A Lightweight Cooperative Intrusion Detection System for RPL-based IoT

The successful deployment of an Intrusion Detection System (IDS) in the Internet of Things (IoT) is subject to two primary criteria: the detection method and the deployment strategy. IDS schemes should take into account that IoT devices often have limited resources. Thus, IDS should be limited in de...

Full description

Saved in:
Bibliographic Details
Published inWireless personal communications Vol. 134; no. 4; pp. 2235 - 2258
Main Authors Azzaoui, Hanane, Boukhamla, Akram Zine Eddine, Perazzo, Pericle, Alazab, Mamoun, Ravi, Vinayakumar
Format Journal Article
LanguageEnglish
Published New York Springer US 01.02.2024
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN0929-6212
1572-834X
DOI10.1007/s11277-024-11009-2

Cover

Abstract The successful deployment of an Intrusion Detection System (IDS) in the Internet of Things (IoT) is subject to two primary criteria: the detection method and the deployment strategy. IDS schemes should take into account that IoT devices often have limited resources. Thus, IDS should be limited in devices’ memory and power usage. In this paper, we design, implement, and evaluate an effective cross-layer lightweight IDS scheme for the IoT (RPL-IDS). The proposed IDS scheme cooperates with the RPL routing protocol using its selected parents as distributed agents. A lightweight artificial neural network (ANN) model is deployed in these agents to detect malicious traffic and collaborates with a centralized system. According to the topology built by the Routing Protocol for Low-Power and Lossy Networks (RPL), these agents are automatically selected, i.e., the routers (parents) of the topology are chosen to act as IDS agents. We implemented RPL-IDS using the Contiki operating system and then comprehensively evaluated it with the Cooja simulator. Experimental results indicate that RPL-IDS is lightweight and can be deployed on devices with limited resources. Most state-of-the-art IDS schemes do not consider the limitation of resources of IoT devices, making them impractical for deployment in many IoT applications. Furthermore, the proposed RPL-IDS demonstrated one of the highest detection rates in the literature while incurring an insignificant energy overload, allowing for scalability in large-scale networks.
AbstractList The successful deployment of an Intrusion Detection System (IDS) in the Internet of Things (IoT) is subject to two primary criteria: the detection method and the deployment strategy. IDS schemes should take into account that IoT devices often have limited resources. Thus, IDS should be limited in devices’ memory and power usage. In this paper, we design, implement, and evaluate an effective cross-layer lightweight IDS scheme for the IoT (RPL-IDS). The proposed IDS scheme cooperates with the RPL routing protocol using its selected parents as distributed agents. A lightweight artificial neural network (ANN) model is deployed in these agents to detect malicious traffic and collaborates with a centralized system. According to the topology built by the Routing Protocol for Low-Power and Lossy Networks (RPL), these agents are automatically selected, i.e., the routers (parents) of the topology are chosen to act as IDS agents. We implemented RPL-IDS using the Contiki operating system and then comprehensively evaluated it with the Cooja simulator. Experimental results indicate that RPL-IDS is lightweight and can be deployed on devices with limited resources. Most state-of-the-art IDS schemes do not consider the limitation of resources of IoT devices, making them impractical for deployment in many IoT applications. Furthermore, the proposed RPL-IDS demonstrated one of the highest detection rates in the literature while incurring an insignificant energy overload, allowing for scalability in large-scale networks.
Author Perazzo, Pericle
Ravi, Vinayakumar
Azzaoui, Hanane
Alazab, Mamoun
Boukhamla, Akram Zine Eddine
Author_xml – sequence: 1
  givenname: Hanane
  orcidid: 0000-0002-7503-6775
  surname: Azzaoui
  fullname: Azzaoui, Hanane
  email: azzaoui.hanane1994@gmail.com
  organization: Laboratoire d’INtelligence Artificielle et des Technologies de l’Information (LINATI), University of Kasdi Merbah
– sequence: 2
  givenname: Akram Zine Eddine
  surname: Boukhamla
  fullname: Boukhamla, Akram Zine Eddine
  organization: Laboratoire d’INtelligence Artificielle et des Technologies de l’Information (LINATI), University of Kasdi Merbah
– sequence: 3
  givenname: Pericle
  surname: Perazzo
  fullname: Perazzo, Pericle
  organization: Department of Information Engineering, University of Pisa
– sequence: 4
  givenname: Mamoun
  surname: Alazab
  fullname: Alazab, Mamoun
  organization: Charles Darwin University
– sequence: 5
  givenname: Vinayakumar
  surname: Ravi
  fullname: Ravi, Vinayakumar
  organization: Center for Artificial Intelligence, Prince Mohammad Bin Fahd University
BookMark eNp9kE1LAzEQhoNUsFb_gKcFz9FMkt3tHku1WlhQtAdvIc1O6pZ2U5NU6b931xUED73MDMP7zMd7TgaNa5CQK2A3wFh-GwB4nlPGJYW2UVB-QoaQ5pyOhXwbkCEreEEzDvyMnIewZqxT8SGZTZKyXr3HL-xiMnVuh17H-hOTeRP9PtSuSe4woold9XoIEbeJdT55eS7pUgeskrlbXJBTqzcBL3_ziCxm94vpIy2fHubTSUmNgCJSqFIEiWYJWHHGRZXqNLdQcQ2ZFIZLzNKKFQhjY5nIMlZZwzMtrYTCMiZG5Lofu_PuY48hqrXb-6bdqASTWS5EPi5aFe9VxrsQPFq18_VW-4MCpjq7VG-Xau1SP3Yp3kLjf5Cpo-6ejl7Xm-Oo6NHQ7mlW6P-uOkJ9AzZhf-A
CitedBy_id crossref_primary_10_1080_23742917_2024_2447124
crossref_primary_10_1016_j_iot_2025_101531
crossref_primary_10_1016_j_comnet_2025_111185
crossref_primary_10_1007_s10462_024_10907_y
Cites_doi 10.1016/j.jisa.2021.102939
10.1016/j.icte.2019.12.001
10.3390/s18020651
10.5120/21565-4589
10.1007/s11227-018-2413-7
10.1109/JIOT.2021.3114540
10.1109/MCOM.2013.6400442
10.1016/j.cose.2014.02.006
10.1002/ett.3803
10.1016/j.icte.2021.04.012
10.1016/j.iot.2021.100435
10.1109/JSEN.2021.3100151
10.1016/j.micpro.2020.103741
10.1016/j.jnca.2018.05.015
10.1016/j.adhoc.2013.04.014
10.1109/JIOT.2020.2970501
10.1016/j.iot.2021.100442
10.1016/j.future.2021.07.013
10.1016/j.cose.2022.102693
10.1007/s12530-020-09364-z
10.1109/ACCESS.2021.3109081
10.1016/j.jnca.2018.10.021
10.1109/MCOM.2016.1600397CM
10.1016/j.jnca.2020.102630
10.3390/info7020025
10.1109/WiMOB.2011.6085374
10.1109/CCNC49032.2021.9369617
10.1109/MOBHOC.2009.5337011
10.1109/ISNCC.2016.7746067
10.1109/ICAASE51408.2020.9380127
10.1145/3447568.3448512
10.1109/ICIT52682.2021.9491694
10.1145/3055245.3055252
10.5220/0006639801080116
10.1109/ICISSEC.2016.7885840
10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0080
10.1109/ICMTMA.2014.57
10.1007/978-3-030-61746-2_16
10.1109/IntelliSys.2017.8324298
10.1007/978-3-030-15032-7_39
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
Copyright_xml – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
DBID AAYXX
CITATION
JQ2
DOI 10.1007/s11277-024-11009-2
DatabaseName CrossRef
ProQuest Computer Science Collection
DatabaseTitle CrossRef
ProQuest Computer Science Collection
DatabaseTitleList
ProQuest Computer Science Collection
DeliveryMethod fulltext_linktorsrc
Discipline Journalism & Communications
Engineering
EISSN 1572-834X
EndPage 2258
ExternalDocumentID 10_1007_s11277_024_11009_2
GroupedDBID -5B
-5G
-BR
-EM
-Y2
-~C
.4S
.86
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
2.D
203
28-
29R
29~
2J2
2JN
2JY
2KG
2KM
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACREN
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADYOE
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEGXH
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFLOW
AFQWF
AFWTZ
AFYQB
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMTXH
AMXSW
AMYLF
AMYQR
AOCGG
ARCEE
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BBWZM
BDATZ
BGNMA
BSONS
CAG
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
EBLON
EBS
EDO
EIOEI
EJD
ESBYG
FD6
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I09
IHE
IJ-
IKXTQ
ITG
ITH
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
KOW
LAK
LLZTM
M4Y
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P9P
PF0
PT4
PT5
QOK
QOS
R4E
R89
R9I
RHV
RIG
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCLPG
SCV
SDH
SDM
SEG
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TSG
TSK
TSV
TUC
TUS
U2A
U5U
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z7R
Z7S
Z7X
Z7Z
Z81
Z83
Z88
Z8M
Z8N
Z8R
Z8T
Z8U
Z8W
Z92
ZMTXR
_50
~A9
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
AEZWR
AFDZB
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
JQ2
ID FETCH-LOGICAL-c319t-1d5e14ecb1ed2023d5a57f1d2a1643c24e65d09e18cf03660dfc26a4f419f003
IEDL.DBID AGYKE
ISSN 0929-6212
IngestDate Thu Sep 25 00:54:30 EDT 2025
Wed Oct 01 03:57:48 EDT 2025
Thu Apr 24 22:59:59 EDT 2025
Fri Feb 21 02:40:03 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords IDS
IoT security
WSN
Artificial neural network
Security
RPL
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-1d5e14ecb1ed2023d5a57f1d2a1643c24e65d09e18cf03660dfc26a4f419f003
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-7503-6775
PQID 3046733789
PQPubID 2043826
PageCount 24
ParticipantIDs proquest_journals_3046733789
crossref_primary_10_1007_s11277_024_11009_2
crossref_citationtrail_10_1007_s11277_024_11009_2
springer_journals_10_1007_s11277_024_11009_2
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2024-02-01
PublicationDateYYYYMMDD 2024-02-01
PublicationDate_xml – month: 02
  year: 2024
  text: 2024-02-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
– name: Dordrecht
PublicationSubtitle An International Journal
PublicationTitle Wireless personal communications
PublicationTitleAbbrev Wireless Pers Commun
PublicationYear 2024
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References Elazhary (CR2) 2019; 128
Medjek, Tandjaoui, Djedjig, Romdhani (CR35) 2021; 61
CR19
Atul, Kamalraj, Ramesh, Sankaran, Sharma, Khasim (CR29) 2021; 82
CR18
Eskandari, Janjua, Vecchio, Antonelli (CR15) 2020; 7
CR39
CR14
CR36
CR12
Kumar, Shridhar, Swaminathan, Lim (CR8) 2022; 117
CR11
CR32
Tahsien, Karimipour, Spachos (CR4) 2020; 161
Nimbalkar, Kshirsagar (CR23) 2021; 7
Seo, Won, Sultana, Bertino (CR31) 2014; 10
Pongle, Chavan (CR34) 2015; 121
Otoum, Liu, Nayak (CR13) 2019; 33
Iova, Picco, Istomin, Kiraly (CR37) 2016; 54
Le, Loo, Chai, Aiash (CR17) 2016; 7
Nguyen, Ngo, Nguyen, Le (CR5) 2020; 6
Khaldi, Benzaoui (CR27) 2020; 12
CR6
Mehmood, Mukherjee, Ahmed, Song, Malik (CR20) 2018; 74
da Silva, Chaib, Cerqueira, Righi, Alberti (CR9) 2021; 9
Raza, Wallgren, Voigt (CR30) 2013; 11
CR7
Mbarek, Ge, Pitner (CR24) 2021; 16
CR28
CR26
Alhowaide, Alsmadi, Tang (CR16) 2021; 16
Tsvetkov, Klein (CR38) 2011; 59
Fatani, Abd Elaziz, Dahou, Al-Qaness, Lu (CR46) 2021; 9
Violettas, Simoglou, Petridou, Mamatas (CR25) 2021; 125
CR45
CR22
Amouri, Morgera, Bencherif, Manthena (CR33) 2018; 18
CR44
CR21
CR43
CR42
Ancillotti, Bruno, Conti (CR40) 2013; 51
Azzaoui, Boukhamla, Arroyo, Bensayah (CR3) 2022; 13
Meng, Li, Kwok (CR1) 2014; 43
Khaldi, Benzaoui, Ouahabi, Jacques, Taleb-Ahmed (CR47) 2021; 21
Maind, Wankar (CR41) 2014; 2
Lamaazi, Benamar (CR10) 2018; 117
SM Tahsien (11009_CR4) 2020; 161
M Eskandari (11009_CR15) 2020; 7
P Nimbalkar (11009_CR23) 2021; 7
A Amouri (11009_CR33) 2018; 18
SH Seo (11009_CR31) 2014; 10
TB da Silva (11009_CR9) 2021; 9
S Raza (11009_CR30) 2013; 11
A Mehmood (11009_CR20) 2018; 74
11009_CR39
11009_CR14
11009_CR36
O Iova (11009_CR37) 2016; 54
11009_CR7
P Pongle (11009_CR34) 2015; 121
E Ancillotti (11009_CR40) 2013; 51
11009_CR18
11009_CR6
11009_CR19
A Le (11009_CR17) 2016; 7
W Meng (11009_CR1) 2014; 43
11009_CR12
Y Otoum (11009_CR13) 2019; 33
11009_CR32
H Lamaazi (11009_CR10) 2018; 117
11009_CR11
H Azzaoui (11009_CR3) 2022; 13
G Violettas (11009_CR25) 2021; 125
Y Khaldi (11009_CR27) 2020; 12
F Medjek (11009_CR35) 2021; 61
HT Nguyen (11009_CR5) 2020; 6
A Alhowaide (11009_CR16) 2021; 16
B Mbarek (11009_CR24) 2021; 16
A Fatani (11009_CR46) 2021; 9
H Elazhary (11009_CR2) 2019; 128
A Kumar (11009_CR8) 2022; 117
11009_CR28
SB Maind (11009_CR41) 2014; 2
Y Khaldi (11009_CR47) 2021; 21
11009_CR26
DJ Atul (11009_CR29) 2021; 82
11009_CR42
T Tsvetkov (11009_CR38) 2011; 59
11009_CR45
11009_CR21
11009_CR43
11009_CR22
11009_CR44
References_xml – volume: 61
  year: 2021
  ident: CR35
  article-title: Multicast DIS attack mitigation in RPL-based IoT-LLNs
  publication-title: Journal of Information Security and Applications
  doi: 10.1016/j.jisa.2021.102939
– ident: CR45
– volume: 6
  start-page: 128
  issue: 2
  year: 2020
  end-page: 138
  ident: CR5
  article-title: PSI-rooted subgraph: A novel feature for IoT botnet detection using classifier algorithms
  publication-title: ICT Express.
  doi: 10.1016/j.icte.2019.12.001
– ident: CR22
– ident: CR18
– volume: 18
  start-page: 651
  issue: 2
  year: 2018
  ident: CR33
  article-title: A cross-layer, anomaly-based IDS for WSN and MANET
  publication-title: Sensors
  doi: 10.3390/s18020651
– ident: CR43
– volume: 121
  start-page: 1
  issue: 9
  year: 2015
  end-page: 9
  ident: CR34
  article-title: Real time intrusion and wormhole attack detection in internet of things
  publication-title: International Journal of Computer Applications
  doi: 10.5120/21565-4589
– volume: 74
  start-page: 5156
  issue: 10
  year: 2018
  end-page: 5170
  ident: CR20
  article-title: NBC-MAIDS: Na¨ıve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks
  publication-title: The Journal of Supercomputing
  doi: 10.1007/s11227-018-2413-7
– volume: 9
  start-page: 8469
  issue: 11
  year: 2021
  end-page: 8484
  ident: CR9
  article-title: Towards Future Internet of Things Experimentation and Evaluation
  publication-title: IEEE Internet of Things Journal.
  doi: 10.1109/JIOT.2021.3114540
– ident: CR14
– ident: CR39
– volume: 51
  start-page: 75
  issue: 1
  year: 2013
  end-page: 83
  ident: CR40
  article-title: The role of the RPL routing protocol for smart grid communications
  publication-title: IEEE Communications Magazine
  doi: 10.1109/MCOM.2013.6400442
– ident: CR12
– volume: 43
  start-page: 189
  year: 2014
  end-page: 204
  ident: CR1
  article-title: EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2014.02.006
– volume: 33
  start-page: e3803
  issue: 3
  year: 2019
  ident: CR13
  article-title: DL-IDS: a deep learning–based intrusion detection framework for securing IoT
  publication-title: Transactions on Emerging Telecommunications Technologies
  doi: 10.1002/ett.3803
– volume: 7
  start-page: 177
  issue: 2
  year: 2021
  end-page: 181
  ident: CR23
  article-title: Feature selection for intrusion detection system in Internet-of-Things (IoT)
  publication-title: ICT Express
  doi: 10.1016/j.icte.2021.04.012
– ident: CR6
– ident: CR42
– volume: 12
  start-page: 1
  issue: 4
  year: 2020
  end-page: 12
  ident: CR27
  article-title: A new framework for grayscale ear images recognition using generative adversarial networks under uncon-strained conditions
  publication-title: Evolving Systems
– volume: 16
  year: 2021
  ident: CR16
  article-title: Ensemble detection model for IoT IDS
  publication-title: Internet of Things
  doi: 10.1016/j.iot.2021.100435
– volume: 59
  start-page: 59
  year: 2011
  end-page: 66
  ident: CR38
  article-title: RPL: IPv6 routing protocol for low power and lossy networks
  publication-title: Network
– ident: CR21
– volume: 21
  start-page: 20704
  issue: 18
  year: 2021
  end-page: 20713
  ident: CR47
  article-title: Ear recognition based on deep unsupervised active learning
  publication-title: IEEE Sensors Journal
  doi: 10.1109/JSEN.2021.3100151
– ident: CR19
– ident: CR44
– volume: 82
  year: 2021
  ident: CR29
  article-title: A machine learning based IoT for providing an intru-sion detection system for security
  publication-title: Microprocessors and Microsystems
  doi: 10.1016/j.micpro.2020.103741
– volume: 117
  start-page: 42
  year: 2018
  end-page: 58
  ident: CR10
  article-title: OF-EC: A novel energy consumption aware objective function for RPL based on fuzzy logic
  publication-title: Journal of Network and Computer Applications
  doi: 10.1016/j.jnca.2018.05.015
– volume: 2
  start-page: 96
  issue: 1
  year: 2014
  end-page: 100
  ident: CR41
  article-title: Research paper on basic of artificial neural network
  publication-title: International Journal on Recent and Innovation Trends in Computing and Communication
– volume: 11
  start-page: 2661
  issue: 8
  year: 2013
  end-page: 2674
  ident: CR30
  article-title: SVELTE: Real-time intrusion detection in the Internet of Things
  publication-title: Ad hoc Networks
  doi: 10.1016/j.adhoc.2013.04.014
– volume: 7
  start-page: 6882
  issue: 8
  year: 2020
  end-page: 6897
  ident: CR15
  article-title: Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices
  publication-title: IEEE Internet of Things Journal
  doi: 10.1109/JIOT.2020.2970501
– volume: 16
  year: 2021
  ident: CR24
  article-title: Proactive trust classification for detection of replication attacks in 6LoWPAN-based IoT
  publication-title: Internet of Things
  doi: 10.1016/j.iot.2021.100442
– volume: 125
  start-page: 698
  year: 2021
  end-page: 714
  ident: CR25
  article-title: A Soft-warized intrusion detection system for the RPL-based Internet of Things networks
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2021.07.013
– volume: 117
  start-page: 102693
  year: 2022
  ident: CR8
  article-title: Machine learning-based early detection of IoT botnets using network-edge traffic
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2022.102693
– volume: 10
  start-page: 371
  issue: 2
  year: 2014
  end-page: 383
  ident: CR31
  article-title: Effective key management in dynamic wireless sensor networks
  publication-title: IEEE Transactions on Information Forensics and Security
– volume: 13
  start-page: 17
  year: 2022
  end-page: 25
  ident: CR3
  article-title: Devel-oping new deep-learning model to enhance network intrusion classification
  publication-title: Evolving Systems
  doi: 10.1007/s12530-020-09364-z
– volume: 9
  start-page: 123448
  year: 2021
  end-page: 123464
  ident: CR46
  article-title: IoT intrusion detection system using deep learning and enhanced transient search optimization
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3109081
– volume: 128
  start-page: 105
  year: 2019
  end-page: 140
  ident: CR2
  article-title: Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research directions
  publication-title: Journal of Network and Computer Applications
  doi: 10.1016/j.jnca.2018.10.021
– ident: CR11
– volume: 54
  start-page: 16
  issue: 12
  year: 2016
  end-page: 22
  ident: CR37
  article-title: Rpl: The routing standard for the internet of things… or is it?
  publication-title: IEEE Communications Magazine
  doi: 10.1109/MCOM.2016.1600397CM
– volume: 161
  year: 2020
  ident: CR4
  article-title: Machine learning based solutions for security of Internet of Things (IoT): A survey
  publication-title: Journal of Network and Computer Applications
  doi: 10.1016/j.jnca.2020.102630
– ident: CR32
– ident: CR36
– ident: CR7
– volume: 7
  start-page: 25
  issue: 2
  year: 2016
  ident: CR17
  article-title: A specification-based IDS for detecting attacks on RPL-based network topology
  publication-title: Information
  doi: 10.3390/info7020025
– ident: CR28
– ident: CR26
– volume: 117
  start-page: 42
  year: 2018
  ident: 11009_CR10
  publication-title: Journal of Network and Computer Applications
  doi: 10.1016/j.jnca.2018.05.015
– volume: 16
  year: 2021
  ident: 11009_CR16
  publication-title: Internet of Things
  doi: 10.1016/j.iot.2021.100435
– ident: 11009_CR39
  doi: 10.1109/WiMOB.2011.6085374
– ident: 11009_CR26
  doi: 10.1109/CCNC49032.2021.9369617
– volume: 7
  start-page: 6882
  issue: 8
  year: 2020
  ident: 11009_CR15
  publication-title: IEEE Internet of Things Journal
  doi: 10.1109/JIOT.2020.2970501
– volume: 33
  start-page: e3803
  issue: 3
  year: 2019
  ident: 11009_CR13
  publication-title: Transactions on Emerging Telecommunications Technologies
  doi: 10.1002/ett.3803
– ident: 11009_CR44
  doi: 10.1109/MOBHOC.2009.5337011
– ident: 11009_CR14
  doi: 10.1109/ISNCC.2016.7746067
– volume: 128
  start-page: 105
  year: 2019
  ident: 11009_CR2
  publication-title: Journal of Network and Computer Applications
  doi: 10.1016/j.jnca.2018.10.021
– ident: 11009_CR36
– volume: 7
  start-page: 25
  issue: 2
  year: 2016
  ident: 11009_CR17
  publication-title: Information
  doi: 10.3390/info7020025
– volume: 13
  start-page: 17
  year: 2022
  ident: 11009_CR3
  publication-title: Evolving Systems
  doi: 10.1007/s12530-020-09364-z
– volume: 54
  start-page: 16
  issue: 12
  year: 2016
  ident: 11009_CR37
  publication-title: IEEE Communications Magazine
  doi: 10.1109/MCOM.2016.1600397CM
– volume: 125
  start-page: 698
  year: 2021
  ident: 11009_CR25
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2021.07.013
– volume: 9
  start-page: 8469
  issue: 11
  year: 2021
  ident: 11009_CR9
  publication-title: IEEE Internet of Things Journal.
  doi: 10.1109/JIOT.2021.3114540
– ident: 11009_CR28
  doi: 10.1109/ICAASE51408.2020.9380127
– volume: 59
  start-page: 59
  year: 2011
  ident: 11009_CR38
  publication-title: Network
– volume: 61
  year: 2021
  ident: 11009_CR35
  publication-title: Journal of Information Security and Applications
  doi: 10.1016/j.jisa.2021.102939
– volume: 10
  start-page: 371
  issue: 2
  year: 2014
  ident: 11009_CR31
  publication-title: IEEE Transactions on Information Forensics and Security
– volume: 12
  start-page: 1
  issue: 4
  year: 2020
  ident: 11009_CR27
  publication-title: Evolving Systems
– volume: 6
  start-page: 128
  issue: 2
  year: 2020
  ident: 11009_CR5
  publication-title: ICT Express.
  doi: 10.1016/j.icte.2019.12.001
– volume: 82
  year: 2021
  ident: 11009_CR29
  publication-title: Microprocessors and Microsystems
  doi: 10.1016/j.micpro.2020.103741
– ident: 11009_CR7
– volume: 74
  start-page: 5156
  issue: 10
  year: 2018
  ident: 11009_CR20
  publication-title: The Journal of Supercomputing
  doi: 10.1007/s11227-018-2413-7
– volume: 121
  start-page: 1
  issue: 9
  year: 2015
  ident: 11009_CR34
  publication-title: International Journal of Computer Applications
  doi: 10.5120/21565-4589
– ident: 11009_CR45
– ident: 11009_CR6
  doi: 10.1145/3447568.3448512
– volume: 161
  year: 2020
  ident: 11009_CR4
  publication-title: Journal of Network and Computer Applications
  doi: 10.1016/j.jnca.2020.102630
– ident: 11009_CR22
  doi: 10.1109/ICIT52682.2021.9491694
– volume: 117
  start-page: 102693
  year: 2022
  ident: 11009_CR8
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2022.102693
– volume: 43
  start-page: 189
  year: 2014
  ident: 11009_CR1
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2014.02.006
– ident: 11009_CR32
  doi: 10.1145/3055245.3055252
– ident: 11009_CR42
  doi: 10.5220/0006639801080116
– ident: 11009_CR43
  doi: 10.1109/ICISSEC.2016.7885840
– volume: 18
  start-page: 651
  issue: 2
  year: 2018
  ident: 11009_CR33
  publication-title: Sensors
  doi: 10.3390/s18020651
– volume: 51
  start-page: 75
  issue: 1
  year: 2013
  ident: 11009_CR40
  publication-title: IEEE Communications Magazine
  doi: 10.1109/MCOM.2013.6400442
– ident: 11009_CR18
  doi: 10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0080
– volume: 11
  start-page: 2661
  issue: 8
  year: 2013
  ident: 11009_CR30
  publication-title: Ad hoc Networks
  doi: 10.1016/j.adhoc.2013.04.014
– volume: 9
  start-page: 123448
  year: 2021
  ident: 11009_CR46
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3109081
– ident: 11009_CR12
  doi: 10.1109/ICMTMA.2014.57
– volume: 7
  start-page: 177
  issue: 2
  year: 2021
  ident: 11009_CR23
  publication-title: ICT Express
  doi: 10.1016/j.icte.2021.04.012
– ident: 11009_CR21
  doi: 10.1007/978-3-030-61746-2_16
– ident: 11009_CR11
  doi: 10.1109/IntelliSys.2017.8324298
– volume: 2
  start-page: 96
  issue: 1
  year: 2014
  ident: 11009_CR41
  publication-title: International Journal on Recent and Innovation Trends in Computing and Communication
– ident: 11009_CR19
  doi: 10.1007/978-3-030-15032-7_39
– volume: 16
  year: 2021
  ident: 11009_CR24
  publication-title: Internet of Things
  doi: 10.1016/j.iot.2021.100442
– volume: 21
  start-page: 20704
  issue: 18
  year: 2021
  ident: 11009_CR47
  publication-title: IEEE Sensors Journal
  doi: 10.1109/JSEN.2021.3100151
SSID ssj0010092
Score 2.3850157
Snippet The successful deployment of an Intrusion Detection System (IDS) in the Internet of Things (IoT) is subject to two primary criteria: the detection method and...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 2235
SubjectTerms Artificial neural networks
Communications Engineering
Computer Communication Networks
Engineering
Internet of Things
Intrusion detection systems
Lightweight
Memory devices
Network topologies
Networks
Power management
Routers
Routing (telecommunications)
Signal,Image and Speech Processing
Title A Lightweight Cooperative Intrusion Detection System for RPL-based IoT
URI https://link.springer.com/article/10.1007/s11277-024-11009-2
https://www.proquest.com/docview/3046733789
Volume 134
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1572-834X
  dateEnd: 20241003
  omitProxy: false
  ssIdentifier: ssj0010092
  issn: 0929-6212
  databaseCode: ADMLS
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVLSH
  databaseName: SpringerLink Journals
  customDbUrl:
  mediaType: online
  eissn: 1572-834X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0010092
  issn: 0929-6212
  databaseCode: AFBBN
  dateStart: 19970101
  isFulltext: true
  providerName: Library Specific Holdings
– providerCode: PRVAVX
  databaseName: SpringerLINK - Czech Republic Consortium
  customDbUrl:
  eissn: 1572-834X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0010092
  issn: 0929-6212
  databaseCode: AGYKE
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://link.springer.com
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLink Journals (ICM)
  customDbUrl:
  eissn: 1572-834X
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0010092
  issn: 0929-6212
  databaseCode: U2A
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://www.springerlink.com/journals/
  providerName: Springer Nature
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dT8IwEL8ovOiD30YESR-ML1pDt3awRyKgKBqjkODT0q8lRh0kYEz86227DYSoic-9NVvvenfd7-5XgGPhM6mFMd5QSIVpHGrc4ERgh5E1pB8IB8Xc3gVXA3o9ZMOsKWySV7vnkKTz1PNmN2LhRhNTsKU5C7FxvEVmDygFKDYvn27aM_TAEgk5jj1b2mF8c9Ys8_MsiwFpnmUuAaMu3nQ2YZC_aVpm8nL-PhXn8nOJxPG_n7IFG1kCipqpxWzDik52YP0bLeEOlDOh58kbOkELLSSTXeg0Uc-e6D_cT1UzPBrrlD4cdRPbwmHEUEtPXY1XglJKdGRyY_Rw38M2airUHfX3oN9p9y-ucHYbA5Zmm04xUUwTqqUgWtk71xXjrB4T5XFz4vKlR3XAVC3UpCFjExaDmoqlF3AaUxLGxnfsQyEZJfoAkKaCC8E0576FXSmXlGrFaqoWE8F9vwQk10gkM6Zye2HGazTnWLYLGJkFjNwCRl4JTmfPjFOejj-lK7mio2zPTiKLEdd9v94IS3CW620-_Ptsh_8TL8OaZ1XvSr8rUDCa0Ucms5mKqjHk1m3vsZoZdBVWB17zCx8T7vI
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS8MwED9ke1Af_JiKc1PzIL5oZGnTrn0curm5KSIT9KnkqyBqN1hF8K83SdvNDRX2nGtoc5e7S393vwCccNcTimvjDbmQmMahwgEjHFuMLBCuzy0Uc3vndx_pzZP3lDeFTYpq9wKStJ561uxGDNyoYwo2NGch1o63TEkQ0BKUW9fP_fYUPTBEQpZjz5R2aN-cN8v8Pst8QJplmQvAqI03nU14LN40KzN5vfhI-YX4WiBxXPZTtmAjT0BRK7OYbVhRSQXWf9ASVqCWC71M3tEpmmshmexAp4UG5kT_aX-q6uHRWGX04aiXmBYOLYauVGprvBKUUaIjnRujh_sBNlFTot5ouAvDTnt42cX5bQxY6G2aYiI9RagSnChp7lyXHvOaMZEO0ycuVzhU-Z5shIoEItZh0W_IWDg-ozElYax9xx6UklGi9gEpyhnnnmLMNbArZYJSJb2GbMSEM9etAik0EomcqdxcmPEWzTiWzQJGegEju4CRU4Wz6TPjjKfjX-l6oego37OTyGDETddtBmEVzgu9zYb_nu1gOfFjWO0ObwfRoHfXr8GaY8zAloHXoaS1pA51lpPyo9yovwFo2u9m
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fS8MwEA4yQfRBdCrOTc2D-KJhTZN27eNwjk3nGLLB3kJ-FQTtBiv475uk7bqJCj7nmoe7S-6u390XAG4ECaQWxnljIRWiSaxRxLFADiOLJAmFg2JexuFgRp_mwXxjit91u5eQZD7TYFma0qy9VEm7GnzDFno08QVZyrMYmUt4l5pYbcuvmd9d4wiWUsix7dkmD3NLF2MzP--xHZqqfPMbROoiT_8IHBYpI-zmNj4GOzqtg4MNIsE6aBZCb6sPeAu3hj5WJ6DfhSNbg3-636BmebHUOeE3HKZ26MKIwZ7OXFdWCnMSc2iyWfg6GSEb5xQcLqanYNp_nD4MUPF-ApLmYGUIq0BjqqXAWtlX0lXAg06Clc9NjUSkT3UYKC_WOJKJCWShpxLph5wmFMeJOe1noJYuUn0OoKaCCxFozokFSimXlGoVeMpLsOCENAAuNcdkwS1un7h4ZxUrstU2M9pmTtvMb4C79TfLnFnjT-lWaRBWnLIVs6huh5BOFDfAfWmkavn33S7-J34N9ia9PhsNx89NsO9bl3F92y1QM0bSlyYtycSV87wvUMTWtQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Lightweight+Cooperative+Intrusion+Detection+System+for+RPL-based+IoT&rft.jtitle=Wireless+personal+communications&rft.au=Azzaoui+Hanane&rft.au=Boukhamla+Akram+Zine+Eddine&rft.au=Perazzo+Pericle&rft.au=Alazab+Mamoun&rft.date=2024-02-01&rft.pub=Springer+Nature+B.V&rft.issn=0929-6212&rft.eissn=1572-834X&rft.volume=134&rft.issue=4&rft.spage=2235&rft.epage=2258&rft_id=info:doi/10.1007%2Fs11277-024-11009-2&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0929-6212&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0929-6212&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0929-6212&client=summon