Research Article

Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two Objective Functions Using a Novel Dataset

Table 2

Explanation of dataset features.

FeatureRemarks

NodeNode ID
ReceivedPackets successfully received
DupsDuplicate packets received
LostEstimated lost packets
HopsAverage number of hops
RtMetricAverage routing metric
ETXExpected transmission count
ChurnNext hop change count
Beacon intervalBroadcast by node to sync the RPL network
RebootsTotal number of reboots
CPU powerAverage CPU power consumption
LPM powerAverage low-power mode consumption
Listen powerAverage listen power
Transmit powerAverage transmission power
PowerAverage power consumption
On-timePower measure time
Listen duty cyclePercentage time listening signal is active
Transmit duty cyclePercentage time transmission signal is active
Avg interpacket timeAverage delay between packets
Min interpacket timeMinimum delay for the packet to arrive
Max interpacket timeMaximum delay for the packet to arrive
Simulation timeAverage simulation time
Malicious/benignBenign activity or type of attack
Objective functionMRHOF or OF0