Smart City Gnosys

Smart city article details

Title Dsnfys: Deep Stacked Neuro Fuzzy System For Attack Detection And Mitigation In Rpl Based Iot
ID_Doc 21119
Authors Maurya P.; Kushwaha V.
Year 2025
Published International Journal of Information Engineering and Electronic Business, 17, 3
DOI http://dx.doi.org/10.5815/ijieeb.2025.03.05
Abstract The Routing Protocol for Low-Power and Lossy Networks (RPL) is a widely adopted protocol for managing and optimizing routing in resource-constrained Internet of Things (IoT) environments. RPL operates by constructing a Destination-Oriented Directed Acyclic Graph (DODAG) to establish efficient routes between nodes. This protocol is designed to address the unique challenges of IoT networks, such as limited energy resources, unreliable wireless links, and frequent topology changes. RPL's adaptability and scalability render it particularly suitable for large-scale IoT deployments in various applications, including smart cities, industrial automation, and environmental monitoring. However, the protocol's vulnerability to various security attacks poses significant threats to the reliability and confidentiality of IoT networks. To address this issue, a novel deep-stacked neuro-fuzzy system (DSNFyS) has been developed for attack detection in RPL-based IoT. The proposed approach begins with simulating RPL routing in IoT, followed by attack detection processing at the Base Station (BS) using log data. Data normalization is accomplished through the application of min-max normalization techniques. The most crucial features are then identified through feature selection, utilizing information gain and Support Vector Machine-Recursive Feature Elimination (SVM-RFE). Attack detection is subsequently performed using DSNFyS, which integrates a Deep Stacked Autoencoder (DSA) with an Adaptive Neuro-Fuzzy Inference System (ANFIS). Upon detection of an attack, mitigation is carried out employing a DSA trained using the Hiking Optimization Algorithm (HOA). The proposed DSNFyS demonstrated exceptional performance, achieving the better accuracy of 97.41%, True Positive Rate (TPR) of 97.60%, and True Negative Rate (TNR) of 97.12%. © 2025, Modern Education and Computer Science Press. All rights reserved.
Author Keywords Attack Detection; Attack Mitigation; Deep Learning; Internet of Things; Routing


Similar Articles


Id Similarity Authors Title Published
5644 View0.892Ahmadi K.; Javidan R.A Trust Based Anomaly Detection Scheme Using A Hybrid Deep Learning Model For Iot Routing Attacks MitigationIET Information Security, 2024, 1 (2024)
47090 View0.879Sahay R.; Nayyar A.; Shrivastava R.K.; Bilal M.; Singh S.P.; Pack S.Routing Attack Induced Anomaly Detection In Iot Network Using Rbm-LstmICT Express, 10, 3 (2024)
19221 View0.87Krari A.; Hajami A.; Jarmouni E.Detecting The Rpl Version Number Attack In Iot Networks Using Deep Learning ModelsInternational Journal of Advanced Computer Science and Applications, 14, 10 (2023)