Multiple intrusion detection in RPL based networks

Manjula C. Belavagi, Balachandra Muniyal

Research output: Contribution to journalArticle

Abstract

Routing Protocol for Low Power and Lossy Networks based networks consists of large number of tiny sensor nodes with limited resources. These nodes are directly connected to the Internet through the border router. Hence these nodes are susceptible to different types of attacks. The possible attacks are rank attack, selective forwarding, worm hole and Denial of service attack. These attacks can be effectively identified by intrusion detection system model. The paper focuses on identification of multiple intrusions by considering the network size as 10, 40 and 100 nodes and adding 10%, 20% and 30% of malicious nodes to the considered network. Experiments are simulated using Cooja simulator on Contiki operating system. Behavior of the network is observed based on the percentage of inconsistency achieved, energy consumption, accuracy and false positive rate. Experimental results show that multiple intrusions can be detected effectively by machine learning techniques.

Original languageEnglish
Pages (from-to)467-476
Number of pages10
JournalInternational Journal of Electrical and Computer Engineering
Volume10
Issue number1
DOIs
Publication statusPublished - 01-01-2020

Fingerprint

Intrusion detection
Routing protocols
Sensor nodes
Routers
Learning systems
Identification (control systems)
Energy utilization
Simulators
Internet
Experiments
Denial-of-service attack

All Science Journal Classification (ASJC) codes

  • Computer Science(all)
  • Electrical and Electronic Engineering

Cite this

@article{f7bd5f0a522241f8bb494b2e1c7e96a5,
title = "Multiple intrusion detection in RPL based networks",
abstract = "Routing Protocol for Low Power and Lossy Networks based networks consists of large number of tiny sensor nodes with limited resources. These nodes are directly connected to the Internet through the border router. Hence these nodes are susceptible to different types of attacks. The possible attacks are rank attack, selective forwarding, worm hole and Denial of service attack. These attacks can be effectively identified by intrusion detection system model. The paper focuses on identification of multiple intrusions by considering the network size as 10, 40 and 100 nodes and adding 10{\%}, 20{\%} and 30{\%} of malicious nodes to the considered network. Experiments are simulated using Cooja simulator on Contiki operating system. Behavior of the network is observed based on the percentage of inconsistency achieved, energy consumption, accuracy and false positive rate. Experimental results show that multiple intrusions can be detected effectively by machine learning techniques.",
author = "Belavagi, {Manjula C.} and Balachandra Muniyal",
year = "2020",
month = "1",
day = "1",
doi = "10.11591/ijece.v10i1.pp467-476",
language = "English",
volume = "10",
pages = "467--476",
journal = "International Journal of Electrical and Computer Engineering",
issn = "2088-8708",
publisher = "Institute of Advanced Engineering and Science (IAES)",
number = "1",

}

Multiple intrusion detection in RPL based networks. / Belavagi, Manjula C.; Muniyal, Balachandra.

In: International Journal of Electrical and Computer Engineering, Vol. 10, No. 1, 01.01.2020, p. 467-476.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Multiple intrusion detection in RPL based networks

AU - Belavagi, Manjula C.

AU - Muniyal, Balachandra

PY - 2020/1/1

Y1 - 2020/1/1

N2 - Routing Protocol for Low Power and Lossy Networks based networks consists of large number of tiny sensor nodes with limited resources. These nodes are directly connected to the Internet through the border router. Hence these nodes are susceptible to different types of attacks. The possible attacks are rank attack, selective forwarding, worm hole and Denial of service attack. These attacks can be effectively identified by intrusion detection system model. The paper focuses on identification of multiple intrusions by considering the network size as 10, 40 and 100 nodes and adding 10%, 20% and 30% of malicious nodes to the considered network. Experiments are simulated using Cooja simulator on Contiki operating system. Behavior of the network is observed based on the percentage of inconsistency achieved, energy consumption, accuracy and false positive rate. Experimental results show that multiple intrusions can be detected effectively by machine learning techniques.

AB - Routing Protocol for Low Power and Lossy Networks based networks consists of large number of tiny sensor nodes with limited resources. These nodes are directly connected to the Internet through the border router. Hence these nodes are susceptible to different types of attacks. The possible attacks are rank attack, selective forwarding, worm hole and Denial of service attack. These attacks can be effectively identified by intrusion detection system model. The paper focuses on identification of multiple intrusions by considering the network size as 10, 40 and 100 nodes and adding 10%, 20% and 30% of malicious nodes to the considered network. Experiments are simulated using Cooja simulator on Contiki operating system. Behavior of the network is observed based on the percentage of inconsistency achieved, energy consumption, accuracy and false positive rate. Experimental results show that multiple intrusions can be detected effectively by machine learning techniques.

UR - http://www.scopus.com/inward/record.url?scp=85073319829&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85073319829&partnerID=8YFLogxK

U2 - 10.11591/ijece.v10i1.pp467-476

DO - 10.11591/ijece.v10i1.pp467-476

M3 - Article

AN - SCOPUS:85073319829

VL - 10

SP - 467

EP - 476

JO - International Journal of Electrical and Computer Engineering

JF - International Journal of Electrical and Computer Engineering

SN - 2088-8708

IS - 1

ER -