Optimization Accuracy of Blackhole Attacks in Routing Protocol using Machine Learning

Authors

  • Akilesh Pavithran, Mr. Manish Sahu

Keywords:

Routing Protocol, Blackhole Attack, Machine Learning

Abstract

Blackhole attacks pose a significant threat to the reliability and stability of wireless ad hoc and sensor networks, as malicious nodes intentionally drop data packets after falsely advertising optimal routes. Such attacks lead to degradation in network performance by reducing the packet delivery ratio, increasing end-to-end delay, and causing severe routing disruptions. Traditional defense techniques rely on threshold-based or heuristic mechanisms, which often fail to adapt to dynamic network conditions and result in low detection accuracy. To address these limitations, machine learning (ML)-based approaches have emerged as an effective solution for detecting and mitigating Blackhole attacks. This paper proposes an optimized ML framework aimed at enhancing the accuracy of identifying Blackhole nodes within routing protocols such as AODV, DSR, and DSDV. The model analyzes essential network behavior features including abnormal sequence numbers, packet drop rate, routing overhead, and transmission patterns to classify nodes as benign or malicious. Various ML classifiers—such as Random Forest, SVM, Logistic Regression, KNN, and ensemble learning—are evaluated using performance metrics like accuracy, precision, recall, F1-score, and ROC curves.

References

F. A. Garba, O. Oduwole, A. B. Isa, A. S. Aliyu and R. M. Dima, "Comprehensive Analysis of Blackhole Attack on RPL in Static, Mobile and Hybrid Network Environment," 2024 IEEE 5th International Conference on Electro-Computing Technologies for Humanity (NIGERCON), Ado Ekiti, Nigeria, 2024, pp. 1-5.

H. B H, A. Venkata Mandalam and A. Giri, "HVSNA: An Advanced Hybrid Attack on RPL-Based Low-Power Wireless Networks," 2023 IEEE North Karnataka Subsection Flagship International Conference (NKCon), Belagavi, India, 2023, pp. 1-6

Philokypros P. Ioulianou, Vassilios G. Vassilakis, Siamak F. Shahandashti, “ML-based Detection of Rank and Blackhole Attacks in RPL Networks”, 13th International Symposium on Communication Systems, Networks and Digital Signal Processing, IEEE 2022.

B. Aydın, S. Görmüş, H. Aydın, and S. Kulcu, “A new routing objective function for ietf 6tisch protocol,” in 2022 30th Signal Processing and Communications Applications Conference (SIU). IEEE, 2022, pp. 1–4.

P. P. Ioulianou, V. G. Vassilakis, and S. F. Shahandashti, “A trust-based intrusion detection system for RPL networks: Detecting a combination of rank and blackhole attacks,” Journal of Cybersecurity and Privacy, vol. 2, no. 1, pp. 124–153, March 2022.

A. Agiollo, M. Conti, P. Kaliyar, T.-N. Lin, and L. Pajola, “Detonar: Detection of routing attacks in rplbased iot,” IEEE transactions on network and service management, vol. 18, no. 2, pp. 1178–1190, 2021.

B. Farzaneh, M. Koosha, E. Boochanpour, and E. Alizadeh, “A new method for intrusion detection on rpl routing protocol using fuzzy logic,” in 2020 6th International Conference on Web Research (ICWR), 2020, pp. 245–250.

E. G. Ribera, B. M. Alvarez, C. Samuel, P. P. Ioulianou, and V. G. Vassilakis, “Heartbeat-based detection of blackhole and greyhole attacks in RPL networks,” in 12th IEEE/IET International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), Porto, Portugal, July 2020, pp. 1–6.

R. Smith, D. Palin, P. P. Ioulianou, V. G. Vassilakis, and S. F. Shahandashti, “Battery draining attacks against edge computing nodes in IoT networks,” Cyber-Physical Systems, vol. 6, no. 2, pp. 96–116, January 2020.

C. Samuel, B. M. Alvarez, E. G. Ribera, P. P. Ioulianou, and V. G. Vassilakis, “Performance evaluation of a wormhole detection method using round-trip times and hop counts in RPL-based 6LoWPAN networks,” in 12th IEEE/IET International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), Porto, Portugal, July 2020, pp. 1–6.

U. Singh, M. Shukla, A. K. Jain, M. Patsariya, R. Itare and S. Yadav, Trust-Based Model for Mobile Ad-Hoc Network in the Internet of Things, vol. 98, 2020.

P. P. Ioulianou and V. G. Vassilakis, “Denial-of-service attacks and countermeasures in the RPL-based Internet of Things,” 2nd International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT) in conjunction with ESORICS, Luxemburg, Sept. 2019.

P. P. Ioulianou, V. G. Vassilakis, and M. D. Logothetis, “Battery drain denial-of-service attacks and defenses in the Internet of things,” Journal of Telecommunications and Information Technology, vol. 2, pp. 37–45, April 2019.

A. Verma and V. Ranga, “Elnids: Ensemble learning based network intrusion detection system for rpl based internet of things,” in 2019 4th International conference on Internet of Things: Smart innovation and usages (IoT-SIU). IEEE, 2019, pp. 1–6.

E. Aydogan, S. Yilmaz, S. Sen, I. Butun, S. Forsström, and M. Gidlund, “A central intrusion detection system for rpl-based industrial internet of things,” in 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS). IEEE, 2019, pp. 1–5.

Downloads

How to Cite

Akilesh Pavithran, Mr. Manish Sahu. (2025). Optimization Accuracy of Blackhole Attacks in Routing Protocol using Machine Learning. International Journal of Research & Technology, 13(4), 432–441. Retrieved from https://ijrt.org/j/article/view/599

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.