Investigations on Information Solicitation and Version Number Attacks in Internet of Things

Investigations on Information Solicitation and Version Number Attacks in Internet of Things

Abstract:

Self-organizing maps (SOMs) have been widely known for resolving a variety of detection and classification problems. It is a special kind of machine learning technique that sorts out the issue without any supervision. On the other hand, there is a key protocol named routing protocol for low power and lossy networks (RPL), i.e., used in the low power networks. There are several security attacks on RPL including the destination-oriented directed acyclic graph (DODAG) information solicitation (DIS) and the version number attacks. It would be vital to use SOM for sensing such attacks. In this article, SOM based scheme has been deployed to sense the DIS and the version number attacks in RPL based Internet of Things (IoT) networks. These attacks have been applied to three scenarios. Two scenarios implemented one attack each from the aforesaid attacks. The third scenario has been analyzed with both the attacks jointly. The proposed approach uniquely sensed the security attacks in all the scenarios.