Mitigating the Impact of IoT Routing Attacks on Power Consumption in IoT Healthcare Environment using Convolutional Neural Network

Full Text (PDF, 967KB), PP.11-29

Views: 0 Downloads: 0

Author(s)

Samah Osama M. Kamel 1,* Sanaa Abou Elhamayed 1

1. Electronics Research Institute, Cairo, Egypt

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2020.04.02

Received: 14 May 2020 / Revised: 9 Jun. 2020 / Accepted: 24 Jun. 2020 / Published: 8 Aug. 2020

Index Terms

IoT, Healthcare, RPL Protocol, SMOTE, Convolutional Neural Network

Abstract

IoT provides big contribution to healthcare for elderly care at home. There are many attacks in IoT healthcare network which may destroy the entire network. A propose a framework may be produced an efficient treatment for elderly care at home with low power consumption. A framework contains three phases names; medical data collection layer, routing and network layer and medical application layer. It intends to increase security performance through prediction and detection attacks in real time. Cooja simulator is used for generating real-time IoT routing datasets including normal and malicious motes based on different types of power. The generated IoT routing dataset using data augmentation (SMOTE) to increase the size of dataset. The preprocessing of the generating dataset using three methods of feature selection which are weight by rule, Chi-Squared and weight by tree importance using random forest reduce noise and over-fitting. A proposed model uses convolution neural network (CNN) to detect and predict IoT routing attacks to identify suspicious network traffic. A number of studies have been carried out in this area, but the issue of the extent of the impact of attacks on energy consumption is an interesting topic. Attacks can affect the network completely, in particular on the power consumption of smart devices. Therefore; the main target of this research is detecting and predicting different types of IoT routing attacks which have impact on power consumption and destroy the entire network. This work analyzes the impact of IoT routing attacks on different power consumption using CNN to achieve low power consumption by detecting different types of routing attacks. The experimental results show CNN can detect different types of attacks that have a bad impact on power consumption. It achieves high accuracy, precision, recall, correlation and low rate in error and logistic loss and this leads to decrease power consumption.

Cite This Paper

Samah Osama M. Kamel, Sanaa Abou Elhamayed, "Mitigating the Impact of IoT Routing Attacks on Power Consumption in IoT Healthcare Environment using Convolutional Neural Network", International Journal of Computer Network and Information Security(IJCNIS), Vol.12, No.4, pp.11-29, 2020. DOI:10.5815/ijcnis.2020.04.02

Reference

[1]S. M. Riazul Islam, Daehan Kwak, MD. Humaun Kabir, Mahmud Hossain, Kyung-Sup Kwak, “The Internet of Things for Health Care: A Comprehensive Survey”, IEEE Access, vol. 3, pp. 678 – 708, 2015. “DOI: 10.1109/ACCESS.2015.2437951”
[2]Stephanie B. Baker, Wei Xiang, Ian Atkinson, “Internet of Things for Smart Healthcare: Technologies”, Challenges and Opportunities”, IEEE Access, vol. 5, pp. 26521 – 26544, 2017. “DOI: 10.1109/ACCESS.2017.2775180”
[3]M. Teresa Villalba, Manuel de Buenaga, Diego Gachet, Fernando Aparicio, “Security Analysis of an IoT Architecture for Healthcare”, In: Mandler B. et al. (eds) Internet of Things. IoT Infrastructures, IoT360, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer, Cham, vol 169, pp. 454–460, 2016. “DOI: 10.1007/978-3-319-47063-4_48”
[4]Pallavi Sethi and Smruti R. Sarangi, “Internet of Things: Architectures, Protocols, and Applications”, Journal of Electrical and Computer Engineering, vol. 2017, pp. 1-25, 2017. “DOI: 10.1155/2017/9324035”
[5]Mustafa Abdullah Azzawi, Rosilah Hassan and Khairul Azmi Abu Bakar, “A Review on Internet of Things (IoT) in Healthcare”, International Journal of Applied Engineering Research, vol. 11, no. 20, pp. 10216-10221, 2016.
[6]Aaditya Jain, Bhupendra Kumar Soni, “Secure Modern Healthcare System Based on Internet of Things and Secret Sharing of IoT Healthcare Data”, International Journal Advanced Networking and Applications, vol. 08, Issue 06, pp. 3283-3289, 2017.
[7]Shantha Mary Joshitta R, Arockiam L, “EPC Based Authentication of Devices in the Smart Healthcare System”, International Journal of Electrical Electronics & Computer Science Engineering, vol. 4, Issue 4, pp. 6-11, 2017.
[8]Inayat Ali, Sonia Sabir, Zahid Ullah, “Internet of Things Security, Device Authentication and Access Control: A Review”, International Journal of Computer Science and Information Security (IJCSIS), vol. 14, no. 8, pp. 1-11, 2016.
[9]Hezam Akram Abdul-Ghani, Dimitri Konstantas, Mohammed Mahyoub, “A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model”, International Journal of Advanced Computer Science and Applications (IJACSA), vol. 9, no. 3, pp. 355-373, 2018.
[10]Usama Salama, Lina Yao, Hyeyoung Paik, “An Internet of Things Based Multi-LevelPrivacy-Preserving Access Control for Smart Living”, Informatics, vol.5, no. 23, pp. 1-18, 2018. “DOI: 10.3390/informatics5020023”
[11]Ruan de A. C. Mello, Admilson de R. L. Ribeiro, Fernando M. de Almeida, Edward D. Moreno, “Mitigating Attacks in the Internet of Things with a Self-protecting Architecture”, The Thirteenth Advanced International Conference on Telecommunications (AICT 2017), Venice, Italy, pp. 14-19, June 25 – 29 2017.
[12]Shantha Mary Joshitta R, L. Arockiam, “A Neoteric Authentication Scheme for IoT Healthcare System”, International Journal of Engineering Sciences & Research Technology (IJESRT), vol. 5, pp. 296-303, June 25 – 29 2017. “DOI: 10.5281/Zenodo.192911”
[13]Abhishek Verma, Virender Ranga, “Analysis of Routing Attacks on RPL based 6LoWPAN Networks”, International Journal of Grid and Distributed Computing, vol. 11, no. 8, pp.43-56, 2018.
[14]Anthéa Mayzaud, Rémi Badonnel, Isabelle Chrisment, “A Taxonomy of Attacks in RPL-based Internet of Things”, International Journal of Network Security, vol.18, no.3, pp.459-473, 2016.
[15]Sim Ahmad Alabsi, Mohammed Anbar, Selvakumar anikam, “A Comprehensive Review on Security Attacks in Dynamic Wireless Sensor Networks based on RPL protocol”, International Journal of Pure and Applied Mathematics, vol. 118, vo. 20, pp. 653-667, 2018.
[16]Bayu Adhi Tama and Kyung-Hyune Rhee, “Attack Classification Analysis of IoT Network via Deep Learning Approach”, Information & Communication Technology Evolution (ReBICTE), vol. 3, no. 15, pp. 1-9, 2017. “DOI: 10.22667/ReBiCTE.2017.11.15.015”
[17]Liang Xiao, Xiaoyue Wan, Xiaozhen Lu, Yanyong Zhang, Di Wu, “IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security?”, IEEE Signal Processing Magazine, vol. 35, Issue 5, , pp. 41 – 49, 2018. “DOI: 10.1109/MSP.2018.2825478”
[18]Furkan Yusuf Yavuz, Devrim ÜNAL, Ensar GÜL, “Deep Learning for Detection of Routing Attacks in the Internet of Things”, International Journal of Computational Intelligence Systems, vol. 12, pp. 39-58, 2018.
[19]Jean Caminha, Angelo Perkusich, Mirko Perkusich, “A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things”, Hindawi, Security and Communication Networks, vol. 2018, pp. 1-10, 2018.
[20]Ghada Glissa, Abderrezak Rachedi, Aref Meddeb, “A secure routing protocol based on RPL for Internet of Things”, 2016 IEEE Global Communications Conference (GLOBECOM), 4-8 Dec. 2016, Washington, DC, USA, pp. 1-6. “DOI: 10.1109/GLOCOM.2016.7841543”
[21]Nour Moustafa, Benjamin Turnbull, Kim-Kwang Raymond Choo, “An Ensemble Intrusion Detection Technique based on proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things”, IEEE Internet of Things Journal, pp. 1-16, 2018. “DOI: 10.1109/JIOT.2018.2871719”
[22]Traian Avram, Seungchan Oh, Salim Hariri, “Analyzing Attacks in Wireless Ad Hoc Network with Self-Organizing Maps”, Fifth Annual Conference on Communication Networks and Services Research (CNSR '07), 14-17 May 2007, Canada, pp. 166 – 175. “DOI: 10.1109/CNSR.2007.15”
[23]Mohamad Nazrin Napiah , Mohd Yamani Idna Bin Idris, Roziana Ramli, Ismail Ahmedy, “Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol”, IEEE Access, Special Section on Security Analytics and Intelligence for Cyber Physical Systems, vol. 6, pp. 16623- 16638, 2018. “DOI: 10.1109/ACCESS.2018.2798626”
[24]Abebe Abeshu Diro, Naveen Chilamkurti, “Distributed attack detection scheme using deep learning approach for Internet of Things”, Future Generation Computer Systems, vol. 82, pp. 761-768, 2018. “DOI: 10.1016/j.future.2017.08.043”
[25]Sophia Kaplantzis, Alistair Shilton, Nallasamy Mani, Y. Ahmet S¸ ekercio˘ glu, “Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines”, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information, 3-6 Dec. 2007, Melbourne, Qld., Australia, pp. 335 – 340. “DOI: 10.1109/ISSNIP.2007.4496866”
[26]Faiza Medjek, Djamel Tandjaoui, Imed Romdhani, Nabil Djedjig, “Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks”, 2017 IEEE Trustcom/BigDataSE/ICESS, 1-4 Aug. 2017, Sydney, NSW, Australia, “DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.351”
[27]Pavan Pongle, Gurunath Chavan, “Real Time Intrusion and Wormhole Attack Detection in Internet of Things”, International Journal of Computer Applications, Vol. 121 No. 9, pp. 1-9, 2015.
[28]Anhtuan Le, Jonathan Loo, Yuan Luo, Aboubaker Lasebae, “Specification-based IDS for securing RPL from topology attacks”, 2011 IFIP Wireless Days (WD), 10-12 Oct. 2011, Niagara Falls, ON, Canada, pp. 1-3. “DOI:10.1109/WD.2011.6098218”
[29]Elike Hodo, Xavier Bellekens, Andrew Hamilton, Pierre-Louis Dubouilh, Ephraim Iorkyase, Christos Tachtatzis and Robert Atkinson, “Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System”, 2016 International Symposium on Networks, Computers and Communications (ISNCC), 11-13 May 2016,, Yasmine Hammamet, Tunisia, pp. 1-6. “DOI:10.1109/ISNCC.2016.7746067”
[30]Xiaolei Liu, Xiaosong Zhang, Nadra Guizani, Jiazhong Lu, Qingxin Zhu, Xiaojiang Du, “TLTD: A Testing Framework for Learning-Based IoT Traffic Detection Systems”, Sensors, vol. 18, no. 8, pp. 1-13, 2018. “DOI:10.3390/s18082630”
[31]Ashutosh Bandekar, Ahmad Y. Javaid, “Cyber-attack Mitigation and Impact Analysis for Low-power IoT Devices”, 2017 IEEE 7th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER), 31 July-4 Aug. 2017, Honolulu, HI, USA, pp. 1631 – 1636. “DOI: 10.1109/CYBER.2017.8446380”
[32]Yang Xin, Lingshuang Kong, Zhi Liu, Yuling Chen, Yanmiao L, Hongliang Zhu, Mingcheng Gao, Haixia Hou1, Chunhua Wang, “Machine Learning and Deep Learning Methods for Cybersecurity”, IEEE Access, vol. 6, pp. 35365 – 35381, 2018. “DOI: 10.1109/ACCESS.2018.2836950”
[33]Nadia Chaabouni, Mohamed Mosbah, Akka Zemmari, Cyrille Sauvignac, Parvez Faruki, “Network Intrusion Detection for IoT Security based on Learning Techniques”, IEEE Communications Surveys & Tutorials, pp. 1-32, 2019. “DOI: 10.1109/COMST.2019.2896380”
[34]Divya Sharma, Ishani Mishra, Sanjay Jain, “A Detailed Classification of Routing Attacks against RPL in Internet of Things”, International Journal of Advance Research, Ideas and Innovations in Technology, vol. 3 Issue 1, pp. 692-703, 2017.
[35]Binbin Chen, Yuan Li, and Daisuke Mashima, “Analysis and Enhancement of RPL under Packet Drop Attacks”, 2018 10th International Conference on Communication Systems & Networks (COMSNETS), 3-7 January 2018, Bengaluru, India, pp. 167 – 174. “DOI: 10.1109/COMSNETS.2018.8328194”
[36]Mahmood Alzubaidi, Mohammed Anbar, Samer Al-Saleem, Shadi Al-Sarawi, Kamal Alieyan, “Review on Mechanisms for Detecting Sinkhole Attacks on RPLs”, 2017 8th International Conference on Information Technology (ICIT), 17-18 May 2017, Amman, Jordan, pp. 369 – 374. “DOI: 10.1109/ICITECH.2017.8080028”
[37]LinusWallgren, Shahid Raza, Thiemo Voigt, “Routing Attacks and Countermeasures in the RPL-Based Internet of Things”, Hindawi Publishing Corporation, International Journal of Distributed Sensor Networks, vol. 2013, pp. 1-11, 2013.
[38]Patrick Olivier Kamgueua, b Emmanuel Nataf, Thomas Djotio Ndie, “Survey on RPL enhancements: a focus on topology, security and mobility”, Elsevier, Computer Communications, vol.120, pp.10-21, 2018. “DOI: 10.1016/j.comcom.2018.02.011”
[39]Jun Jiang and Yuhong Liu and Behnam Dezfouli, “A Root-based Defense Mechanism Againt RPL Blackhole Attacks in Internet of Thing Networks”, Proceedings, APSIPA Annual Summit and Conference 2018, 12-15 November 2018, Hawaii, pp. 1194- 1199
[40]Pericle Perazzo, Carlo Vallati, Giuseppe Anastasi, and Gianluca Dini, “DIO Suppression Attack Against Routing in the Internet of Things”, IEEE Communications Letters, vol. 21, no. 11, pp. 2524- 2527, 2017.
[41]R. Stephen, Dr. L. Arockiam, “RIAIDRPL: Rank Increased Attacks (RIA) Identification Algorithm for Avoiding Loop in the RPL DODAg”, International Journal of Pure and Applied Mathematics, vol. 119, no. 16, pp. 1203-1210, 2018.
[42]Firoz Ahmed, Young-Bae Ko, “Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks”, Security and Communication Networks, vol. 9, pp. 5143–5154, 2016. “DOI: 10.1002/sec.1684”
[43]Karishma Chugh, Aboubaker Lasebae, Jonathan Loo, “Case Study of a Black Hole Attack on 6LoWPAN-RPL”, The Sixth International Conference on Emerging Security Information, Systems and Technologies, August 19-24, 2012, Rome, Italy, pp. 157-162, 2012.
[44]OlivierBrun,YonghuaYin, ErolGelenbe, “Deep Learning with Dense Random Neural Network for Detecting Attacks against IoT-connected Home Environments”, Procedia Computer Science, vol. 134, pp. 458-463, 2018.
[45]Sunil Bhutada,Preeti Bhutada, “Applications of Artificial Intelligence in Cyber Security”, International Journal of Engineering Research in Computer Science and Engineering (IJERCSE), vol 5, Issue 4, pp. 214-219, 2018.
[46]Preeti Mishra, Vijay Varadharajan, Uday Tupakula, mmanuel S. Pilli, “A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection”, IEEE Communications Surveys & Tutorials, pp. 1-46, 2018. “DOI: 10.1109/COMST.2018.2847722”
[47]Amrita Ghosal, Subir Halder, “Intrusion Detection in Wireless Sensor Networks: Issues, Challenges and Approaches”, Springer, Wireless Networks and Security, pp. 329–367, 2013. “DOI: 10.1007/978-3-642-36169-2_10”
[48]Dharmini Shreenivas, Shahid Raza, Thiemo Voigt, “Design Of Intrusion Detection System For Dos Attack In 6lowpan And RPL Based IoT Network”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol. 8, Issue-11, pp. 3840-3844, 2019.
[49]Bayu Adhi Tama, Kyung-Hyune Rhee, “Attack Classification Analysis of IoT Network via Deep Learning Approach”, Information & Communication Technology Evolution (ReBICTE), vol. 3, no. 15, pp. 1-10, 2017.
[50]Dave Eastman, Sathish A.P Kumar, “A Simulation Study to Detect Attacks on Internet of Things”, 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Int. Conf. on Big Data Intelligence and Computing and Cyber Science and Technology Congress, 6-10 Nov. 2017, Orlando, FL, USA, pp. 645 – 650. “DOI. 10.1109/DASC-PICom-DataCom-CyberSciTec.2017.113”
[51]Mohamed Lamine Messai, “Classification of Attacks in Wireless Sensor Networks”, International Congress on Telecommunication and Application’14, University of A.MIRA Bejaia, 23-24 April 2014, Algeria, pp. 1-5
[52]Vasileios Iosifidis, Eirini Ntoutsi, “Dealing with Bias via Data Augmentation in Supervised Learning Scenarios”, Proceedings of the International Workshop on Bias in Information, Algorithms, and Systems co-located with 13th International Conference on Transforming Digital Worlds (iConference 2018), March 25th, 2018, Sheffield, United Kingdom, pp. 24-29.
[53]Sebastien C. Wong, Adam Gatt, Victor Stamatescu, “Understanding data augmentation for classification: when to warp?”, 2016 International Conference on Digital Image Computing: Techniques and Applications (DICTA), 30 Nov.-2 Dec. 2016. , Gold Coast, QLD, Australia. DOI: 10.1109/DICTA.2016.7797091
[54]Kadhim B.S. Al Janabi, Rusul Kadhim, “Data Reduction Techniques: A Comparative Study for Attribute Selection Methods”, International Journal of Advanced Computer Science and Technology, vol. 8, no. 1, pp. 1-13, 2018.
[55]Pinar Yildirim, “Filter Based Feature Selection Methods for Prediction of Risks in Hepatitis Disease”, International Journal of Machine Learning and Computing, vol. 5, no. 4, pp. 258- 263, 2015.
[56]Pan Wang, Feng Ye, Xuejiao Chen, Yi Qian, “DataNet: Deep Learning based Encrypted Network Traffic Classification in SDN Home Gateway”, IEEE Access, vol. 4, pp. 1-12, 2018.
[57]David Gil, Magnus Johnsson, Higinio Mora, Julian SzymaNski, “Review of the Complexity of Managing Big Data of the Internet of Things”, Wiley, Hindawi, Complexity, vol. 2019, pp. 1-12, 2019. “DOI: https://doi.org/10.1155/2019/4592902”
[58]Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, Ruslan Salakhutdinov, “Dropout: A Simple Way to Prevent Neural Networks from Overfitting”, Journal of Machine Learning Research, vol. 15, pp. 1929-1958, 2014.
[59]Saad Albawi, Tareq Abed Mohammed, Saad Al-Zawi, “Understanding of a convolutional neural network”, 2017 International Conference on Engineering and Technology (ICET), 21-23 Aug. 2017, Antalya, Turkey, pp. 1-7. “DOI: 10.1109/ICEngTechnol.2017.8308186”
[60]Sunil Kumar, Ilyoung Chong, “Correlation Analysis to Identify the Effective Data in Machine Learning: Prediction of Depressive Disorder and Emotion States”, International Journal of Environmental Research and Public Health, vol. 15, no. 12, pp. 1-24, 2018.