Comput Sci, Mach Learn

  17. Rahman MA, Asyhari AT et al (2020) Scalable machine learning-based intrusion detection system for IoT-enabled smart cities. Sustain Cities Soc 61:102324

    Article  Google Scholar 

  18. Zahra F, Jhanjhi NZ et al (2022) Rank and wormhole attack detection model for RPL-based internet of things using machine learning. In: Advances in IoT Privacy, Security and Applications

  19. Neerugatti V, Reddy AR (2019) Machine learning based technique for detection of rank attack in RPL based internet of things networks. In: International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol 8

  20. Krari A, Hajami A, Jarmouni E (2023) Detecting the RPL version number attack in IoT Networks using Deep Learning Models. Int J Adv Comput Sci Appl 14(10)

  21. Ma W, Wang X, Hu M, Zhou AQ (2021) Machine learning empowered trust evaluation method for IoT devices. IEEE Access 9:65066–65077

    Article  Google Scholar 

  22. Prathapchandran K, Janani T (2021) A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest—RFTRUST. Comput Netw 198:108413

    Article  Google Scholar 

  23. Rutravigneshwaran P, Anitha G, Prathapchandran K (2024) Trust-based support vector regressive (TSVR) security mechanism to identify malicious nodes in the Internet of Battlefield Things (IoBT). Int J Syst Assur Eng Manag 15:287–299

    Article  Google Scholar 

  24. Ryu J, Kim S (2024) Trust system- and multiple verification technique-based method for detecting wormhole attacks in MANETs. IEEE Access 12:16266–16275

    Article  Google Scholar 

  25. Sherstinsky A (2020) Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network. Phys D: Nonlinear Phenom 404:132306

    Article  MathSciNet  Google Scholar 

  26. Lee L, Dai S, Cao Z (2019) Deep long short-term memory (LSTM) network with sliding-window approach in urban thermal analysis. In: IEEE International Conference on Communications in China Workshops (ICCC), September 2019.

  27. Heidarian A, Dinneen MJ (2016)A hybrid geometric approach for measuring similarity level among documents and document clustering. In: 2016 IEEE Second International Conference on Big Data Computing Service and Applications, IEEE Computer Society, 2016

  28. Agiollo A, Conti M, Caliyar P, Lin T, Pajola L (2021) DETONAR: detection of routing attacks in RPL-based IoT. IEEE Trans Netw Serv Manag 18(2):1178–1190

    Article  Google Scholar 

Download references

Funding

There is no funding for this research.

Author information

Authors and Affiliations

Authors

Contributions

The first author implemented the code and wrote the draft of the paper. The second author supervised, approved the idea and made corrections to the paper and is the correspondence.

Corresponding author

Correspondence to Reza Javidan.

Ethics declarations

Competing interests

The authors declare that there are no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ahmadi, K., Javidan, R. A novel RPL defense mechanism based on trust and deep learning for internet of things. J Supercomput (2024). https://doi.org/10.1007/s11227-024-06118-5

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11227-024-06118-5

Keywords

Navigation