Smart City Gnosys

Smart city article details

Title A Trust Based Anomaly Detection Scheme Using A Hybrid Deep Learning Model For Iot Routing Attacks Mitigation
ID_Doc 5644
Authors Ahmadi K.; Javidan R.
Year 2024
Published IET Information Security, 2024, 1
DOI http://dx.doi.org/10.1049/2024/4449798
Abstract Internet of Things (IoT), as a remarkable paradigm, establishes a wide range of applications in various industries like healthcare, smart homes, smart cities, agriculture, transportation, and military domains. This widespread technology provides a general platform for heterogeneous objects to connect, exchange, and process gathered information. Beside significant efficiency and productivity impacts of IoT technology, security and privacy concerns have emerged more than ever. The routing protocol for low power and lossy networks (RPL) which is standardized for IoT environment, suffers from the basic security considerations, which makes it vulnerable to many well-known attacks. Several security solutions have been proposed to address routing attacks detection in RPL–based IoT, most of which are based on machine learning techniques, intrusion detection systems and trust-based approaches. Securing RPL–based IoT networks is challenging because resource constraint IoT devices are connected to untrusted Internet, the communication links are lossy and the devices use a set of novel and heterogenous technologies. Therefore, providing light-weight security mechanisms play a vital role in timely detection and prevention of IoT routing attacks. In this paper, we proposed a novel anomaly detection–based trust management model using the concepts of sequence prediction and deep learning. We have formulated the problem of routing behavior anomaly detection as a time series forecasting method, which is solved based on a stacked long–short term memory (LSTM) sequence to sequence autoencoder; that is, a hybrid training model of recurrent neural networks and autoencoders. The proposed model is then utilized to provide a detection mechanism to address four prevalent and destructive RPL attacks including: black-hole attack, destination-oriented directed acyclic graph (DODAG) information solicitation (DIS) flooding attack, version number (VN) attack, and decreased rank (DR) attack. In order to evaluate the efficiency and effectiveness of the proposed model in timely detection of RPL–specific routing attacks, we have implemented the proposed model on several RPL–based IoT scenarios simulated using Contiki Cooja simulator separately, and the results have been compared in details. According to the presented results, the implemented detection scheme on all attack scenarios, demonstrated that the trend of estimated anomaly between real and predicted routing behavior is similar to the evaluated attack frequency of malicious nodes during the RPL process and in contrast, analyzed trust scores represent an opposite pattern, which shows high accurate and timely detection of attack incidences using our proposed trust scheme. Copyright © 2024 Khatereh Ahmadi and Reza Javidan.
Author Keywords anomaly; deep learning; Internet of Things; routing attack; RPL; trust


Similar Articles


Id Similarity Authors Title Published
47090 View0.928Sahay R.; Nayyar A.; Shrivastava R.K.; Bilal M.; Singh S.P.; Pack S.Routing Attack Induced Anomaly Detection In Iot Network Using Rbm-LstmICT Express, 10, 3 (2024)
19221 View0.914Krari A.; Hajami A.; Jarmouni E.Detecting The Rpl Version Number Attack In Iot Networks Using Deep Learning ModelsInternational Journal of Advanced Computer Science and Applications, 14, 10 (2023)
7460 View0.9Arun Raj V.; Mohamed Arshad M.; Mathew F.An Alert And Detection System For Cyber-Attacks On Iot DevicesHandbook of Research on Network-Enabled IoT Applications for Smart City Services (2023)
21119 View0.892Maurya P.; Kushwaha V.Dsnfys: Deep Stacked Neuro Fuzzy System For Attack Detection And Mitigation In Rpl Based IotInternational Journal of Information Engineering and Electronic Business, 17, 3 (2025)
1610 View0.888Alghofaili Y.; Rassam M.A.A Dynamic Trust-Related Attack Detection Model For Iot Devices And Services Based On The Deep Long Short-Term Memory TechniqueSensors, 23, 8 (2023)
33213 View0.888Muzammal S.M.; Murugesan R.K.; Jhanjhi N.Z.Introducing Mobility Metrics In Trust-Based Security Of Routing Protocol For Internet Of ThingsProceedings - 2021 IEEE 4th National Computing Colleges Conference, NCCC 2021 (2021)
9648 View0.886Alsoufi M.A.; Razak S.; Siraj M.M.; Nafea I.; Ghaleb F.A.; Saeed F.; Nasser M.Anomaly-Based Intrusion Detection Systems In Iot Using Deep Learning: A Systematic Literature ReviewApplied Sciences (Switzerland), 11, 18 (2021)
2052 View0.883Elsayed R.; Hamada R.; Hammoudeh M.; Abdalla M.; Elsaid S.A.A Hierarchical Deep Learning-Based Intrusion Detection Architecture For Clustered Internet Of ThingsJournal of Sensor and Actuator Networks, 12, 1 (2023)
33032 View0.876Dawoud A.; Sianaki O.A.; Shahristani S.; Raun C.Internet Of Things Intrusion Detection: A Deep Learning Approach2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020 (2020)
7014 View0.872Reis M.J.C.S.Ai-Driven Anomaly Detection For Securing Iot Devices In 5G-Enabled Smart CitiesElectronics (Switzerland), 14, 12 (2025)