Comparison of ML Algorithms to Detect Vulnerabilities of RPL-Based IoT Devices in Intelligent and Fuzzy Systems

Küçük Resim Yok

Tarih

2022

Dergi Başlığı

Dergi ISSN

Cilt Başlığı

Yayıncı

Springer Science and Business Media Deutschland GmbH

Erişim Hakkı

info:eu-repo/semantics/closedAccess

Özet

The RPL protocol (Routing Protocol for Low-Power and Lossy Networks) was designed by IETF [1] for 6LoWPAN to optimize power consumption on the Internet of Things (IoT) devices. These devices have limited processing power, memory, and generally limited energy because they are battery-powered. RPL aims to establish the shortest distance by setting up n number of IoT devices through each other DAG (Directed Acyclic Graph) and therefore the most optimum energy consumption. However, due to the complex infrastructure of RPL and the low capacity of IoT devices, the RPL protocol operating at the network layer is susceptible to attacks. Therefore, it is vital to develop a fast, practical, uncomplicated, and reliable intrusion detection system in the network layer. In the event of an attack on IoT devices operating with the RPL protocol, an anomaly will occur in the network packets in the 3rd layer. Processing these packages with machine learning algorithms will make the detection of the attack extremely easy. In this article, “Decision Tree,” (DT) “Logistic Regression,” (LR) “Random Forest,” (RF) “Fuzzy Pattern Tree Classifier,” (FPTC), and “Neural Network” (NN) algorithms are compared for catching Flooding Attacks (FA), Version Number Increase Attacks (VNIA), and Decreased Rank (DRA) attacks. At the end of our study, it is observed that the Random forest algorithm gave better results than other algorithms in the system built by the study. © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.

Açıklama

International Conference on Intelligent and Fuzzy Systems, INFUS 2021 -- 24 August 2021 through 26 August 2021 -- -- 264409

Anahtar Kelimeler

Decreased rank attack, Hello flood attack, Machine learning algorithms, RPL attacks, Version number increase attack

Kaynak

Lecture Notes in Networks and Systems

WoS Q Değeri

Scopus Q Değeri

Q4

Cilt

308

Sayı

Künye