A Novel Deep Learning-based Framework for Blackhole Attack Detection in Unsecured RPL Networks
The routing protocol for low-power and lossy networks (RPL) was developed specifically for constrained communication. Considering its constrained nature, RPL-based Networks can be accessible by trusted and untrusted global users via the Internet and can be subject to serious attacks. Routing attacks...
Saved in:
Published in | International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (Online) pp. 457 - 462 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
20.11.2022
|
Subjects | |
Online Access | Get full text |
ISSN | 2770-7466 |
DOI | 10.1109/3ICT56508.2022.9990664 |
Cover
Abstract | The routing protocol for low-power and lossy networks (RPL) was developed specifically for constrained communication. Considering its constrained nature, RPL-based Networks can be accessible by trusted and untrusted global users via the Internet and can be subject to serious attacks. Routing attacks are especially difficult to be identified when they occur. However, Deep Learning techniques can be leveraged in detecting network intrusions. This paper comes up with a new deep learning-based framework for routing attack detection in unsecured RPL networks. It allows analyzing and processing the network traffic, extracting features, and defining target-based intrusion thresholds, which leads to the detection of routing attacks. The proposed model is compared to the baseline Machine learning methods. Extensive simulation results confirm the efficiency of our proposed model with a reliable error rate and a detection accuracy up to 98.70%. |
---|---|
AbstractList | The routing protocol for low-power and lossy networks (RPL) was developed specifically for constrained communication. Considering its constrained nature, RPL-based Networks can be accessible by trusted and untrusted global users via the Internet and can be subject to serious attacks. Routing attacks are especially difficult to be identified when they occur. However, Deep Learning techniques can be leveraged in detecting network intrusions. This paper comes up with a new deep learning-based framework for routing attack detection in unsecured RPL networks. It allows analyzing and processing the network traffic, extracting features, and defining target-based intrusion thresholds, which leads to the detection of routing attacks. The proposed model is compared to the baseline Machine learning methods. Extensive simulation results confirm the efficiency of our proposed model with a reliable error rate and a detection accuracy up to 98.70%. |
Author | Choukri, Wijdan Benamar, Nabil Lamaazi, Hanane |
Author_xml | – sequence: 1 givenname: Wijdan surname: Choukri fullname: Choukri, Wijdan email: wij.choukri@gmail.edu.umi.ac.ma organization: Moulay Ismail University of Meknes,IMAGE Laboratory, Faculty of Sciences,Meknes,Morocco – sequence: 2 givenname: Hanane surname: Lamaazi fullname: Lamaazi, Hanane email: Lamaazi.hanane@uaeu.ac.ae organization: Uae University,College of Information Technology,Al Ain,UAE – sequence: 3 givenname: Nabil surname: Benamar fullname: Benamar, Nabil email: n.benamar@umi.ac.ma organization: Moulay Ismail University of Meknes,IMAGE Laboratory, School of Technology,Meknes,Morocco |
BookMark | eNotkMtOwzAURA0CiVL6BUjIP5By_baXpVCoFBWEypbKsW8gNE0qJ4D4e4Loas5izizmnJw0bYOEXDGYMgbuWizna6UV2CkHzqfOOdBaHpGJM5ZpraRiTvBjMuLGQGak1mdk0nUfACA4CKn4iLzO6Kr9wpreIu5pjj41VfOWFb7DSBfJ7_C7TVtatone1D5s39sa6azvBxyUHkNftQ2tGvrSdBg-02A9P-V0hf2f112Q09LXHU4OOSbrxd16_pDlj_fL-SzPKmlVxnRQAVWJQVqmihgFgygh6tJ6ZwwD7pmzkSswRRFsGRTIoRNBSiiC4GJMLv9nK0Tc7FO18-lnczhE_AJwDVZL |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/3ICT56508.2022.9990664 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781665451932 1665451939 |
EISSN | 2770-7466 |
EndPage | 462 |
ExternalDocumentID | 9990664 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IL 6IN AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK OCL RIE RIL |
ID | FETCH-LOGICAL-i485-16c5ce5fec4815bdd310d40d6f8a977102a198d2507bbc8fc504d31d0440bc323 |
IEDL.DBID | RIE |
IngestDate | Wed Aug 27 02:27:41 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i485-16c5ce5fec4815bdd310d40d6f8a977102a198d2507bbc8fc504d31d0440bc323 |
PageCount | 6 |
ParticipantIDs | ieee_primary_9990664 |
PublicationCentury | 2000 |
PublicationDate | 2022-Nov.-20 |
PublicationDateYYYYMMDD | 2022-11-20 |
PublicationDate_xml | – month: 11 year: 2022 text: 2022-Nov.-20 day: 20 |
PublicationDecade | 2020 |
PublicationTitle | International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (Online) |
PublicationTitleAbbrev | 3ICT |
PublicationYear | 2022 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0003203452 |
Score | 1.8154904 |
Snippet | The routing protocol for low-power and lossy networks (RPL) was developed specifically for constrained communication. Considering its constrained nature,... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 457 |
SubjectTerms | Black-Hole attack Deep learning Deep Neural Network IoT RPL |
Title | A Novel Deep Learning-based Framework for Blackhole Attack Detection in Unsecured RPL Networks |
URI | https://ieeexplore.ieee.org/document/9990664 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8JAEN4AJ09qwPjOHjy6peyL7ZGgRI0QYiDhJNlXDdEUIsWDv97ZtmA0Hrxtmk632Wn6fTs73wxCVy7mzIs0JlSnjHBNJVGcepKEQy_AtzRmQe88HMm7KX-YiVkNXe-0MN77IvnMR2FYnOW7pd2EUFkbyAwgJK-jOnxmpVZrF09h8HAuaCUC7sRJm933JyIQENgFUhpVxj-6qBQgMthHw-30Ze7Ia7TJTWQ_f1Vm_O_7HaDWt1wPj3dAdIhqPmui5x4eLT_8G77xfoWrMqovJKCWw4NtShYGzoqLIF7ok4t7eQ5DMMmLDK0MLzI8zdYhJg9WT-NHPCrTxtctNBncTvp3pGqmQBZcCdKRVlhwirehOotxDmid47GTqdJAAYFm6E6iHBCirjFWpVbEHO5xoSO1sYyyI9TIlpk_RpjbruSJFsw4wxVjidGpdLyrEwV_cZmeoGZYmvmqLJcxr1bl9O_LZ2gvuCfI-2h8jhr5-8ZfAM7n5rJw8BcXKqdR |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8JAEN4gHvSkBoxv9-DRLWUfpT0SlIBCQ0xJOEm6jxqiaYkUD_56Z9uC0Xjwtml2ms1Ost-3s_PNIHSjXc6MSFxC44QRHlOP-JwaEthHL8C3xGVW7zwOvcGUP8zErIZut1oYY0yRfGYcOyze8nWm1jZU1gIyAwjJd9Au4D4XpVprG1Fh8HsuaCUDbrtBiw17kbAUBO6BlDqV-Y8-KgWM9A_QeLOAMnvk1Vnn0lGfv2oz_neFh6j5LdjDky0UHaGaSRvouYvD7MO84TtjlrgqpPpCLG5p3N8kZWFgrbgI49lOubib5zAEk7zI0UrxIsXTdGWj8mD1NBnhsEwcXzVR1L-PegNStVMgC-4L0vaUUOAWo2x9Fqk1EDvNXe0lfgwkEIhG3A58DZSoI6XyEyVcDnO07UktFaPsGNXTLDUnCHPV8XgQCya15D5jgYwTT_NOHPhwjnvJKWrYrZkvy4IZ82pXzv7-fI32BtF4NB8Nw8dztG9dZcV-1L1A9fx9bS4B9XN5VTj7Cwozqp4 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=International+Conference+on+Innovation+and+Intelligence+for+Informatics%2C+Computing%2C+and+Technologies+%28Online%29&rft.atitle=A+Novel+Deep+Learning-based+Framework+for+Blackhole+Attack+Detection+in+Unsecured+RPL+Networks&rft.au=Choukri%2C+Wijdan&rft.au=Lamaazi%2C+Hanane&rft.au=Benamar%2C+Nabil&rft.date=2022-11-20&rft.pub=IEEE&rft.eissn=2770-7466&rft.spage=457&rft.epage=462&rft_id=info:doi/10.1109%2F3ICT56508.2022.9990664&rft.externalDocID=9990664 |