Home > Research > Publications & Outputs > Routing attack induced anomaly detection in IoT...

Associated organisational unit

Links

Text available via DOI:

View graph of relations

Routing attack induced anomaly detection in IoT network using RBM-LSTM

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Routing attack induced anomaly detection in IoT network using RBM-LSTM. / Sahay, Rashmi; Nayyar, Anand; Shrivastava, Rajesh Kumar et al.
In: ICT Express, 22.06.2024, p. 459-464.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Sahay, R, Nayyar, A, Shrivastava, RK, Bilal, M, Singh, SP & Pack, S 2024, 'Routing attack induced anomaly detection in IoT network using RBM-LSTM', ICT Express, pp. 459-464. https://doi.org/10.1016/j.icte.2024.04.012

APA

Sahay, R., Nayyar, A., Shrivastava, R. K., Bilal, M., Singh, S. P., & Pack, S. (2024). Routing attack induced anomaly detection in IoT network using RBM-LSTM. ICT Express, 459-464. https://doi.org/10.1016/j.icte.2024.04.012

Vancouver

Sahay R, Nayyar A, Shrivastava RK, Bilal M, Singh SP, Pack S. Routing attack induced anomaly detection in IoT network using RBM-LSTM. ICT Express. 2024 Jun 22;459-464. Epub 2024 May 3. doi: 10.1016/j.icte.2024.04.012

Author

Sahay, Rashmi ; Nayyar, Anand ; Shrivastava, Rajesh Kumar et al. / Routing attack induced anomaly detection in IoT network using RBM-LSTM. In: ICT Express. 2024 ; pp. 459-464.

Bibtex

@article{c0c49ff532a7493e99b33e2644fc8fab,
title = "Routing attack induced anomaly detection in IoT network using RBM-LSTM",
abstract = "The network of resource constraint devices, also known as the Low power and Lossy Networks (LLNs), constitutes the edge tire of the Internet of Things applications like smart homes, smart cities, and connected vehicles. The IPv6 Routing Protocol over Low power and lossy networks (RPL) ensures efficient routing in the edge tire of the IoT environment. However, RPL has inherent vulnerabilities that allow malicious insider entities to instigate several security attacks in the IoT network. As a result, the IoT networks suffer from resource depletion, performance degradation, and traffic disruption. Recent literature discusses several machine learning algorithms to detect one or more routing attacks. However, IoT infrastructures are expanding, and so are the attack surfaces. Therefore, it is essential to have a solution that can adapt to this change. This paper introduces a comprehensive framework to detect routing attacks within Low Power and Lossy Networks (LLNs). The proposed solution leverages deep learning by combining Restricted Boltzmann Machine (RBM) and Long Short-Term Memory (LSTM). The framework is trained on 11 network parameters to understand and predict normal network behavior. Anomalies, identified as deviations from the forecast trends, serve as indicators of potential routing attacks and thus address vulnerabilities in the RPL.",
author = "Rashmi Sahay and Anand Nayyar and Shrivastava, {Rajesh Kumar} and Muhammad Bilal and Singh, {Simar Preet} and Sangheon Pack",
year = "2024",
month = jun,
day = "22",
doi = "10.1016/j.icte.2024.04.012",
language = "English",
pages = "459--464",
journal = "ICT Express",
issn = "2405-9595",
publisher = "Elsevier",

}

RIS

TY - JOUR

T1 - Routing attack induced anomaly detection in IoT network using RBM-LSTM

AU - Sahay, Rashmi

AU - Nayyar, Anand

AU - Shrivastava, Rajesh Kumar

AU - Bilal, Muhammad

AU - Singh, Simar Preet

AU - Pack, Sangheon

PY - 2024/6/22

Y1 - 2024/6/22

N2 - The network of resource constraint devices, also known as the Low power and Lossy Networks (LLNs), constitutes the edge tire of the Internet of Things applications like smart homes, smart cities, and connected vehicles. The IPv6 Routing Protocol over Low power and lossy networks (RPL) ensures efficient routing in the edge tire of the IoT environment. However, RPL has inherent vulnerabilities that allow malicious insider entities to instigate several security attacks in the IoT network. As a result, the IoT networks suffer from resource depletion, performance degradation, and traffic disruption. Recent literature discusses several machine learning algorithms to detect one or more routing attacks. However, IoT infrastructures are expanding, and so are the attack surfaces. Therefore, it is essential to have a solution that can adapt to this change. This paper introduces a comprehensive framework to detect routing attacks within Low Power and Lossy Networks (LLNs). The proposed solution leverages deep learning by combining Restricted Boltzmann Machine (RBM) and Long Short-Term Memory (LSTM). The framework is trained on 11 network parameters to understand and predict normal network behavior. Anomalies, identified as deviations from the forecast trends, serve as indicators of potential routing attacks and thus address vulnerabilities in the RPL.

AB - The network of resource constraint devices, also known as the Low power and Lossy Networks (LLNs), constitutes the edge tire of the Internet of Things applications like smart homes, smart cities, and connected vehicles. The IPv6 Routing Protocol over Low power and lossy networks (RPL) ensures efficient routing in the edge tire of the IoT environment. However, RPL has inherent vulnerabilities that allow malicious insider entities to instigate several security attacks in the IoT network. As a result, the IoT networks suffer from resource depletion, performance degradation, and traffic disruption. Recent literature discusses several machine learning algorithms to detect one or more routing attacks. However, IoT infrastructures are expanding, and so are the attack surfaces. Therefore, it is essential to have a solution that can adapt to this change. This paper introduces a comprehensive framework to detect routing attacks within Low Power and Lossy Networks (LLNs). The proposed solution leverages deep learning by combining Restricted Boltzmann Machine (RBM) and Long Short-Term Memory (LSTM). The framework is trained on 11 network parameters to understand and predict normal network behavior. Anomalies, identified as deviations from the forecast trends, serve as indicators of potential routing attacks and thus address vulnerabilities in the RPL.

U2 - 10.1016/j.icte.2024.04.012

DO - 10.1016/j.icte.2024.04.012

M3 - Journal article

SP - 459

EP - 464

JO - ICT Express

JF - ICT Express

SN - 2405-9595

ER -