Routing attack induced anomaly detection in IoT network using RBM-LSTM

Rashmi Sahay, Anand Nayyar, Rajesh Kumar Shrivastava, Muhammad Bilal, Simar Preet Singh, Sangheon Pack*

*Corresponding author for this work

    Research output: Contribution to journalArticlepeer-review

    7 Citations (Scopus)

    Abstract

    The network of resource constraint devices, also known as the Low power and Lossy Networks (LLNs), constitutes the edge tire of the Internet of Things applications like smart homes, smart cities, and connected vehicles. The IPv6 Routing Protocol over Low power and lossy networks (RPL) ensures efficient routing in the edge tire of the IoT environment. However, RPL has inherent vulnerabilities that allow malicious insider entities to instigate several security attacks in the IoT network. As a result, the IoT networks suffer from resource depletion, performance degradation, and traffic disruption. Recent literature discusses several machine learning algorithms to detect one or more routing attacks. However, IoT infrastructures are expanding, and so are the attack surfaces. Therefore, it is essential to have a solution that can adapt to this change. This paper introduces a comprehensive framework to detect routing attacks within Low Power and Lossy Networks (LLNs). The proposed solution leverages deep learning by combining Restricted Boltzmann Machine (RBM) and Long Short-Term Memory (LSTM). The framework is trained on 11 network parameters to understand and predict normal network behavior. Anomalies, identified as deviations from the forecast trends, serve as indicators of potential routing attacks and thus address vulnerabilities in the RPL.

    Original languageEnglish
    Pages (from-to)459-464
    Number of pages6
    JournalICT Express
    Volume10
    Issue number3
    DOIs
    Publication statusPublished - 2024 Jun

    Bibliographical note

    Publisher Copyright:
    © 2024 The Author(s)

    Keywords

    • Anomaly detection
    • Internet of Things
    • LSTM
    • RBM
    • RPL
    • Routing attacks

    ASJC Scopus subject areas

    • Software
    • Information Systems
    • Hardware and Architecture
    • Computer Networks and Communications
    • Artificial Intelligence

    Fingerprint

    Dive into the research topics of 'Routing attack induced anomaly detection in IoT network using RBM-LSTM'. Together they form a unique fingerprint.

    Cite this