A Machine Learning Approach to Detect Denial of Sleep Attacks in Internet of Things (IoT)
| dc.contributor.author | Dissanayake, I. | |
| dc.contributor.author | Welhenge, A. | |
| dc.contributor.author | Weerasinghe, H. D. | |
| dc.date.accessioned | 2026-01-16T07:41:41Z | |
| dc.date.issued | 2025 | |
| dc.description.abstract | The Internet of Things (IoT) has rapidly evolved into a central component of today’s technological landscape, enabling seamless connectivity and communication among a vast array of devices. It underpins automation, real-time monitoring, and smart infrastructure, serving as a foundation for Industry 4.0 and paving the way toward Industry 5.0. Despite the potential of IoT systems to transform industries, these systems face a number of challenges, most notably the lack of processing power, storage space, and battery life. Whereas cloud and fog computing help to relieve computational and storage constraints, energy limitations remain a severe impediment to long-term autonomous operation. Among the threats that exploit this weakness, the Denial-of-Sleep (DoSl) attack is particularly problematic because it prevents nodes from entering low-power states, leading to battery depletion and degraded network performance. This research investigates machine-learning (ML) and deep-learning (DL) methods for identifying such energy-wasting behaviors to protect IoT energy resources. A dataset was generated in a simulated IoT environment under multiple DoSl attack conditions to validate the proposed approach. Several ML and DL models were trained and tested on this data to discover distinctive power-consumption patterns related to the attacks. The experimental results confirm that the proposed models can effectively detect anomalous behaviors associated with DoSl activity, demonstrating their potential for energy-aware threat detection in IoT networks. Specifically, the Random Forest and Decision Tree classifiers achieved accuracies of 98.57% and 97.86%, respectively, on the held-out 25% test set, while the Long Short-Term Memory (LSTM) model reached 97.92% accuracy under a chronological split, confirming effective temporal generalization. All evaluations were conducted in a simulated environment, and the paper also outlines potential pathways for future physical testbed deployment. | |
| dc.identifier.citation | Dissanayake, I., Welhenge, A., & Weerasinghe, H. D. (2025). A Machine Learning Approach to Detect Denial of Sleep Attacks in Internet of Things (IoT). IoT, 6(4), 71. https://doi.org/10.3390/iot6040071 | |
| dc.identifier.uri | http://repository.kln.ac.lk/handle/123456789/31111 | |
| dc.publisher | IoT | |
| dc.subject | Internet of Things (IoT) | |
| dc.subject | Denial of Sleep attacks | |
| dc.subject | COOJA simulator | |
| dc.subject | Logistic Regression | |
| dc.subject | Support Vector Machine | |
| dc.subject | K-Nearest Neighbors (KNN) | |
| dc.subject | decision tree | |
| dc.subject | Random Forest | |
| dc.subject | Artificial Neural Networks (ANN) | |
| dc.subject | Recurrent Neural Network (RNN) | |
| dc.title | A Machine Learning Approach to Detect Denial of Sleep Attacks in Internet of Things (IoT) | |
| dc.type | Article |