7
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Routing protocols transmit vast amounts of sensor data between the Wireless Sensor Network (WSN) and the Internet of Things (IoT) gateway. One of these routing protocols is Routing Protocol for Low Power and Lossy Networks (RPL). The Internet Engineering Task Force (IETF) defined RPL in March 2012 as a de facto distance-vector routing protocol for wireless communications with lower energy. Although RPL messages use a cryptographic algorithm for security protection, it does not help prevent internal attacks. These attacks drop some or all packets, such as blackhole or selective forwarding attacks, or change data packets, like grayhole attacks. The RPL protocol needs to be strengthened to address such an issue, as only a limited number of studies have been conducted on detecting internal attacks. Moreover, earlier research should have considered the mobility framework, a vital feature of the IoT. This article presents a novel lightweight system for anomaly detection of grayhole, blackhole, and selective forwarding attacks. The study aims to use a trust model in the RPL protocol, considering attack detection under mobility frameworks. The proposed system, anomaly detection of three RPL attacks (RPLAD3), is designed in four layers and starts operating immediately after the initial state of the network. The experiments demonstrated that RPLAD3 outperforms the RPL protocol when defeating attacks with high accuracy and a true positive ratio while lowering power and energy consumption. In addition, it significantly improves the packet delivery ratio and decreases the false positive ratio to zero.

          Related collections

          Most cited references41

          • Record: found
          • Abstract: not found
          • Article: not found

          Routing Attacks and Mitigation Methods for RPL-Based Internet of Things

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review

              Bookmark
              • Record: found
              • Abstract: found
              • Article: found
              Is Open Access

              Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks

              WSANs (Wireless Sensor and Actuator Networks) are derived from traditional wireless sensor networks by introducing mobile actuator elements. Previous studies indicated that mobile actuators can improve network performance in terms of data collection, energy supplementation, etc. However, according to our experimental simulations, the actuator’s mobility also causes the sensor worm to spread faster if an attacker launches worm attacks on an actuator and compromises it successfully. Traditional worm propagation models and defense strategies did not consider the diffusion with a mobile worm carrier. To address this new problem, we first propose a microscopic mathematical model to describe the propagation dynamics of the sensor worm. Then, a two-step local defending strategy (LDS) with a mobile patcher (a mobile element which can distribute patches) is designed to recover the network. In LDS, all recovering operations are only taken in a restricted region to minimize the cost. Extensive experimental results demonstrate that our model estimations are rather accurate and consistent with the actual spreading scenario of the mobile sensor worm. Moreover, on average, the LDS outperforms other algorithms by approximately 50% in terms of the cost.
                Bookmark

                Author and article information

                Contributors
                Journal
                PeerJ Comput Sci
                PeerJ Comput Sci
                peerj-cs
                PeerJ Computer Science
                PeerJ Inc. (San Diego, USA )
                2376-5992
                27 March 2023
                2023
                : 9
                : e1309
                Affiliations
                [1 ]Faculty of Computer Science and Information Technology, University of Malaya , Kuala Lumpur, Malaysia
                [2 ]College of Computing and Information Sciences, University of Technology and Applied Sciences , Muscat, Sultanate of Oman
                [3 ]Computer Science and Engineering, G. Pullaiah College of Engineering and Technology , Kurnool, India
                [4 ]Faculty of Computing and Informatics, Multimedia University , Cyberjaya, Malaysia
                Author information
                http://orcid.org/0000-0003-3443-4002
                http://orcid.org/0000-0003-4380-5303
                http://orcid.org/0000-0002-6155-1530
                Article
                cs-1309
                10.7717/peerj-cs.1309
                10280629
                50fa8f8c-1d1b-4080-80c1-ebd326afeb83
                © 2023 Alansari et al.

                This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.

                History
                : 15 September 2022
                : 2 March 2023
                Funding
                Funded by: Konsortium Kecemerlangan Penyelidikan
                Award ID: JPT(BKPI)1000/016/018/25 (49)
                This research work was supported by the Konsortium Kecemerlangan Penyelidikan (JPT(BKPI)1000/016/018/25 (49)) provided by the Ministry of Higher Education of Malaysia. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
                Categories
                Computer Networks and Communications
                Security and Privacy
                Internet of Things

                wireless sensor network,internet of things,routing attacks,network layer attacks,rpl protocol,grayhole attack,blackhole attack,selective forwarding attack,anomaly detection,internal attacks

                Comments

                Comment on this article