Smart City Gnosys

Smart city article details

Title Routing Attack Induced Anomaly Detection In Iot Network Using Rbm-Lstm
ID_Doc 47090
Authors Sahay R.; Nayyar A.; Shrivastava R.K.; Bilal M.; Singh S.P.; Pack S.
Year 2024
Published ICT Express, 10, 3
DOI http://dx.doi.org/10.1016/j.icte.2024.04.012
Abstract The network of resource constraint devices, also known as the Low power and Lossy Networks (LLNs), constitutes the edge tire of the Internet of Things applications like smart homes, smart cities, and connected vehicles. The IPv6 Routing Protocol over Low power and lossy networks (RPL) ensures efficient routing in the edge tire of the IoT environment. However, RPL has inherent vulnerabilities that allow malicious insider entities to instigate several security attacks in the IoT network. As a result, the IoT networks suffer from resource depletion, performance degradation, and traffic disruption. Recent literature discusses several machine learning algorithms to detect one or more routing attacks. However, IoT infrastructures are expanding, and so are the attack surfaces. Therefore, it is essential to have a solution that can adapt to this change. This paper introduces a comprehensive framework to detect routing attacks within Low Power and Lossy Networks (LLNs). The proposed solution leverages deep learning by combining Restricted Boltzmann Machine (RBM) and Long Short-Term Memory (LSTM). The framework is trained on 11 network parameters to understand and predict normal network behavior. Anomalies, identified as deviations from the forecast trends, serve as indicators of potential routing attacks and thus address vulnerabilities in the RPL. © 2024 The Author(s)
Author Keywords Anomaly detection; Internet of Things; LSTM; RBM; Routing attacks; RPL


Similar Articles


Id Similarity Authors Title Published
5644 View0.928Ahmadi K.; Javidan R.A Trust Based Anomaly Detection Scheme Using A Hybrid Deep Learning Model For Iot Routing Attacks MitigationIET Information Security, 2024, 1 (2024)
19221 View0.893Krari A.; Hajami A.; Jarmouni E.Detecting The Rpl Version Number Attack In Iot Networks Using Deep Learning ModelsInternational Journal of Advanced Computer Science and Applications, 14, 10 (2023)
21119 View0.879Maurya P.; Kushwaha V.Dsnfys: Deep Stacked Neuro Fuzzy System For Attack Detection And Mitigation In Rpl Based IotInternational Journal of Information Engineering and Electronic Business, 17, 3 (2025)
5319 View0.867Almutairi H.; Zhang N.A Survey On Routing Solutions For Low-Power And Lossy Networks: Toward A Reliable Path-Finding ApproachNetwork, 4, 1 (2024)
36037 View0.866Kumar V.; Malik N.Machine Learning-Based Attacks Detection In Lot Networks Routing Protocols2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions), ICRITO 2024 (2024)
33032 View0.864Dawoud A.; Sianaki O.A.; Shahristani S.; Raun C.Internet Of Things Intrusion Detection: A Deep Learning Approach2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020 (2020)
2052 View0.86Elsayed R.; Hamada R.; Hammoudeh M.; Abdalla M.; Elsaid S.A.A Hierarchical Deep Learning-Based Intrusion Detection Architecture For Clustered Internet Of ThingsJournal of Sensor and Actuator Networks, 12, 1 (2023)
6497 View0.855Goyal H.R.; Husain S.O.; Dixit K.K.; Boob N.S.; Reddy B.R.; Kumar J.; Sharma S.Advanced Deep Learning Approaches For Real-Time Anomaly Detection In Iot EnvironmentsProceedings of International Conference on Contemporary Computing and Informatics, IC3I 2024 (2024)
60588 View0.854Aboubakar M.; Kellil M.; Bouabdallah A.; Roux P.Using Machine Learning To Estimate The Optimal Transmission Range For Rpl NetworksProceedings of IEEE/IFIP Network Operations and Management Symposium 2020: Management in the Age of Softwarization and Artificial Intelligence, NOMS 2020 (2020)
7460 View0.853Arun Raj V.; Mohamed Arshad M.; Mathew F.An Alert And Detection System For Cyber-Attacks On Iot DevicesHandbook of Research on Network-Enabled IoT Applications for Smart City Services (2023)