Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol

被引:67
|
作者
Napiah, Mohamad Nazrin [1 ]
Bin Idris, Mohd Yamani Idna [1 ]
Ramli, Roziana [1 ]
Ahmedy, Ismail [1 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur 50603, Malaysia
来源
IEEE ACCESS | 2018年 / 6卷
关键词
Internet of Things; security; machine learning; compression header; 6LoWPAN; RPL; routing attack; ANOMALY DETECTION; SENSOR NETWORKS; INTERNET; THINGS;
D O I
10.1109/ACCESS.2018.2798626
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Prior 6LoWPAN intrusion detection system (IDS) utilized several features to detect various malicious activities. However, these IDS methods only detect specific attack but fails when the attacks are combined. In this paper, we propose an IDS known as compression header analyzer intrusion detection system (CHA-IDS) that analyzes 6LoWPAN compression header data to mitigate the individual and combination routing attacks. CHA-IDS is a multi-agent system framework that capture and manage raw data for data collection, analysis, and system actions. The proposed CHA-IDS utilize best first and greedy stepwise with correlation-based feature selection to determine only significant features needed for the intrusion detection. These features are then tested using six machine learning algorithms to find the best classification method that able to distinguish between an attack and non-attack and then from the best classification method, we devise a rule to be implemented in Tmote Sky. To ensure the reliability of our proposed method, we evaluate the CHA-IDS with three types of combination attacks known as hello flood, sinkhole, and wormhole. We also compare our results in term of accuracy of detection, energy overhead, and memory consumption with the prior 6LoWPAN-IDS implementation such as SVELTE and Pongle's IDS. The results show that CHA-IDS performs better than the aforementioned methods with 99% true positive rate and consumed low energy overhead and memory that fit in constrained device such Tmote Sky.
引用
收藏
页码:16623 / 16638
页数:16
相关论文
共 31 条
  • [21] Intrusion Detection Systems in RPL-Based 6LoWPAN: A Systematic Literature Review
    Pasikhani, Aryan Mohammadi
    Clark, John A.
    Gope, Prosanta
    Alshahrani, Abdulmonem
    IEEE SENSORS JOURNAL, 2021, 21 (11) : 12940 - 12968
  • [22] 6MID:Mircochain based Intrusion Detection for 6LoWPAN based IoT networks
    Patel, Himanshu B.
    Jinwala, Devesh C.
    12TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT) / THE 4TH INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40) / AFFILIATED WORKSHOPS, 2021, 184 : 929 - 934
  • [23] Evaluation of Network Intrusion Detection Systems for RPL Based 6LoWPAN Networks in IoT
    Abhishek Verma
    Virender Ranga
    Wireless Personal Communications, 2019, 108 : 1571 - 1594
  • [24] Evaluation of Network Intrusion Detection Systems for RPL Based 6LoWPAN Networks in IoT
    Verma, Abhishek
    Ranga, Virender
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (03) : 1571 - 1594
  • [25] RESEARCH ON CONFORMANCE TESTING METHOD FOR 6LoWPAN NEIGHBOR DISCOVERY PROTOCOL AND SYSTEM IMPLEMENTATION
    Xu, Min
    Huang, Xiaohong
    2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems (CCIS), 2014, : 738 - 743
  • [26] 6LoWPAN Protocol Based Infrared Sensor Network Human Target Locating System
    Yang, Bo
    Liu, Fuhuang
    Yuan, Lulu
    Zhang, Yukexin
    PROCEEDINGS OF THE 15TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA 2020), 2020, : 1773 - 1779
  • [27] Implementation of Neighbor Discovery Protocol as Communication Initiator Between Sensor Nodes and IoT Middleware in 6LoWPAN Networks
    Pramukantoro, Eko Sakti
    Bakhtiar, Fariz Andri
    Pambudhi, Heru Dias
    Bhawiyuga, Adhitya
    PROCEEDINGS OF 2019 4TH INTERNATIONAL CONFERENCE ON SUSTAINABLE INFORMATION ENGINEERING AND TECHNOLOGY (SIET 2019), 2019, : 191 - 195
  • [28] Exploiting Machine Learning Technique for Attack Detection in Intrusion Detection System (IDS) Based on Protocol
    Aladesote, Olomi Isaiah
    Fakoya, Johnson Tunde
    Agbelusi, Olutola
    ADVANCES IN INFORMATION SYSTEMS, ARTIFICIAL INTELLIGENCE AND KNOWLEDGE MANAGEMENT, ICIKS 2023, 2024, 486 : 158 - 167
  • [29] A Bayesian Rule Learning Based Intrusion Detection System for the MQTT Communication Protocol
    Liu, Qi
    Keller, Hubert B.
    Hagenmeyer, Veit
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [30] Ada-IDS: AdaBoost Intrusion Detection System for ICMPv6 based Attacks in Internet of Things
    Anitha, A. Arul
    Arockiam, L.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (11) : 499 - 506