{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T16:12:00Z","timestamp":1773677520325,"version":"3.50.1"},"reference-count":46,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T00:00:00Z","timestamp":1754438400000},"content-version":"vor","delay-in-days":217,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100007614","name":"Al Jouf University","doi-asserted-by":"publisher","award":["DGSSR\u20102024\u201002\u201002186"],"award-info":[{"award-number":["DGSSR\u20102024\u201002\u201002186"]}],"id":[{"id":"10.13039\/501100007614","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Communications"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>The proliferation of the Internet of Things (IoT) has reshaped industries based on seamless connectivity. However, it has also brought about immense security challenges, especially in the communication protocol of routing protocol for low\u2010power and lossy networks (RPL). One of these security threats vital to the RPL\u2010based IoT networks includes the Clone ID attack on malicious nodes when they clone the identity of legitimate nodes to access their sensitive data without authorization. Detecting Clone ID attacks in RPL\u2010based IoT networks is complex because network traffic data has high dimensions and substantial data imbalances while facing limited resources in these environments. The unmanaged control message system and insufficient identity authentication methods within the RPL protocol directly expose networks to state\u2010of\u2010the\u2010art cyber security threats. This paper proposes a new edge layer\u2010based deep neural network (DNN) approach to detect Clone ID attacks from IoT sensor networks by network traffic pattern analysis. The proposed method is based on deep data features to distinguish legitimate nodes from cloned nodes and improve the overall security, resilience, and operational efficiency of RPL\u2010based IoT networks. To check the efficiency of our proposed method, we designed a synthetic dataset called CID\u2010RPL. The CID\u2010RPL dataset consists of 25 attributes and 2,131,328 samples. The experimental results are best to describe that our proposed approach outperformed the previously designed methods by offering an accuracy improvement of 5.06%, precision improvement of 7.60%, recall increment of 7.0%, and F1 score enhancement of 11.0%. Similarly, residual energy at the network level increased by 32.84%, which infers that the lifetime of the network will be extended and its energy efficiency increased under attack situations. Thus, the results testify to the effectiveness of the DL\u2010based solution proposed herein to detect Clone ID attacks in dynamic and evolving network\u00a0environments.<\/jats:p>","DOI":"10.1049\/cmu2.70067","type":"journal-article","created":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T11:52:29Z","timestamp":1754481149000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["CID\u2010RPL: Clone ID Attack Detection Using Deep Neural Network for RPL\u2010Based IoT Networks"],"prefix":"10.1049","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4796-7975","authenticated-orcid":false,"given":"Fatima","family":"Al\u2010Quayed","sequence":"first","affiliation":[{"name":"Department of Computer Science College of Computer and Information Sciences Jouf University Sakakah Al Jouf Saudi Arabia"}]},{"given":"Sana Rauf","family":"Awan","sequence":"additional","affiliation":[{"name":"Department of Avionics Engineering Air University Islamabad Pakistan"}]},{"given":"Noshina","family":"Tariq","sequence":"additional","affiliation":[{"name":"Department of Artificial Intelligence and Data Science National University of Computer and Emerging Sciences Islamabad Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6339-2257","authenticated-orcid":false,"given":"Mamoona","family":"Humayun","sequence":"additional","affiliation":[{"name":"Department of Computing School of Arts Humanities and Social Sciences University of Roehampton London UK"}]},{"given":"Thanaa S","family":"Alnusairi","sequence":"additional","affiliation":[{"name":"Department of Computer Science College of Computer and Information Sciences Jouf University Sakakah Al Jouf Saudi Arabia"}]},{"given":"Tayyab","family":"Rehman","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, Computer Science, and Mathematics University of L'Aquila L'Aquila Italy"}]}],"member":"265","published-online":{"date-parts":[[2025,8,6]]},"reference":[{"key":"e_1_2_12_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03528-5"},{"key":"e_1_2_12_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12194074"},{"key":"e_1_2_12_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03388-z"},{"key":"e_1_2_12_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3494524"},{"key":"e_1_2_12_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-09420-0"},{"key":"e_1_2_12_7_1","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13467"},{"key":"e_1_2_12_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.120484"},{"key":"e_1_2_12_9_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-35325-y"},{"key":"e_1_2_12_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100823"},{"key":"e_1_2_12_11_1","doi-asserted-by":"crossref","unstructured":"P.YadavandS.Sharma \u201cQ\u2010Learning Based Optimized Localization in WSN \u201d in2023 6th International Conference on Information Systems and Computer Networks (ISCON)(IEEE 2023) 1\u20135.","DOI":"10.1109\/ISCON57294.2023.10112130"},{"key":"e_1_2_12_12_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12061320"},{"key":"e_1_2_12_13_1","doi-asserted-by":"crossref","unstructured":"N.Tariq R.Khan M. F.Almufareh M.Humayun andM.Shaheen \u201cA Federated Learning Mechanism for Mitigating Selective Forwarding Attacks in RPL\u2010Based Internet of Things \u201d in2024 IEEE International Conference on Communications Workshops (ICC Workshops)(IEEE 2024) 871\u2013877.","DOI":"10.1109\/ICCWorkshops59551.2024.10615385"},{"key":"e_1_2_12_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-024-10907-y"},{"key":"e_1_2_12_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/s24175834"},{"key":"e_1_2_12_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2023.2218852"},{"key":"e_1_2_12_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-024-06118-5"},{"key":"e_1_2_12_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.6124"},{"key":"e_1_2_12_19_1","doi-asserted-by":"publisher","DOI":"10.1049\/2024\/4449798"},{"key":"e_1_2_12_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3386468"},{"key":"e_1_2_12_21_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21010023"},{"key":"e_1_2_12_22_1","doi-asserted-by":"crossref","unstructured":"O. A.Mahdi A.Alazab S.Bevinakoppa N.Ali andA.Khraisat \u201cEnhancing IoT Intrusion Detection System Performance With the Diversity Measure as a Novel Drift Detection Method \u201d in2023 9th International Conference on Information Technology Trends (ITT)(IEEE 2023) 50\u201354.","DOI":"10.1109\/ITT59889.2023.10184268"},{"key":"e_1_2_12_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3268064"},{"key":"e_1_2_12_24_1","doi-asserted-by":"publisher","DOI":"10.30574\/gjeta.2023.15.1.0075"},{"key":"e_1_2_12_25_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12030482"},{"key":"e_1_2_12_26_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23135792"},{"key":"e_1_2_12_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3365634"},{"key":"e_1_2_12_28_1","doi-asserted-by":"publisher","DOI":"10.3390\/app13084682"},{"key":"e_1_2_12_29_1","doi-asserted-by":"crossref","unstructured":"G.Qaiser S.Chandrasekaran R.Chai andJ.Zheng \u201cClassifying DDoS Attack in Industrial Internet of Services Using Machine Learning \u201d in2023 15th International Conference on Computer and Automation Engineering (ICCAE)(IEEE 2023) 546\u2013550.","DOI":"10.1109\/ICCAE56788.2023.10111178"},{"key":"e_1_2_12_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.08.013"},{"key":"e_1_2_12_31_1","doi-asserted-by":"publisher","DOI":"10.3390\/su151612406"},{"key":"e_1_2_12_32_1","doi-asserted-by":"publisher","DOI":"10.3390\/app13020831"},{"key":"e_1_2_12_33_1","doi-asserted-by":"crossref","unstructured":"S. K.NayakandS.Ghosh \u201cRPL Routing Protocol for Data Transmisison in Internet of Things Applications \u201d in2023 2nd International Conference for Innovation in Technology (INOCON)(IEEE 2023) 1\u20138.","DOI":"10.1109\/INOCON57975.2023.10101305"},{"key":"e_1_2_12_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-020-01246-9"},{"key":"e_1_2_12_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-023-04248-8"},{"key":"e_1_2_12_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3023785"},{"key":"e_1_2_12_37_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi15020076"},{"key":"e_1_2_12_38_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21093173"},{"key":"e_1_2_12_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2751617"},{"key":"e_1_2_12_40_1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2023.0141065"},{"key":"e_1_2_12_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-022-01719-w"},{"key":"e_1_2_12_42_1","doi-asserted-by":"publisher","DOI":"10.52547\/ijict.13.2.17"},{"key":"e_1_2_12_43_1","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.13.5.198-208"},{"key":"e_1_2_12_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2024.103873"},{"key":"e_1_2_12_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3525798"},{"key":"e_1_2_12_46_1","doi-asserted-by":"crossref","unstructured":"Q.Al\u2010Na'amneh W.Dhifallah R.Hazaymihet\u00a0al. \u201cDIS Flooding Attack Impact in RPL\u2010Based 6LowPAN Network \u201d inMachine Intelligence Applications in Cyber\u2010Risk Management(IGI Global Scientific Publishing 2025) 69\u201384.","DOI":"10.4018\/979-8-3693-7540-2.ch004"},{"key":"e_1_2_12_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-022-04783-y"}],"container-title":["IET Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/cmu2.70067","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/cmu2.70067","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/cmu2.70067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T14:40:49Z","timestamp":1773672049000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/cmu2.70067"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1049\/cmu2.70067"],"URL":"https:\/\/doi.org\/10.1049\/cmu2.70067","archive":["Portico"],"relation":{},"ISSN":["1751-8628","1751-8636"],"issn-type":[{"value":"1751-8628","type":"print"},{"value":"1751-8636","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2024-09-20","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-23","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70067"}}