A trust model anomaly detection of RPL attacks in WSN-based IOT / Zainab Ebrahim Qamber Ghuloom Abdulla Alansari

Wireless Sensor Networks (WSN) have gained significant attention in academic and industrial research due to their scalability, flexibility, and ease of deployment. WSN comprises sensor nodes that use the Internet of Things (IoT) to exchange sensor data from various sectors such as healthcare, transp...

Full description

Saved in:
Bibliographic Details
Main Author: Zainab Ebrahim Qamber Ghuloom , Abdulla Alansari
Format: Thesis
Published: 2023
Subjects:
Online Access:http://studentsrepo.um.edu.my/15083/1/Zainab_Ebrahim.pdf
http://studentsrepo.um.edu.my/15083/2/Zainab.pdf
http://studentsrepo.um.edu.my/15083/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.um.stud.15083
record_format eprints
institution Universiti Malaya
building UM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaya
content_source UM Student Repository
url_provider http://studentsrepo.um.edu.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Zainab Ebrahim Qamber Ghuloom , Abdulla Alansari
A trust model anomaly detection of RPL attacks in WSN-based IOT / Zainab Ebrahim Qamber Ghuloom Abdulla Alansari
description Wireless Sensor Networks (WSN) have gained significant attention in academic and industrial research due to their scalability, flexibility, and ease of deployment. WSN comprises sensor nodes that use the Internet of Things (IoT) to exchange sensor data from various sectors such as healthcare, transportation, and agriculture. Protecting sensor data from attacks is essential as they play a crucial role in forecasting, cost reduction, quality assurance, or predictive maintenance. Routing protocols transmit vast amounts of data between WSN and the IoT gateway, but they are vulnerable. RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) is one of the routing protocols for wireless networks with lower energy, which is resource-constrained and provides energy-efficient routing. RPL is more effective than other routing protocols because of its self-organizing and self-healing features. Due to the potential impact on the device's performance with limited resources, RPL's optional security features only prevent external attacks; however, internal attacks resist newer protections such as data encryption and spam detection. Existing internal attack detection techniques reduce network lifetime by consuming significant resources through message overhead, computation, and communication. Furthermore, earlier research ignored mobility nodes and used additional hardware, which increased computational costs. Considering the security problems with RPL, this thesis presents a novel lightweight system for anomaly detection of five internal routing attacks: grayhole, blackhole, selective forwarding, DIS flooding, and wormhole attacks. The study aims to utilize a trust model in RPL protocol to increase network performance and lifetime while attaining high detection accuracy. In addition, this study introduces forgiveness and punishment sublayers to prevent mistakenly labeling normal nodes as attackers. The proposed system, RPL Anomaly Detection of Five Internal Attacks (RPLAD5), includes four layers: information gathering, trust calculation, decision making, and backup and restore. RPLAD5 starts operating immediately after the initial state of the network. The information gathering layer collects neighbouring node data for the trust calculation layer. Layer two utilizes the node's positive and negative behavior to calculate the trust for control and data packets. Layer three uses the results to determine if the node is malicious. Finally, nodes in layer 4 send a backup message to the root to identify malicious nodes and alert the network. All sensor nodes are emulated in RPLAD5 using TmoteSky and a trust model to protect the RPL protocol from internal attacks in a dynamic distributed network. Various experiments were conducted to evaluate the impact of adaptivity, scalability, accuracy, and mobility of RPLAD5 using different threshold values, network sizes, densities, error probabilities, and the rate of attackers. RPLAD5 defeats mobile attackers, mobile victims, or static frameworks as per the results of the comparative analysis. Each experiment undertakes different scenarios with an average of ten runs to obtain the most accurate values using the Cooja/Contiki OS. The evaluation results demonstrate that the proposed system consistently achieves energy and power consumption levels below 1 in most experiments. The PDR and TPR values are close to 1, indicating the system’s high accuracy. The FPR is nearly 0, surpassing both the standard RPL protocol and similar studies.
format Thesis
author Zainab Ebrahim Qamber Ghuloom , Abdulla Alansari
author_facet Zainab Ebrahim Qamber Ghuloom , Abdulla Alansari
author_sort Zainab Ebrahim Qamber Ghuloom , Abdulla Alansari
title A trust model anomaly detection of RPL attacks in WSN-based IOT / Zainab Ebrahim Qamber Ghuloom Abdulla Alansari
title_short A trust model anomaly detection of RPL attacks in WSN-based IOT / Zainab Ebrahim Qamber Ghuloom Abdulla Alansari
title_full A trust model anomaly detection of RPL attacks in WSN-based IOT / Zainab Ebrahim Qamber Ghuloom Abdulla Alansari
title_fullStr A trust model anomaly detection of RPL attacks in WSN-based IOT / Zainab Ebrahim Qamber Ghuloom Abdulla Alansari
title_full_unstemmed A trust model anomaly detection of RPL attacks in WSN-based IOT / Zainab Ebrahim Qamber Ghuloom Abdulla Alansari
title_sort trust model anomaly detection of rpl attacks in wsn-based iot / zainab ebrahim qamber ghuloom abdulla alansari
publishDate 2023
url http://studentsrepo.um.edu.my/15083/1/Zainab_Ebrahim.pdf
http://studentsrepo.um.edu.my/15083/2/Zainab.pdf
http://studentsrepo.um.edu.my/15083/
_version_ 1805882084592451584
spelling my.um.stud.150832024-06-13T21:18:41Z A trust model anomaly detection of RPL attacks in WSN-based IOT / Zainab Ebrahim Qamber Ghuloom Abdulla Alansari Zainab Ebrahim Qamber Ghuloom , Abdulla Alansari QA75 Electronic computers. Computer science Wireless Sensor Networks (WSN) have gained significant attention in academic and industrial research due to their scalability, flexibility, and ease of deployment. WSN comprises sensor nodes that use the Internet of Things (IoT) to exchange sensor data from various sectors such as healthcare, transportation, and agriculture. Protecting sensor data from attacks is essential as they play a crucial role in forecasting, cost reduction, quality assurance, or predictive maintenance. Routing protocols transmit vast amounts of data between WSN and the IoT gateway, but they are vulnerable. RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) is one of the routing protocols for wireless networks with lower energy, which is resource-constrained and provides energy-efficient routing. RPL is more effective than other routing protocols because of its self-organizing and self-healing features. Due to the potential impact on the device's performance with limited resources, RPL's optional security features only prevent external attacks; however, internal attacks resist newer protections such as data encryption and spam detection. Existing internal attack detection techniques reduce network lifetime by consuming significant resources through message overhead, computation, and communication. Furthermore, earlier research ignored mobility nodes and used additional hardware, which increased computational costs. Considering the security problems with RPL, this thesis presents a novel lightweight system for anomaly detection of five internal routing attacks: grayhole, blackhole, selective forwarding, DIS flooding, and wormhole attacks. The study aims to utilize a trust model in RPL protocol to increase network performance and lifetime while attaining high detection accuracy. In addition, this study introduces forgiveness and punishment sublayers to prevent mistakenly labeling normal nodes as attackers. The proposed system, RPL Anomaly Detection of Five Internal Attacks (RPLAD5), includes four layers: information gathering, trust calculation, decision making, and backup and restore. RPLAD5 starts operating immediately after the initial state of the network. The information gathering layer collects neighbouring node data for the trust calculation layer. Layer two utilizes the node's positive and negative behavior to calculate the trust for control and data packets. Layer three uses the results to determine if the node is malicious. Finally, nodes in layer 4 send a backup message to the root to identify malicious nodes and alert the network. All sensor nodes are emulated in RPLAD5 using TmoteSky and a trust model to protect the RPL protocol from internal attacks in a dynamic distributed network. Various experiments were conducted to evaluate the impact of adaptivity, scalability, accuracy, and mobility of RPLAD5 using different threshold values, network sizes, densities, error probabilities, and the rate of attackers. RPLAD5 defeats mobile attackers, mobile victims, or static frameworks as per the results of the comparative analysis. Each experiment undertakes different scenarios with an average of ten runs to obtain the most accurate values using the Cooja/Contiki OS. The evaluation results demonstrate that the proposed system consistently achieves energy and power consumption levels below 1 in most experiments. The PDR and TPR values are close to 1, indicating the system’s high accuracy. The FPR is nearly 0, surpassing both the standard RPL protocol and similar studies. 2023-07 Thesis NonPeerReviewed application/pdf http://studentsrepo.um.edu.my/15083/1/Zainab_Ebrahim.pdf application/pdf http://studentsrepo.um.edu.my/15083/2/Zainab.pdf Zainab Ebrahim Qamber Ghuloom , Abdulla Alansari (2023) A trust model anomaly detection of RPL attacks in WSN-based IOT / Zainab Ebrahim Qamber Ghuloom Abdulla Alansari. PhD thesis, Universiti Malaya. http://studentsrepo.um.edu.my/15083/
score 13.188404