Machine Learning Algorithms to Defend Against Routing Attacks on the Internet of Things: A Systematic Literature Review
DOI:
https://doi.org/10.51519/journalisi.v6i3.828Keywords:
RPL, IoT, LNNs, Machine learning, routing attacksAbstract
The Internet of Things (IoT) has become increasingly popular, opening vast application possibilities in different fields including smart cities, healthcare, manufacturing, agriculture, etc. IoT comprises resource-constrained devices deployed in Low Power and Lossy Networks (LLNs). To satisfy the routing requirements of these networks, the Internet Engineering Task Force (IETF) created a standardised Routing Protocol for low-power and Lossy Networks (RPL). However, this routing protocol is vulnerable to routing attacks, prompting researchers to propose several techniques to defend the network against such attacks. Machine learning approaches demonstrate effective ways to detect such attacks in large quantities. Therefore, this paper systematically synthesised 17 publications to compare the performance of traditional and advanced machine learning algorithms to identify the best algorithm for detecting RPL-based IoT routing attacks. The findings of this paper show that machine learning algorithms are capable of effective detection of many routing attacks with high accuracy and a low False Positive Rate. Furthermore, the results demonstrate that on average, advanced machine learning algorithms can achieve an accuracy of 96.03% compared to traditional machine learning algorithms which achieved 91.67%. Traditional machine learning algorithms demonstrated the best performance on average False Positive Rate by achieving 2.75% compared to their counterparts which gained 4.79%. However, Random Forest showed the best performance and outperformed all the algorithms in the selected publications by achieving over 99% accuracy, precision and recall.
Downloads
References
A. O. Adebayo, M. S. Chaubey, and L. P. Numbu, "Industry 4.0: The fourth industrial revolution and how it relates to the application of internet of things (IoT)," Journal of Multidisciplinary Engineering Science Studies (JMESS), vol. 5, no. 2, pp. 2477-2482, 2019.
A. J. Witwit and A. K. Idrees, "A comprehensive review for RPL routing protocol in low power and lossy networks," in Proc. Int. Conf. New Trends Inf. Commun. Technol. Appl., Cham, Switzerland: Springer International Publishing, Sep. 2018, pp. 50-66.
F. Garba, "A Comprehensive Review of Routing for Low Power and Lossy Network (RPL) Protocol Challenges and Proposed Improvements," 2022.
A. Jahangeer, S. U. Bazai, S. Aslam, S. Marjan, M. Anas, and S. H. Hashemi, "A Review on the Security of IoT Networks: From Network Layer’s Perspective," IEEE Access, vol. 11, pp. 71073-71087, 2023.
J. Rani, A. Dhingra, and V. Sindhu, "A Detailed Review of the IoT with Detection of Sinkhole Attacks in RPL based network," in Proc. A Detailed Review of the IoT with Detection of Sinkhole Attacks in RPL based network, 2022, pp. 1-6.
A. Agiollo, M. Conti, P. Kaliyar, T. N. Lin, and L. Pajola, "DETONAR: Detection of Routing Attacks in RPL-Based IoT," IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 1178-1190, 2021.
H. Alam, M. S. Yaqub, and I. Nadir, "Detecting IoT Attacks using Multi-Layer Data Through Machine Learning," in Proc. Detecting IoT Attacks using Multi-Layer Data Through Machine Learning, 2022, pp. 52-59.
A. U. Gawade and N. M. Shekokar, "Lightweight Secure RPL: A Need in IoT," in Proc. Lightweight Secure RPL: A Need in IoT, 2017, pp. 214-219.
A. Alazab, A. Khraisat, S. Singh, S. Bevinakoppa, and O. A. Mahdi, "Routing Attacks Detection in 6LoWPAN-Based Internet of Things," in Proc. Routing Attacks Detection in 6LoWPAN-Based Internet of Things, 2023.
R. Ahmad and I. Alsmadi, "Machine learning approaches to IoT security: A systematic literature review," Internet of Things, vol. 14, pp. 100365, 2021.
T. A. Al-Amiedy, M. Anbar, B. Belaton, A. H. Kabla, I. H. Hasbullah, and Z. R. Alashhab, "A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things," in Proc. A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things, 2022.
A. M. Pasikhani, J. A. Clark, P. Gope, and A. Alshahrani, "Intrusion Detection Systems in RPL-Based 6LoWPAN: A Systematic Literature Review," IEEE Sensors Journal, vol. 21, no. 11, pp. 12940-12968, 2021.
T. A. Al-Amiedy, M. Anbar, B. Belaton, A. A. Bahashwan, I. H. Hasbullah, M. A. Aladaileh, and G. A. L. Mukhaini, "A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things," Internet of Things, vol. 22, pp. 100741, 2023.
G. A. L. Mukhaini, M. Anbar, S. Manickam, T. A. Al-Amiedy, and A. A. Momani, "A systematic literature review of recent lightweight detection approaches leveraging machine and deep learning mechanisms in Internet of Things networks," Journal of King Saud University - Computer and Information Sciences, vol. 36, no. 1, pp. 101866, 2024.
H. Xu, Z. Sun, Y. Cao, and H. Bilal, "A data-driven approach for intrusion and anomaly detection using automated machine learning for the Internet of Things," Soft Computing, vol. 27, no. 19, pp. 14469-14481, 2023.
M. D. Momand, M. K. Mohsin, and Ihsanulhaq, "Machine Learning-based Multiple Attack Detection in RPL over IoT," in Proc. Machine Learning-based Multiple Attack Detection in RPL over IoT, 2021, pp. 1-8.
Kamaldeep, M. Malik, M. Dutta, and J. Granjal, "IoT-Sentry: A Cross-Layer-Based Intrusion Detection System in Standardized Internet of Things," IEEE Sensors Journal, vol. 21, no. 24, pp. 28066-28076, 2021.
C. M. Moreira and G. Kaddoum, "QL vs. SARSA: Performance Evaluation for Intrusion Prevention Systems in Software-Defined IoT Networks," in Proc. QL vs. SARSA: Performance Evaluation for Intrusion Prevention Systems in Software-Defined IoT Networks, 2023, pp. 500-504.
A. R. L., B. S., and C. S. G., "An Effective Detection of Version Number Attacks in the IoT using Neural Networks," in Proc. An Effective Detection of Version Number Attacks in the IoT using Neural Networks, 2022, pp. 1-7.
A. M. Pasikhani, J. A. Clark, and P. Gope, "Incremental hybrid intrusion detection for 6LoWPAN," Computers & Security, vol. 135, pp. 103447, 2023.
T. Raghavendra, M. Anand, M. Selvi, K. Thangaramya, S. V. N. Santhosh Kumar, and A. Kannan, "An Intelligent RPL attack detection using Machine Learning-Based Intrusion Detection System for Internet of Things," Procedia Computer Science, vol. 215, pp. 61-70, 2022.
S. Rabhi, T. Abbes, and F. Zarai, "IoT Routing Attacks Detection Using Machine Learning Algorithms," Wireless Personal Communications, vol. 128, no. 3, pp. 1839-1857, 2022.
P. P. Ioulianou, V. G. Vassilakis, and S. F. Shahandashti, "ML-based Detection of Rank and Blackhole Attacks in RPL Networks," in Proc. ML-based Detection of Rank and Blackhole Attacks in RPL Networks, 2022, pp. 338-343.
W. Choukri, H. Lamaazi, and N. Benamar, "RPL rank attack detection using Deep Learning," in Proc. RPL rank attack detection using Deep Learning, 2020, pp. 1-6.
C. Ioannou and V. Vassiliou, "Accurate Detection of Sinkhole Attacks in IoT Networks Using Local Agents," in Proc. Accurate Detection of Sinkhole Attacks in IoT Networks Using Local Agents, 2020, pp. 1-8.
A. Verma and V. Ranga, "ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things," in Proc. ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things, 2019, pp. 1-6.
A. M. Pasikhani, J. A. Clark, and P. Gope, "Reinforcement-Learning-based IDS for 6LoWPAN," in Proc. Reinforcement-Learning-based IDS for 6LoWPAN, 2021, pp. 1049-1060.
S. Cakir, S. Toklu, and N. Yalcin, "RPL Attack Detection and Prevention in the Internet of Things Networks Using a GRU Based Deep Learning," IEEE Access, vol. 8, pp. 183678-183689, 2020.
Y. Al Sawafi, A. Touzene, and R. Hedjam, "Hybrid Deep Learning-Based Intrusion Detection System for RPL IoT Networks," in Proc. Hybrid Deep Learning-Based Intrusion Detection System for RPL IoT Networks, 2023.
F. Zahra, N. Z. Jhanjhi, S. N. Brohi, N. A. Khan, M. Masud, and M. A. AlZain, "Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning," in Proc. Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning, 2022.
F. Zahra, N. Z. Jhanjhi, N. A. Khan, S. N. Brohi, M. Masud, and S. Aljahdali, "Protocol-Specific and Sensor Network-Inherited Attack Detection in IoT Using Machine Learning," in Proc. Protocol-Specific and Sensor Network-Inherited Attack Detection in IoT Using Machine Learning, 2022.
Downloads
Published
Issue
Section
License
Authors Declaration
- The Authors certify that they have read, understood, and agreed to the Journal of Information Systems and Informatics (JournalISI) submission guidelines, policies, and submission declaration. The submission has been prepared using the provided template.
- The Authors certify that all authors have approved the publication of this manuscript and that there is no conflict of interest.
- The Authors confirm that the manuscript is their original work, has not received prior publication, is not under consideration for publication elsewhere, and has not been previously published.
- The Authors confirm that all authors listed on the title page have contributed significantly to the work, have read the manuscript, attest to the validity and legitimacy of the data and its interpretation, and agree to its submission.
- The Authors confirm that the manuscript is not copied from or plagiarized from any other published work.
- The Authors declare that the manuscript will not be submitted for publication in any other journal or magazine until a decision is made by the journal editors.
- If the manuscript is finally accepted for publication, the Authors confirm that they will either proceed with publication immediately or withdraw the manuscript in accordance with the journal’s withdrawal policies.
- The Authors agree that, upon publication of the manuscript in this journal, they transfer copyright or assign exclusive rights to the publisher, including commercial rights














