A holistic framework for prediction of routing attacks in IoT-LLNs
The IPv6 routing protocol for low power and lossy networks (RPL) has gained widespread application in the Internet of Things (IoT) environment. RPL has inherent security features to restrict external attacks. However, internal attacks in the IoT environment have continued to grow due to the lack of...
Gespeichert in:
Veröffentlicht in: | The Journal of supercomputing 2022, Vol.78 (1), p.1409-1433 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1433 |
---|---|
container_issue | 1 |
container_start_page | 1409 |
container_title | The Journal of supercomputing |
container_volume | 78 |
creator | Sahay, Rashmi Geethakumari, G. Mitra, Barsha |
description | The IPv6 routing protocol for low power and lossy networks (RPL) has gained widespread application in the Internet of Things (IoT) environment. RPL has inherent security features to restrict external attacks. However, internal attacks in the IoT environment have continued to grow due to the lack of mechanisms to manage the secure identities and credentials of the billions of heterogeneous IoT devices. Weak credentials aid attackers in gaining access to IoT devices and further exploiting vulnerabilities stemming from the underlying routing protocols. Routing attacks degrade the performance of IoT networks by compromising the network resources, topology, and traffic. In this paper, we propose a holistic framework for the prediction of routing attacks in RPL-based IoT. The framework leverages Graph Convolution Network-based network embedding to capture and learn the latent state of the nodes in the IoT network. It uses a Long Short Term Memory model to predict network traffic. The framework incorporates a Feedforward Neural Network that uses network embedding and traffic prediction as input to predict routing attacks. The accuracy of any learning model depends on the integrity of the data provided to it as input. Therefore, the framework uses smart contract-fortified blockchain technology to establish secure channels for IoT data access. The smart contract within the blockchain generates warning impulses in the case of abnormal behavior of nodes. The framework predicts normal scenarios, resource attack scenarios, traffic attack scenarios, and topological attack scenarios with a fair accuracy of 94.5%, 82.46%, 91.88%, and 86.13%, respectively. |
doi_str_mv | 10.1007/s11227-021-03922-1 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2616649752</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2616649752</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-fe3b9ea08adbdf01118c90cdf73951a4f0e3e76074971b60f3c73e46887c90383</originalsourceid><addsrcrecordid>eNp9kDtPwzAURi0EEqXwB5gsMRvutZPYGQviUSmCpcyW69jFfcTFToX49wSCxMZ0l3O-Kx1CLhGuEUDeZETOJQOODETNOcMjMsFSCgaFKo7JBGoOTJUFPyVnOa8BoBBSTMjtjL7Fbch9sNQns3MfMW2oj4nuk2uD7UPsaPQ0xUMfuhU1fW_sJtPQ0XlcsKZ5zufkxJttdhe_d0peH-4Xd0-seXmc380aZgXWPfNOLGtnQJl22XpARGVrsK2Xoi7RFB6ccLICWdQSlxV4YaVwRaWUHDihxJRcjbv7FN8PLvd6HQ-pG15qXmFVDV7JB4qPlE0x5-S83qewM-lTI-jvVnpspYdW-qeVxkESo5QHuFu59Df9j_UFJEtq0w</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2616649752</pqid></control><display><type>article</type><title>A holistic framework for prediction of routing attacks in IoT-LLNs</title><source>SpringerNature Journals</source><creator>Sahay, Rashmi ; Geethakumari, G. ; Mitra, Barsha</creator><creatorcontrib>Sahay, Rashmi ; Geethakumari, G. ; Mitra, Barsha</creatorcontrib><description>The IPv6 routing protocol for low power and lossy networks (RPL) has gained widespread application in the Internet of Things (IoT) environment. RPL has inherent security features to restrict external attacks. However, internal attacks in the IoT environment have continued to grow due to the lack of mechanisms to manage the secure identities and credentials of the billions of heterogeneous IoT devices. Weak credentials aid attackers in gaining access to IoT devices and further exploiting vulnerabilities stemming from the underlying routing protocols. Routing attacks degrade the performance of IoT networks by compromising the network resources, topology, and traffic. In this paper, we propose a holistic framework for the prediction of routing attacks in RPL-based IoT. The framework leverages Graph Convolution Network-based network embedding to capture and learn the latent state of the nodes in the IoT network. It uses a Long Short Term Memory model to predict network traffic. The framework incorporates a Feedforward Neural Network that uses network embedding and traffic prediction as input to predict routing attacks. The accuracy of any learning model depends on the integrity of the data provided to it as input. Therefore, the framework uses smart contract-fortified blockchain technology to establish secure channels for IoT data access. The smart contract within the blockchain generates warning impulses in the case of abnormal behavior of nodes. The framework predicts normal scenarios, resource attack scenarios, traffic attack scenarios, and topological attack scenarios with a fair accuracy of 94.5%, 82.46%, 91.88%, and 86.13%, respectively.</description><identifier>ISSN: 0920-8542</identifier><identifier>EISSN: 1573-0484</identifier><identifier>DOI: 10.1007/s11227-021-03922-1</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Artificial neural networks ; Blockchain ; Communications traffic ; Compilers ; Computer Science ; Cryptography ; Embedding ; Internet of Things ; Interpreters ; Nodes ; Performance degradation ; Processor Architectures ; Programming Languages ; Routing (telecommunications) ; Topology ; Traffic models</subject><ispartof>The Journal of supercomputing, 2022, Vol.78 (1), p.1409-1433</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-fe3b9ea08adbdf01118c90cdf73951a4f0e3e76074971b60f3c73e46887c90383</citedby><cites>FETCH-LOGICAL-c319t-fe3b9ea08adbdf01118c90cdf73951a4f0e3e76074971b60f3c73e46887c90383</cites><orcidid>0000-0003-4713-069X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11227-021-03922-1$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11227-021-03922-1$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Sahay, Rashmi</creatorcontrib><creatorcontrib>Geethakumari, G.</creatorcontrib><creatorcontrib>Mitra, Barsha</creatorcontrib><title>A holistic framework for prediction of routing attacks in IoT-LLNs</title><title>The Journal of supercomputing</title><addtitle>J Supercomput</addtitle><description>The IPv6 routing protocol for low power and lossy networks (RPL) has gained widespread application in the Internet of Things (IoT) environment. RPL has inherent security features to restrict external attacks. However, internal attacks in the IoT environment have continued to grow due to the lack of mechanisms to manage the secure identities and credentials of the billions of heterogeneous IoT devices. Weak credentials aid attackers in gaining access to IoT devices and further exploiting vulnerabilities stemming from the underlying routing protocols. Routing attacks degrade the performance of IoT networks by compromising the network resources, topology, and traffic. In this paper, we propose a holistic framework for the prediction of routing attacks in RPL-based IoT. The framework leverages Graph Convolution Network-based network embedding to capture and learn the latent state of the nodes in the IoT network. It uses a Long Short Term Memory model to predict network traffic. The framework incorporates a Feedforward Neural Network that uses network embedding and traffic prediction as input to predict routing attacks. The accuracy of any learning model depends on the integrity of the data provided to it as input. Therefore, the framework uses smart contract-fortified blockchain technology to establish secure channels for IoT data access. The smart contract within the blockchain generates warning impulses in the case of abnormal behavior of nodes. The framework predicts normal scenarios, resource attack scenarios, traffic attack scenarios, and topological attack scenarios with a fair accuracy of 94.5%, 82.46%, 91.88%, and 86.13%, respectively.</description><subject>Artificial neural networks</subject><subject>Blockchain</subject><subject>Communications traffic</subject><subject>Compilers</subject><subject>Computer Science</subject><subject>Cryptography</subject><subject>Embedding</subject><subject>Internet of Things</subject><subject>Interpreters</subject><subject>Nodes</subject><subject>Performance degradation</subject><subject>Processor Architectures</subject><subject>Programming Languages</subject><subject>Routing (telecommunications)</subject><subject>Topology</subject><subject>Traffic models</subject><issn>0920-8542</issn><issn>1573-0484</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNp9kDtPwzAURi0EEqXwB5gsMRvutZPYGQviUSmCpcyW69jFfcTFToX49wSCxMZ0l3O-Kx1CLhGuEUDeZETOJQOODETNOcMjMsFSCgaFKo7JBGoOTJUFPyVnOa8BoBBSTMjtjL7Fbch9sNQns3MfMW2oj4nuk2uD7UPsaPQ0xUMfuhU1fW_sJtPQ0XlcsKZ5zufkxJttdhe_d0peH-4Xd0-seXmc380aZgXWPfNOLGtnQJl22XpARGVrsK2Xoi7RFB6ccLICWdQSlxV4YaVwRaWUHDihxJRcjbv7FN8PLvd6HQ-pG15qXmFVDV7JB4qPlE0x5-S83qewM-lTI-jvVnpspYdW-qeVxkESo5QHuFu59Df9j_UFJEtq0w</recordid><startdate>2022</startdate><enddate>2022</enddate><creator>Sahay, Rashmi</creator><creator>Geethakumari, G.</creator><creator>Mitra, Barsha</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0003-4713-069X</orcidid></search><sort><creationdate>2022</creationdate><title>A holistic framework for prediction of routing attacks in IoT-LLNs</title><author>Sahay, Rashmi ; Geethakumari, G. ; Mitra, Barsha</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-fe3b9ea08adbdf01118c90cdf73951a4f0e3e76074971b60f3c73e46887c90383</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Artificial neural networks</topic><topic>Blockchain</topic><topic>Communications traffic</topic><topic>Compilers</topic><topic>Computer Science</topic><topic>Cryptography</topic><topic>Embedding</topic><topic>Internet of Things</topic><topic>Interpreters</topic><topic>Nodes</topic><topic>Performance degradation</topic><topic>Processor Architectures</topic><topic>Programming Languages</topic><topic>Routing (telecommunications)</topic><topic>Topology</topic><topic>Traffic models</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Sahay, Rashmi</creatorcontrib><creatorcontrib>Geethakumari, G.</creatorcontrib><creatorcontrib>Mitra, Barsha</creatorcontrib><collection>CrossRef</collection><jtitle>The Journal of supercomputing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sahay, Rashmi</au><au>Geethakumari, G.</au><au>Mitra, Barsha</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A holistic framework for prediction of routing attacks in IoT-LLNs</atitle><jtitle>The Journal of supercomputing</jtitle><stitle>J Supercomput</stitle><date>2022</date><risdate>2022</risdate><volume>78</volume><issue>1</issue><spage>1409</spage><epage>1433</epage><pages>1409-1433</pages><issn>0920-8542</issn><eissn>1573-0484</eissn><abstract>The IPv6 routing protocol for low power and lossy networks (RPL) has gained widespread application in the Internet of Things (IoT) environment. RPL has inherent security features to restrict external attacks. However, internal attacks in the IoT environment have continued to grow due to the lack of mechanisms to manage the secure identities and credentials of the billions of heterogeneous IoT devices. Weak credentials aid attackers in gaining access to IoT devices and further exploiting vulnerabilities stemming from the underlying routing protocols. Routing attacks degrade the performance of IoT networks by compromising the network resources, topology, and traffic. In this paper, we propose a holistic framework for the prediction of routing attacks in RPL-based IoT. The framework leverages Graph Convolution Network-based network embedding to capture and learn the latent state of the nodes in the IoT network. It uses a Long Short Term Memory model to predict network traffic. The framework incorporates a Feedforward Neural Network that uses network embedding and traffic prediction as input to predict routing attacks. The accuracy of any learning model depends on the integrity of the data provided to it as input. Therefore, the framework uses smart contract-fortified blockchain technology to establish secure channels for IoT data access. The smart contract within the blockchain generates warning impulses in the case of abnormal behavior of nodes. The framework predicts normal scenarios, resource attack scenarios, traffic attack scenarios, and topological attack scenarios with a fair accuracy of 94.5%, 82.46%, 91.88%, and 86.13%, respectively.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11227-021-03922-1</doi><tpages>25</tpages><orcidid>https://orcid.org/0000-0003-4713-069X</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0920-8542 |
ispartof | The Journal of supercomputing, 2022, Vol.78 (1), p.1409-1433 |
issn | 0920-8542 1573-0484 |
language | eng |
recordid | cdi_proquest_journals_2616649752 |
source | SpringerNature Journals |
subjects | Artificial neural networks Blockchain Communications traffic Compilers Computer Science Cryptography Embedding Internet of Things Interpreters Nodes Performance degradation Processor Architectures Programming Languages Routing (telecommunications) Topology Traffic models |
title | A holistic framework for prediction of routing attacks in IoT-LLNs |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T21%3A56%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20holistic%20framework%20for%20prediction%20of%20routing%20attacks%20in%20IoT-LLNs&rft.jtitle=The%20Journal%20of%20supercomputing&rft.au=Sahay,%20Rashmi&rft.date=2022&rft.volume=78&rft.issue=1&rft.spage=1409&rft.epage=1433&rft.pages=1409-1433&rft.issn=0920-8542&rft.eissn=1573-0484&rft_id=info:doi/10.1007/s11227-021-03922-1&rft_dat=%3Cproquest_cross%3E2616649752%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2616649752&rft_id=info:pmid/&rfr_iscdi=true |