Abstract
The IoT has recently been widely used in smart homes and smart cities design. With various services and application domains. (IoT) connects objects with internet to make our life easier, which leads IoT environments vulnerable to different kinds of attacks. Threats to IoT are increasing due to large number of devices with different standards are connected. Intrusion Detection System (IDS) is used to protect from various types of attacks. Intrusion detection system (IDS) works in the network layer of an IoT system. This paper highlights the issues related IoT security, discusses literature on implementation of IDS for IoT using ML algorithms and also makes few suggestions. An IDS designed for IoT should operate under stringent conditions. More IDS have to be designed to detect major attacks to safe guard IoT.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bahga, A., et al.: IoT: A Hands on Approach. University Press, Cambridge (2017)
https://builtin.com/internet-things. Accessed 04 Apr 2018
www.moneycontrol.com. Accessed 04 Apr 2018
Borgia, E.: The Internet of Things vision: key features, applications and open issues. Comput. Commun. 54, 1–31 (2014)
Hamzei, M., Navimipour, N.J.: Toward efficient service composition techniques in the Internet of Things. IEEE IoT J. 5(5), 3774–3787 (2018)
Sarma, S., Brock, D.: The Internet of Things, White Paper, Auto-ID center. MIT (1998)
Kortuem, et al.: Smart objects as building blocks for the internet of things. IEEE Internet Comput. 14(1), 44–51. https://doi.org/10.1109/mic.2009.143
Adat, V., et al.: Security in internet of things: issues, challenges, taxonomy and architecture. Telecommun. Syst. 67, 423–441 (2017)
Jan, S.U., et al.: Toward a lightweight intrusion detection system for the IoT. IEEE Access 7, 42450–42471 (2019)
Hudo, E., et al.: Threat analysis of IoT network using artificial neural network, pp. 1–5 (2017)
Lazarevic, A., Kumar, V., Srivastava, J.: Intrusion detection: a survey, pp. 19–78 (2005)
Choudhary, S., et al.: Intrusion detection system for Internet of Things. Int. J. Inf. Secur. Privacy 13(1), 86–105 (2019)
Amaral, J.P., Oliveira, L.M., Rodrigues, J.J., Han, G., Shu, L.: Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks. In: 2014 IEEE International Conference on Communications (ICC), pp. 1796–1801. IEEE, June 2014
Sing, V.P.: Hello flood attack and its countermeasures in wireless sensor networks. IJCSI Int. J. Comput. Sci. Issues 7(3), 23 (2010)
Anthoniraj, J., Abdul, R.T.: Clone attack detection protocols in wireless sensor networks: a survey. Int. J. Comput. Appl. 98, 43–49 (2014). https://doi.org/10.5120/17183-7281
Stergiou, C., Psannis, K.E., Kim, B.G., Gupta, B.: Secure integration of IoT and cloud computing. Future Gener. Comput. Syst. (2016). https://doi.org/10.1016/j.future.2016.11.03
Pacheco, J., et al.: IoT security framework for smart cyber infrastructures. In: IEEE 1st International Workshops on Foundations and Applications of Self Systems, Germany (2016)
Fu, R., Zheng, K., Zhang, D., Yang, Y. An intrusion detection scheme based on anomaly mining in Internet of Things (2011)
Rajasegarar, S., Leckie, C., Palaniswami, M., Bezdek, J.C.: Distributed anomaly detection in wireless sensor networks. In: 2006 10th IEEE Singapore International Conference on Communication Systems, Singapore, pp. 1–5 (2006)
Ham, H.-S., Kim, H.-H., Kim, M.-S., Choi, M.-J.: Linear SVM-based android malware detection for reliable IoT services. J. Appl. Math., 1–10 (2014). https://doi.org/10.1155/2014/594501
Cervantes, C., Poplade, D., Nogueira, M., Santos, A.: Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 606–611. IEEE, May 2015
Rahman, S., Ahmed, M., Kaiser, M.S.: ANFIS based cyber physical attack detection system. In: 5th International Conference on Informatics, Electronics and Vision (ICIEV), Dhaka, 2016, pp. 944–948 (2016)
Chaudhary, V.K., Upadhyay, S.K.: Distributed intrusion detection system using sensor based mobile agent technology. Int. J. Innov. Eng. Technol. (IJIET) 3(1), 220–226 (2013)
Hodo, E., Bellekens, X., Hamilton, A., Dubouilh, P.L., Iorkyase, E., Tachtatzis, C., Atkinson, R.: Threat analysis of IoT networks using artificial neural network intrusion detection system. In: 2016 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1–6 (2016)
Diro, A., Chilamkurti, N.: Leveraging LSTM networks for attack detection in fog-to-things communications. IEEE Commun. Mag. 56, 124–130 (2018)
Amin, S.O., Siddiqui, M.S., Hong, C.S., Choe, J.: A novel coding scheme to implement signature based IDS in IP based Sensor Networks. In: IFIP/IEEE International Symposium on Integrated Network, Management-Workshops IM 2009, pp. 269–274. IEEE, June 2009
Oh, D., et al.: A malicious pattern detection engine for embedded security systems in the Internet of Things. Sensors. 14(12), 24188–24211 (2014)
Sun, H., Wang, X., Buyya, R., Su, J.: CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices. Softw. Pract. Exp. 47(3), 421–441 (2017). https://doi.org/10.1002/spe.2420
Misra, S., Krishna, P.V., Agarwal, H., Saxena, A., Obaidat, M.S.: A learning automata based solution for preventing distributed denial of service in Internet of Things. In: 2011 International Conference on and 4th International Conference on Cyber, Physical and Social Computing Internet of Things (iThings/CPSCom), pp. 114–122 (2011)
Piqueras Jover, R.: Security attacks against the availability of LTE mobility networks: overview and research directions. In: 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC), Atlantic City, NJ, pp. 1–9 (2013)
Xia, Y., Lin, H., Xu, L.: An AGV mechanism based secure routing protocol for Internet of Things. In: IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, Liverpool, pp. 662–666 (2015)
Yang, L.: Future Internet 2018, vol. 11, p. 65 (2018). https://doi.org/10.3390/fi11030065
Ahmed, Firoz, et al.: Mitigation of black hole attacks in routing protocol for low power and lossy networks. Secur. Commun. Netw. 9, 5143–5154 (2016)
Le, A., Loo, J., Chai, K.K., Aiash, M.: Specification-based IDS for detecting attacks on RPL based network topology. Information 7(2), 25 (2016). https://doi.org/10.3390/info7020025
Kasinathan, P., Costamagna, G., Khaleel, H., Pastrone, C., Spirito, M.A.: DEMO: an IDS framework for internet of things empowered by 6LoWPAN. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 1337–1340. ACM, November 2013
Raza, S., Duquennoy, S., Chung, T., Yazar, D., Voigt, T., Roedig, U.: Securing communication in 6LoWPAN with compressed IPsec. In: 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), pp. 1–8. IEEE, June 2011
Sedjelmaci, H., Senouci, S.M., Feham, M.: Intrusion detection framework of cluster-based wireless sensor network. In: IEEE ISCC, Cappadocia, Turkey, pp. 893–897 (2012)
Midi, D., Rullo, A., Mudgerikar, A., Bertino, E.: Kalis — a system for knowledge-driven adaptable intrusion detection for the Internet of Things. In: IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, pp. 656–666 (2017)
Conti, M., Dehghantanha, A., Franke, K., Watson, S.: Internet of Things security and forensics: challenges and opportunities. Future Gener. Comput. Syst. 78 (2017). https://doi.org/10.1016/j.future.2017.07.060
Lopez-Martin, M.: Conditional variational auto encoder for prediction and feature recovery applied to intrusion detection in IoT. Sensors 17, 1967 (2017). https://doi.org/10.3390/s17091967
Flauzac, O., Gonzalez, C., Hachani, A., Nolot, F.: SDN based architecture for IoT and Improvement of the Security. In: 29th International Conference on Advanced Information Networking and Applications Workshops WAINA, pp. 688–693 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Meera, A.J., Kantipudi, M.V.V.P., Aluvalu, R. (2021). Intrusion Detection System for the IoT: A Comprehensive Review. In: Abraham, A., Jabbar, M., Tiwari, S., Jesus, I. (eds) Proceedings of the 11th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2019). SoCPaR 2019. Advances in Intelligent Systems and Computing, vol 1182. Springer, Cham. https://doi.org/10.1007/978-3-030-49345-5_25
Download citation
DOI: https://doi.org/10.1007/978-3-030-49345-5_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-49344-8
Online ISBN: 978-3-030-49345-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)