4.8 Article

A Lightweight Intrusion Detection for Sybil Attack Under Mobile RPL in the Internet of Things

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 7, Issue 1, Pages 379-388

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2019.2948149

Keywords

Internet of Things; Intrusion detection; Routing protocols; Topology; Routing; Mathematical model; Accuracy; Internet of Things (IoT); intrusion detection; lightweight security; mobility; RPL; Sybil attack

Ask authors/readers for more resources

The routing protocol for low-power and lossy networks (RPLs) is a standard routing protocol for resource-constrained devices in the Internet of Things (IoT) networks. Primarily, RPL can support a dynamic range of mobility among the nodes in the network, which becomes a great demand now for real-time applications. At the same time, RPL is much vulnerable to various security attacks because of its resource-constrained nature. Such security attacks might cause severe threats and destructive behavior inside the network. In this article, we primarily focus on the Sybil attack, where an attacker claims multiple illegitimate identities either by fabricating or compromising the nodes. Also, in this type of attack, a single adversary is required to control multiple legitimate nodes in the network, and thereby, the adversary node saves the physical resources. In this article, we propose a novel artificial bee colony (ABC)-inspired mobile Sybil attack modeling and lightweight intrusion detection algorithm for the Sybil attack in mobile RPL. Moreover, we considered three different categories of Sybil attack based on its behavior, and we analyze the performance of the RPL under the Sybil attack in terms of packet delivery ratio, control traffic overhead, and energy consumption. Also, we examine the performance of the proposed algorithm in terms of accuracy, sensitivity, and specificity.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Engineering, Electrical & Electronic

An Energy-Efficient Intelligent Framework of UAV-Enhanced Vehicular Networks: Open Problems and a Case Study

Shu Fu, Liuguo Yin, Chunxiao Jiang, Abbas Jamalipour

IEEE VEHICULAR TECHNOLOGY MAGAZINE (2022)

Article Chemistry, Analytical

An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions

Mohamed Abdel-Basset, Abduallah Gamal, Karam M. Sallam, Ibrahim Elgendi, Kumudu Munasinghe, Abbas Jamalipour

Summary: As cyber-attacks become more complex, resolving the functional concerns of intrusion-detection systems (IDSs) becomes difficult, which risks compromising the credibility of security services. Different organizations employ various strategies and technologies to safeguard system credibility, but the effectiveness of IDSs is still not fully recognized.

SENSORS (2022)

Article Computer Science, Information Systems

Incentive-Based Caching and Communication in a Clustered D2D Network

Komal S. Khan, Adeena Naeem, Abbas Jamalipour

Summary: This article introduces edge caching and incentive mechanisms for D2D communication. By clustering users with similar interests and optimizing cache hit probability, the performance of D2D communication can be improved. Additionally, a monetary incentive-based mechanism is proposed to increase user participation.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Engineering, Electrical & Electronic

Energy-Efficient Resource Allocation for UAV-Assisted Vehicular Networks With Spectrum Sharing

Weijing Qi, Qingyang Song, Lei Guo, Abbas Jamalipour

Summary: Vehicular networks play a crucial role in the era of autonomous driving, with UAVs showing potential to assist in service provision while facing challenges of energy consumption and QoS. Joint optimization of factors such as content placement and spectrum allocation can enhance UAVs' energy efficiency and meet user demands.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2022)

Article Engineering, Electrical & Electronic

Federated Multi-Agent Deep Reinforcement Learning for Resource Allocation of Vehicle-to-Vehicle Communications

Xiang Li, Lingyun Lu, Wei Ni, Abbas Jamalipour, Dalin Zhang, Haifeng Du

Summary: This paper investigates a novel approach for resource allocation in vehicle-to-vehicle (V2V) communications, utilizing federated multi-agent deep reinforcement learning and federated learning. The proposed method optimizes both channel selection and power control, ensuring reliability and delay requirements of V2V communication while maximizing the transmit rates of cellular links.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2022)

Article Engineering, Electrical & Electronic

Dynamic Routing Protocol Selection in Multi-Hop Device-to-Device Wireless Networks

Mahrokh Abdollahi, Sepehr Ashtari, Mehran Abolhasan, Negin Shariati, Justin Lipman, Abbas Jamalipour, Wei Ni

Summary: This paper proposes a multi-protocol framework for the dynamic deployment and switching of multiple MD2D routing protocols in mobile wireless networks. The performance of two multi-hop routing protocols is studied in different network conditions, and a multiple-criteria decision-making approach is developed to choose the most suitable protocol.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2022)

Article Engineering, Electrical & Electronic

Joint Power Allocation and Rate Control for Rate Splitting Multiple Access Networks With Covert Communications

Nguyen Quang Hieu, Dinh Thai Hoang, Dusit Niyato, Diep N. Nguyen, Dong In Kim, Abbas Jamalipour

Summary: Rate Splitting Multiple Access (RSMA) is a new technique to enhance transmission rate in multiple access networks by splitting and transmitting messages at different rates. This paper proposes a stochastic optimization framework for adaptively adjusting power and transmission rates, maximizing system sum-rate and fairness in the presence of an adversary. Additionally, a highly effective learning algorithm is developed to find the optimal policy without complete information about the environment. Simulation results demonstrate the effectiveness of the proposed scheme in achieving non-saturated transmission rates and positive covert transmission rates.

IEEE TRANSACTIONS ON COMMUNICATIONS (2023)

Article Automation & Control Systems

Distributed Resource Optimization With Blockchain Security for Immersive Digital Twin in IIoT

Jing Song, Ya Kang, Qingyang Song, Lei Guo, Abbas Jamalipour

Summary: Virtual reality-embedded digital twin (VR-DT) service combines digital twin with virtual reality to visualize the digital representation of real-world production, enhancing the digital transformation of the manufacturing industry in the Industrial Internet of Things (IIoT). To address the data-driven, computing-intensive, and security-sensitive challenges of the VR-DT service, we propose a blockchain-based distributed resource allocation scheme to improve the average Quality of Service (QoS) concerning service delay and transaction throughput. We formulate the joint optimization problem of channel assignment, subframe configuration, computing capacity allocation, and block size adjustment and develop a decentralized multiagent compound-action actor-critic algorithm to solve it. Simulation results demonstrate the effectiveness of our scheme in improving the average QoS of the VR-DT services.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Editorial Material Engineering, Electrical & Electronic

Editorial Message From the Editor-in-Chief

Abbas Jamalipour

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Computer Science, Information Systems

Efficient and Lightweight Convolutional Networks for IoT Malware Detection: A Federated Learning Approach

Mohamed Abdel-Basset, Hossam Hawash, Karam M. Sallam, Ibrahim Elgendi, Kumudu Munasinghe, Abbas Jamalipour

Summary: In this study, a new federated malware detection paradigm called FED-MAL is introduced to collaboratively train multiple distributed edge devices to detect malware. FED-MAL transforms malware binaries into an image format and uses a compact convolutional model named AM-NET to learn malware patterns. Experimental evaluation shows that FED-MAL is efficacious, reliable, expandable, generalizable, and communication efficient on publicly available malware datasets.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Deep-Reinforcement-Learning-Driven Secrecy Design for Intelligent-Reflecting-Surface-Based 6G-IoT Networks

Rabbia Saleem, Wei Ni, Muhammad Ikram, Abbas Jamalipour

Summary: In order to meet the higher bandwidth and massive connectivity demands of the sixth-generation (6G) wireless communication, intelligent reflecting surface (IRS) has become an efficient solution to improve data rates, coverage range, and signal blockages. This article proposes an IRS-based model to address network security issues in the presence of trusted-untrusted device diversity, maximizing secrecy rates for trusted devices while maintaining Quality of Service (QoS) for all legitimate devices. A deep deterministic policy gradient (DDPG) algorithm is utilized for joint optimization of active and passive beamforming matrices. Experimental results demonstrate a significant improvement in secrecy rates and throughput performance compared to benchmark cases, validating the effectiveness of the proposed model.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Engineering, Electrical & Electronic

Visual Camouflage and Online Trajectory Planning for Unmanned Aerial Vehicle-Based Disguised Video Surveillance: Recent Advances and a Case Study

Shuyan Hu, Xin Yuan, Wei Ni, Xin Wang, Abbas Jamalipour

Summary: The applications of UAV-enabled visual monitoring include public security, nature resilience, and disaster rescue. This article discusses the types and technical challenges of visual camouflage for UAV-based surveillance, and presents a new control framework for planning and refining the trajectory of the UAV monitor online. Simulations validate the merits of the new framework over the benchmark approach with no camouflage.

IEEE VEHICULAR TECHNOLOGY MAGAZINE (2023)

Article Computer Science, Information Systems

A CNN-LSTM-Based Fusion Separation Deep Neural Network for 6G Ultra-Massive MIMO Hybrid Beamforming

Rafid Umayer Murshed, Zulqarnain Bin Ashraf, Abu Horaira Hridhon, Kumudu Munasinghe, Abbas Jamalipour, Md. Farhad Hossain

Summary: In this study, we investigate the use of deep neural networks (DNN) to tackle complex beamforming challenges in the sixth-generation (6G) cellular networks. By designing a sophisticated 1D CNN-LSTM fusion-separation scheme, we achieve beamforming performance comparable to the Alt-Min algorithm while significantly reducing computational cost.

IEEE ACCESS (2023)

Article Computer Science, Information Systems

A Survey on Mobility of Edge Computing Networks in IoT: State-of-the-Art, Architectures, and Challenges

Forough Shirin Abkenar, Parisa Ramezani, Saeid Iranmanesh, Sarumathi Murali, Donpiti Chulerttiyawong, Xinyu Wan, Abbas Jamalipour, Raad Raad

Summary: This paper presents a comprehensive survey on mobile ECNs, classifying them into four categories and providing detailed descriptions for each category, including node types, network architectures, methods and algorithms, and challenges. The paper also discusses integrated architectures and future research directions.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2022)

Proceedings Paper Telecommunications

Frequency Hopping Sequence Determination Using Inter-Pulse Interval for Human Body Interface and Control Systems

Donpiti Mick Chulerttiyawong, Abbas Jamalipour

Summary: This paper discusses the security of wearable and implantable devices for human body interface and control systems. It proposes algorithms that use physiological biometrics, such as the inter-pulse interval, to mitigate jamming attacks on communication links. The results show the feasibility of some algorithms and identify potential improvements.

IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022) (2022)

No Data Available