The Internet of Things (IoT) is a significant technological advancement that allows for seamless device integration and data flow. The development of the IoT has led to the emergence of several solutions in various sectors. However, rapid popularization also has its challenges, and one of the most serious challenges is the security of the IoT. Security is a major concern, particularly routing attacks in the core network, which may cause severe damage due to information loss. Routing Protocol for Low-Power and Lossy Networks (RPL), a routing protocol used for IoT devices, is faced with selective forwarding attacks. In this paper, we present a federated learning-based detection technique for detecting selective forwarding attacks, termed FL-DSFA. A lightweight model involving the IoT Routing Attack Dataset (IRAD), which comprises Hello Flood (HF), Decreased Rank (DR), and Version Number (VN), is used in this technique to increase the detection efficiency. The attacks on IoT threaten the security of the IoT system since they mainly focus on essential elements of RPL. The components include control messages, routing topologies, repair procedures, and resources within sensor networks. Binary classification approaches have been used to assess the training efficiency of the proposed model. The training step includes the implementation of machine learning algorithms, including logistic regression (LR), K-nearest neighbors (KNN), support vector machine (SVM), and naive Bayes (NB). The comparative analysis illustrates that this study, with SVM and KNN classifiers, exhibits the highest accuracy during training and achieves the most efficient runtime performance. The proposed system demonstrates exceptional performance, achieving a prediction precision of 97.50%, an accuracy of 95%, a recall rate of 98.33%, and an F1 score of 97.01%. It outperforms the current leading research in this field, with its classification results, scalability, and enhanced privacy.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11398023PMC
http://dx.doi.org/10.3390/s24175834DOI Listing

Publication Analysis

Top Keywords

selective forwarding
12
forwarding attacks
12
iot
8
security iot
8
routing protocol
8
attacks
5
routing
5
fl-dsfa securing
4
securing rpl-based
4
rpl-based iot
4

Similar Publications

Journals and publishers are increasingly using artificial intelligence (AI) to screen submissions for potential misconduct, including plagiarism and data or image manipulation. While using AI can enhance the integrity of published manuscripts, it can also increase the risk of false/unsubstantiated allegations. Ambiguities related to journals' and publishers' responsibilities concerning fairness and transparency also raise ethical concerns.

View Article and Find Full Text PDF

The Internet of Things (IoT)-based smart solutions have been developed to predict water quality and they are becoming an increasingly important means of providing efficient solutions through communication technologies. IoT systems are used for enabling connection between various devices based on the ability to gather and collect information. Furthermore, IoT systems are designed to address the environment and the automation industry.

View Article and Find Full Text PDF

The soil quality plays a crucial role in providing essential nutrients for crop growth and ensuring a bountiful yield. Identifying the soil composition, which includes sand, silt particles, and the mixture of clay in specific proportions, is vital for making informed decisions about crop selection and managing weed growth. Furthermore, soil pollution from emerging contaminants presents a substantial risk to water resource management and food production.

View Article and Find Full Text PDF

Congestion control in internet of things (IoT) using auction theory.

Sci Rep

December 2024

International Business School, Qingdao Huanghai University, 1145 Linghai Road, Huangdao District, Qingdao, 266555, Shandong Province, People's Republic of China.

The Internet of Things (IoT) facilitates data transmission through communication networks, preventing congestion when input data rate exceeds output, and congestion control in computer networks modulates traffic entry. This paper proposes a fusion of auction theory with reinforcement learning as a means of managing congestion in the IoT. The proposed technique seeks to enhance network performance by utilizing object trustworthiness evaluation and auction-based route selection to manage congestion during data routing.

View Article and Find Full Text PDF

Background: The purpose of this study was to evaluate the efficacy of selective laser sintering (SLS) against the traditional casting method in fabricating customized Co-Cr dental posts, employing 3D coordinate metrology for analysis.

Methods: A 10 mm post space was prepared in a transparent acrylic block using a red ParaPost XP drill (1.25 mm diameter).

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!