4.5 Article

A holistic framework for prediction of routing attacks in IoT-LLNs

期刊

JOURNAL OF SUPERCOMPUTING
卷 78, 期 1, 页码 1409-1433

出版社

SPRINGER
DOI: 10.1007/s11227-021-03922-1

关键词

IoT; RPL; Routing attacks; Network embeddings; Smart contract

向作者/读者索取更多资源

This paper proposes a holistic framework for predicting routing attacks in RPL-based IoT, utilizing network embedding and traffic prediction, along with blockchain technology fortified with smart contracts to predict various attack scenarios. The framework achieves high accuracy and can effectively address various security challenges.
The IPv6 routing protocol for low power and lossy networks (RPL) has gained widespread application in the Internet of Things (IoT) environment. RPL has inherent security features to restrict external attacks. However, internal attacks in the IoT environment have continued to grow due to the lack of mechanisms to manage the secure identities and credentials of the billions of heterogeneous IoT devices. Weak credentials aid attackers in gaining access to IoT devices and further exploiting vulnerabilities stemming from the underlying routing protocols. Routing attacks degrade the performance of IoT networks by compromising the network resources, topology, and traffic. In this paper, we propose a holistic framework for the prediction of routing attacks in RPL-based IoT. The framework leverages Graph Convolution Network-based network embedding to capture and learn the latent state of the nodes in the IoT network. It uses a Long Short Term Memory model to predict network traffic. The framework incorporates a Feedforward Neural Network that uses network embedding and traffic prediction as input to predict routing attacks. The accuracy of any learning model depends on the integrity of the data provided to it as input. Therefore, the framework uses smart contract-fortified blockchain technology to establish secure channels for IoT data access. The smart contract within the blockchain generates warning impulses in the case of abnormal behavior of nodes. The framework predicts normal scenarios, resource attack scenarios, traffic attack scenarios, and topological attack scenarios with a fair accuracy of 94.5%, 82.46%, 91.88%, and 86.13%, respectively.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据