TY - JOUR
T1 - Intrusion Detection Using Rule Based Approach in RPL Networks
AU - Belavagi, Manjula C.
AU - Muniyal, Balachandra
N1 - Publisher Copyright:
© (2023), (International Association of Engineers). All Rights Reserved.
PY - 2023
Y1 - 2023
N2 - Day by day applications of wireless sensor networks is increasing in areas like environmental monitoring, agriculture, defence, Internet of Things. These networks use IPv6 based protocol namely Routing Protocol for Low power and Lossy networks(RPL). The sensor nodes have limited resources. They carry sensitive information and are placed in the hard to reach areas. Intrusion Detection System (IDS) plays an important role in providing the security for such systems. An IDS model is designed using Artificial Neural Networks, Logistic Regression, Support Vector Machine, and Random Forest techniques are analyzed on simulated data, WSN-DS, and IEEE-IoT-IDS to identify the suitable model for rule generation. Later, multiple attacks are identified using Rule Based Approach. The rule generation is carried out at the base station in order to utilize the sensor node’s energy efficiently. Experimental results show that the proposed method gives good results in the identification of multiple intrusions.
AB - Day by day applications of wireless sensor networks is increasing in areas like environmental monitoring, agriculture, defence, Internet of Things. These networks use IPv6 based protocol namely Routing Protocol for Low power and Lossy networks(RPL). The sensor nodes have limited resources. They carry sensitive information and are placed in the hard to reach areas. Intrusion Detection System (IDS) plays an important role in providing the security for such systems. An IDS model is designed using Artificial Neural Networks, Logistic Regression, Support Vector Machine, and Random Forest techniques are analyzed on simulated data, WSN-DS, and IEEE-IoT-IDS to identify the suitable model for rule generation. Later, multiple attacks are identified using Rule Based Approach. The rule generation is carried out at the base station in order to utilize the sensor node’s energy efficiently. Experimental results show that the proposed method gives good results in the identification of multiple intrusions.
UR - http://www.scopus.com/inward/record.url?scp=85170211467&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85170211467&partnerID=8YFLogxK
M3 - Article
AN - SCOPUS:85170211467
SN - 1819-656X
VL - 50
JO - IAENG International Journal of Computer Science
JF - IAENG International Journal of Computer Science
IS - 3
M1 - IJCS_50_3_21
ER -