{"id":"https://openalex.org/W7118833732","doi":"https://doi.org/10.3390/fi18010035","title":"A Multiclass Machine Learning Framework for Detecting Routing Attacks in RPL-Based IoT Networks Using a Novel Simulation-Driven Dataset","display_name":"A Multiclass Machine Learning Framework for Detecting Routing Attacks in RPL-Based IoT Networks Using a Novel Simulation-Driven Dataset","publication_year":2026,"publication_date":"2026-01-07","ids":{"openalex":"https://openalex.org/W7118833732","doi":"https://doi.org/10.3390/fi18010035"},"language":"en","primary_location":{"id":"doi:10.3390/fi18010035","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi18010035","pdf_url":"https://www.mdpi.com/1999-5903/18/1/35/pdf","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-5903/18/1/35/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039551418","display_name":"Niharika Panda","orcid":"https://orcid.org/0009-0002-4829-5189"},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Niharika Panda","raw_affiliation_strings":["Department of Computer Science and Engineering, Amrita School of Computing, Amrita Vishwa Vidyapeetham, Bengaluru 560035, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Amrita School of Computing, Amrita Vishwa Vidyapeetham, Bengaluru 560035, India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113370989","display_name":"Supriya Muthuraman","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Supriya Muthuraman","raw_affiliation_strings":["Department of Computer Science and Engineering, Amrita School of Computing, Amrita Vishwa Vidyapeetham, Bengaluru 560035, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Amrita School of Computing, Amrita Vishwa Vidyapeetham, Bengaluru 560035, India","institution_ids":["https://openalex.org/I81556334"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5039551418"],"corresponding_institution_ids":["https://openalex.org/I81556334"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":93.2111,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.99785421,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"18","issue":"1","first_page":"35","last_page":"35"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.6639000177383423,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.6639000177383423,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.06650000065565109,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.039799999445676804,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/overfitting","display_name":"Overfitting","score":0.5264000296592712},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.4885999858379364},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.4251999855041504},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.39309999346733093},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.391400009393692},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.3833000063896179},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.3813000023365021},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.37880000472068787},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.37869998812675476},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.3767000138759613}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9117000102996826},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6686000227928162},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6560999751091003},{"id":"https://openalex.org/C22019652","wikidata":"https://www.wikidata.org/wiki/Q331309","display_name":"Overfitting","level":3,"score":0.5264000296592712},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.4885999858379364},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.4251999855041504},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.39309999346733093},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.391400009393692},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.3833000063896179},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.3813000023365021},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.37880000472068787},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.37869998812675476},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.3767000138759613},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.3630000054836273},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3555000126361847},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.3352999985218048},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.32600000500679016},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.3239000141620636},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.31839999556541443},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3116999864578247},{"id":"https://openalex.org/C17426736","wikidata":"https://www.wikidata.org/wiki/Q419918","display_name":"Histogram of oriented gradients","level":4,"score":0.30079999566078186},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2930000126361847},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.2913999855518341},{"id":"https://openalex.org/C141404830","wikidata":"https://www.wikidata.org/wiki/Q2823869","display_name":"AdaBoost","level":3,"score":0.289000004529953},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.28600001335144043},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.28349998593330383},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.2782999873161316},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.2712000012397766},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.27079999446868896},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.26899999380111694},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.26820001006126404},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.26489999890327454},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.26339998841285706}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/fi18010035","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi18010035","pdf_url":"https://www.mdpi.com/1999-5903/18/1/35/pdf","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:f70d78dec7054903aaeb078de9435d94","is_oa":true,"landing_page_url":"https://doaj.org/article/f70d78dec7054903aaeb078de9435d94","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 18, Iss 1, p 35 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/fi18010035","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi18010035","pdf_url":"https://www.mdpi.com/1999-5903/18/1/35/pdf","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320311327","display_name":"Amrita Vishwa Vidyapeetham University","ror":"https://ror.org/03am10p12"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W7118833732.pdf"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W2099940443","https://openalex.org/W2370696599","https://openalex.org/W3043530913","https://openalex.org/W3045272456","https://openalex.org/W3095710854","https://openalex.org/W3164964481","https://openalex.org/W3206599325","https://openalex.org/W3210829596","https://openalex.org/W4220783814","https://openalex.org/W4225146420","https://openalex.org/W4296101513","https://openalex.org/W4311127155","https://openalex.org/W4311636696","https://openalex.org/W4312653351","https://openalex.org/W4323668521","https://openalex.org/W4377834335","https://openalex.org/W4379144778","https://openalex.org/W4386814486","https://openalex.org/W4396803574","https://openalex.org/W4401506649","https://openalex.org/W4406610530","https://openalex.org/W4409580880","https://openalex.org/W4410062509"],"related_works":[],"abstract_inverted_index":{"The":[0],"use":[1,98],"of":[2,29,35,39,45,88,99,226,262],"resource-constrained":[3],"Low-Power":[4],"and":[5,42,63,118,123,143,155,165,168,211,214,222,241,250,270],"Lossy":[6],"Networks":[7],"(LLNs),":[8],"where":[9],"the":[10,18,27,36,43,86,97,254,259],"IPv6":[11],"Routing":[12],"Protocol":[13],"for":[14,83,103],"LLNs":[15],"(RPL)":[16],"is":[17,49,176,180],"de":[19],"facto":[20],"routing":[21],"standard,":[22],"has":[23],"increased":[24],"due":[25],"to":[26,53,109,182],"Internet":[28],"Things\u2019":[30],"(IoT)":[31],"explosive":[32],"growth.":[33],"Because":[34],"dynamic":[37],"nature":[38],"IoT":[40],"deployments":[41],"lack":[44,87],"in-protocol":[46],"security,":[47],"RPL":[48,132],"still":[50],"quite":[51],"susceptible":[52],"routing-layer":[54],"attacks":[55],"like":[56,218],"Blackhole,":[57],"Lowered":[58],"Rank,":[59],"version":[60],"number":[61],"manipulation,":[62],"Flooding":[64],"despite":[65],"its":[66],"lightweight":[67],"architecture.":[68],"Lightweight,":[69],"data-driven":[70],"intrusion":[71],"detection":[72,230],"methods":[73],"are":[74,80],"necessary":[75],"since":[76],"traditional":[77],"cryptographic":[78],"countermeasures":[79],"frequently":[81],"unfeasible":[82],"LLNs.":[84],"However,":[85],"RPL-specific":[89],"control-plane":[90,144],"semantics":[91],"in":[92],"current":[93],"cybersecurity":[94],"datasets":[95],"restricts":[96],"machine":[100],"learning":[101],"(ML)":[102],"practical":[104],"anomaly":[105],"identification.":[106],"In":[107],"order":[108],"close":[110],"this":[111,113],"gap,":[112],"work":[114],"models":[115],"both":[116],"static":[117],"mobile":[119],"networks":[120],"under":[121],"benign":[122],"adversarial":[124],"settings":[125],"by":[126,266],"creating":[127],"a":[128,171,227],"novel,":[129],"large-scale":[130],"multiclass":[131],"attack":[133],"dataset":[134,179],"using":[135],"Contiki-NG\u2019s":[136],"Cooja":[137],"simulator.":[138],"To":[139],"record":[140],"detailed":[141],"packet-level":[142],"activity":[145],"including":[146,186],"DODAG":[147,151],"Information":[148,152],"Object":[149,158],"(DIO),":[150],"Solicitation":[153],"(DIS),":[154],"Destination":[156],"Advertisement":[157],"(DAO)":[159],"message":[160],"statistics":[161],"along":[162],"with":[163,268,273],"forwarding":[164],"dropping":[166],"patterns":[167],"objective-function":[169],"fluctuations,":[170],"protocol-aware":[172],"feature":[173],"extraction":[174],"pipeline":[175],"developed.":[177],"This":[178],"used":[181],"evaluate":[183],"fifteen":[184],"classifiers,":[185],"Logistic":[187],"Regression":[188],"(LR),":[189],"Support":[190],"Vector":[191],"Machine":[192],"(SVM),":[193],"Decision":[194],"Tree":[195],"(DT),":[196],"k-Nearest":[197],"Neighbors":[198],"(KNN),":[199],"Random":[200,271],"Forest":[201,272],"(RF),":[202],"Extra":[203],"Trees":[204],"(ET),":[205],"Gradient":[206],"Boosting":[207],"(GB),":[208],"AdaBoost":[209],"(AB),":[210],"XGBoost":[212,267],"(XGB)":[213],"several":[215],"ensemble":[216,236],"strategies":[217],"soft/hard":[219],"voting,":[220],"stacking,":[221],"bagging,":[223],"as":[224],"part":[225],"comprehensive":[228],"ML-based":[229],"system.":[231],"Numerous":[232],"tests":[233],"show":[234],"that":[235],"approaches":[237],"offer":[238],"better":[239],"generalization":[240],"prediction":[242],"performance.":[243],"With":[244],"overfitting":[245],"gaps":[246],"less":[247],"than":[248],"0.006":[249],"low":[251],"cross-validation":[252],"variance,":[253],"Soft":[255],"Voting":[256],"Classifier":[257],"obtains":[258],"greatest":[260],"accuracy":[261],"99.47%,":[263],"closely":[264],"followed":[265],"99.45%":[269],"99.44%.":[274]},"counts_by_year":[{"year":2026,"cited_by_count":2}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2026-01-08T00:00:00"}
