Skip to main content

Intrusion Detection System for the IoT: A Comprehensive Review

  • Conference paper
  • First Online:
Proceedings of the 11th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2019) (SoCPaR 2019)

Abstract

The IoT has recently been widely used in smart homes and smart cities design. With various services and application domains. (IoT) connects objects with internet to make our life easier, which leads IoT environments vulnerable to different kinds of attacks. Threats to IoT are increasing due to large number of devices with different standards are connected. Intrusion Detection System (IDS) is used to protect from various types of attacks. Intrusion detection system (IDS) works in the network layer of an IoT system. This paper highlights the issues related IoT security, discusses literature on implementation of IDS for IoT using ML algorithms and also makes few suggestions. An IDS designed for IoT should operate under stringent conditions. More IDS have to be designed to detect major attacks to safe guard IoT.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bahga, A., et al.: IoT: A Hands on Approach. University Press, Cambridge (2017)

    Google Scholar 

  2. https://www.iotforall.com/what-is-iot-simple-explanation/

  3. https://builtin.com/internet-things. Accessed 04 Apr 2018

  4. www.moneycontrol.com. Accessed 04 Apr 2018

  5. Borgia, E.: The Internet of Things vision: key features, applications and open issues. Comput. Commun. 54, 1–31 (2014)

    Article  Google Scholar 

  6. Hamzei, M., Navimipour, N.J.: Toward efficient service composition techniques in the Internet of Things. IEEE IoT J. 5(5), 3774–3787 (2018)

    Google Scholar 

  7. Sarma, S., Brock, D.: The Internet of Things, White Paper, Auto-ID center. MIT (1998)

    Google Scholar 

  8. Kortuem, et al.: Smart objects as building blocks for the internet of things. IEEE Internet Comput. 14(1), 44–51. https://doi.org/10.1109/mic.2009.143

  9. Adat, V., et al.: Security in internet of things: issues, challenges, taxonomy and architecture. Telecommun. Syst. 67, 423–441 (2017)

    Article  Google Scholar 

  10. Jan, S.U., et al.: Toward a lightweight intrusion detection system for the IoT. IEEE Access 7, 42450–42471 (2019)

    Article  Google Scholar 

  11. Hudo, E., et al.: Threat analysis of IoT network using artificial neural network, pp. 1–5 (2017)

    Google Scholar 

  12. Lazarevic, A., Kumar, V., Srivastava, J.: Intrusion detection: a survey, pp. 19–78 (2005)

    Google Scholar 

  13. Choudhary, S., et al.: Intrusion detection system for Internet of Things. Int. J. Inf. Secur. Privacy 13(1), 86–105 (2019)

    Article  Google Scholar 

  14. Amaral, J.P., Oliveira, L.M., Rodrigues, J.J., Han, G., Shu, L.: Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks. In: 2014 IEEE International Conference on Communications (ICC), pp. 1796–1801. IEEE, June 2014

    Google Scholar 

  15. Sing, V.P.: Hello flood attack and its countermeasures in wireless sensor networks. IJCSI Int. J. Comput. Sci. Issues 7(3), 23 (2010)

    Google Scholar 

  16. Anthoniraj, J., Abdul, R.T.: Clone attack detection protocols in wireless sensor networks: a survey. Int. J. Comput. Appl. 98, 43–49 (2014). https://doi.org/10.5120/17183-7281

    Article  Google Scholar 

  17. Stergiou, C., Psannis, K.E., Kim, B.G., Gupta, B.: Secure integration of IoT and cloud computing. Future Gener. Comput. Syst. (2016). https://doi.org/10.1016/j.future.2016.11.03

  18. Pacheco, J., et al.: IoT security framework for smart cyber infrastructures. In: IEEE 1st International Workshops on Foundations and Applications of Self Systems, Germany (2016)

    Google Scholar 

  19. Fu, R., Zheng, K., Zhang, D., Yang, Y. An intrusion detection scheme based on anomaly mining in Internet of Things (2011)

    Google Scholar 

  20. Rajasegarar, S., Leckie, C., Palaniswami, M., Bezdek, J.C.: Distributed anomaly detection in wireless sensor networks. In: 2006 10th IEEE Singapore International Conference on Communication Systems, Singapore, pp. 1–5 (2006)

    Google Scholar 

  21. Ham, H.-S., Kim, H.-H., Kim, M.-S., Choi, M.-J.: Linear SVM-based android malware detection for reliable IoT services. J. Appl. Math., 1–10 (2014). https://doi.org/10.1155/2014/594501

  22. Cervantes, C., Poplade, D., Nogueira, M., Santos, A.: Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 606–611. IEEE, May 2015

    Google Scholar 

  23. Rahman, S., Ahmed, M., Kaiser, M.S.: ANFIS based cyber physical attack detection system. In: 5th International Conference on Informatics, Electronics and Vision (ICIEV), Dhaka, 2016, pp. 944–948 (2016)

    Google Scholar 

  24. Chaudhary, V.K., Upadhyay, S.K.: Distributed intrusion detection system using sensor based mobile agent technology. Int. J. Innov. Eng. Technol. (IJIET) 3(1), 220–226 (2013)

    Google Scholar 

  25. Hodo, E., Bellekens, X., Hamilton, A., Dubouilh, P.L., Iorkyase, E., Tachtatzis, C., Atkinson, R.: Threat analysis of IoT networks using artificial neural network intrusion detection system. In: 2016 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1–6 (2016)

    Google Scholar 

  26. Diro, A., Chilamkurti, N.: Leveraging LSTM networks for attack detection in fog-to-things communications. IEEE Commun. Mag. 56, 124–130 (2018)

    Article  Google Scholar 

  27. Amin, S.O., Siddiqui, M.S., Hong, C.S., Choe, J.: A novel coding scheme to implement signature based IDS in IP based Sensor Networks. In: IFIP/IEEE International Symposium on Integrated Network, Management-Workshops IM 2009, pp. 269–274. IEEE, June 2009

    Google Scholar 

  28. Oh, D., et al.: A malicious pattern detection engine for embedded security systems in the Internet of Things. Sensors. 14(12), 24188–24211 (2014)

    Article  Google Scholar 

  29. Sun, H., Wang, X., Buyya, R., Su, J.: CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices. Softw. Pract. Exp. 47(3), 421–441 (2017). https://doi.org/10.1002/spe.2420

    Article  Google Scholar 

  30. Misra, S., Krishna, P.V., Agarwal, H., Saxena, A., Obaidat, M.S.: A learning automata based solution for preventing distributed denial of service in Internet of Things. In: 2011 International Conference on and 4th International Conference on Cyber, Physical and Social Computing Internet of Things (iThings/CPSCom), pp. 114–122 (2011)

    Google Scholar 

  31. Piqueras Jover, R.: Security attacks against the availability of LTE mobility networks: overview and research directions. In: 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC), Atlantic City, NJ, pp. 1–9 (2013)

    Google Scholar 

  32. Xia, Y., Lin, H., Xu, L.: An AGV mechanism based secure routing protocol for Internet of Things. In: IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, Liverpool, pp. 662–666 (2015)

    Google Scholar 

  33. Yang, L.: Future Internet 2018, vol. 11, p. 65 (2018). https://doi.org/10.3390/fi11030065

  34. Ahmed, Firoz, et al.: Mitigation of black hole attacks in routing protocol for low power and lossy networks. Secur. Commun. Netw. 9, 5143–5154 (2016)

    Article  Google Scholar 

  35. Le, A., Loo, J., Chai, K.K., Aiash, M.: Specification-based IDS for detecting attacks on RPL based network topology. Information 7(2), 25 (2016). https://doi.org/10.3390/info7020025

    Article  Google Scholar 

  36. Kasinathan, P., Costamagna, G., Khaleel, H., Pastrone, C., Spirito, M.A.: DEMO: an IDS framework for internet of things empowered by 6LoWPAN. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 1337–1340. ACM, November 2013

    Google Scholar 

  37. Raza, S., Duquennoy, S., Chung, T., Yazar, D., Voigt, T., Roedig, U.: Securing communication in 6LoWPAN with compressed IPsec. In: 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), pp. 1–8. IEEE, June 2011

    Google Scholar 

  38. Sedjelmaci, H., Senouci, S.M., Feham, M.: Intrusion detection framework of cluster-based wireless sensor network. In: IEEE ISCC, Cappadocia, Turkey, pp. 893–897 (2012)

    Google Scholar 

  39. Midi, D., Rullo, A., Mudgerikar, A., Bertino, E.: Kalis — a system for knowledge-driven adaptable intrusion detection for the Internet of Things. In: IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, pp. 656–666 (2017)

    Google Scholar 

  40. Conti, M., Dehghantanha, A., Franke, K., Watson, S.: Internet of Things security and forensics: challenges and opportunities. Future Gener. Comput. Syst. 78 (2017). https://doi.org/10.1016/j.future.2017.07.060

  41. Lopez-Martin, M.: Conditional variational auto encoder for prediction and feature recovery applied to intrusion detection in IoT. Sensors 17, 1967 (2017). https://doi.org/10.3390/s17091967

    Article  MathSciNet  Google Scholar 

  42. Flauzac, O., Gonzalez, C., Hachani, A., Nolot, F.: SDN based architecture for IoT and Improvement of the Security. In: 29th International Conference on Advanced Information Networking and Applications Workshops WAINA, pp. 688–693 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Akhil Jabbar Meera .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Meera, A.J., Kantipudi, M.V.V.P., Aluvalu, R. (2021). Intrusion Detection System for the IoT: A Comprehensive Review. In: Abraham, A., Jabbar, M., Tiwari, S., Jesus, I. (eds) Proceedings of the 11th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2019). SoCPaR 2019. Advances in Intelligent Systems and Computing, vol 1182. Springer, Cham. https://doi.org/10.1007/978-3-030-49345-5_25

Download citation

Publish with us

Policies and ethics