Abstract
This review presents the current state-of-the-art of the Distributed Ledger Technology (DLT) model used in the Collaborative Intrusion Detection System (CIDS) for anomaly detection in Internet of Things (IoT) network. The distributed IoT ecosystem has many cybersecurity problems related to anomalous activities on the network. CIDS technology is usually applied to detect anomalous activities on the IoT network. CIDS is suitable for IoT network because they have the same distributed characteristic. The use of DLT technology is expected to be able to help the IDS system accelerate detection and increase the accuracy of detection through a collaborative detection mechanism. This review will look more deeply at the placement strategies, detection method, security threat, and validation & testing method from CIDS with DLT-based for IoT network. This review also discusses the open issue and the lesson learned at the end of the review. The result is expected to produce the next research topic and help professionals design effective CIDS based on DLT for the IoT network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun. Surv. Tutorials 17(4), 2347–2376 (2015). https://doi.org/10.1109/COMST.2015.2444095
Wardana, A.A., Rakhmatsyah, A., Minarno, A.E., Anbiya, D.R.: Internet of Things Platform for Manage Multiple Message Queuing Telemetry Transport Broker Server. Kinet. Game Technol. Inf. Syst. Comput. Network, Comput. Electron. Contr. 4(3), 197–206 (2019). https://doi.org/10.22219/kinetik.v4i3.841
Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4(5), 1125–1142 (2017). https://doi.org/10.1109/JIOT.2017.2683200
Zarpelão, B.B., Miani, R.S., Kawakani, C.T., de Alvarenga, S.C.: A survey of intrusion detection in Internet of Things. J. Netw. Comput. Appl. 84(February), 25–37 (2017). https://doi.org/10.1016/j.jnca.2017.02.009
Zhou, C.V., Leckie, C., Karunasekera, S.: A survey of coordinated attacks and collaborative intrusion detection. Comput. Secur. 29(1), 124–140 (2010). https://doi.org/10.1016/j.cose.2009.06.008
Arshad, J., Azad, M.A., Amad, R., Salah, K., Alazab, M., Iqbal, R.: A review of performance, energy and privacy of intrusion detection systems for IoT. Electron. 9(4), 1–24 (2020). https://doi.org/10.3390/electronics9040629
Meng, W., Tischhauser, E.W., Wang, Q., Wang, Y., Han, J.: When intrusion detection meets blockchain technology: a review. IEEE Access, 6(c), 10179–10188 (2018). https://doi.org/10.1109/ACCESS.2018.2799854
Al’Aziz, B.A.A., Sukarno, P., Wardana, A.A.: Blacklisted IP distribution system to handle DDoS attacks on IPS Snort based on Blockchain. Proceeding - 6th Inf. Technol. Int. Semin. ITIS 2020 41–45 (2020). https://doi.org/10.1109/ITIS50118.2020.9320996
Benaddi, H., Ibrahimi, K. : A Review: Collaborative Intrusion Detection for IoT integrating the Blockchain technologies. In: Proceedings of the 2020 International Conference Wireless Networks Mobile Communication. WINCOM 2020,(2020). https://doi.org/10.1109/WINCOM50532.2020.9272464
Verma, A., Ranga, V.: Security of RPL based 6LoWPAN networks in the internet of things: a review. IEEE Sens. J. 20(11), 5666–5690 (2020). https://doi.org/10.1109/JSEN.2020.2973677
Rauchs, M., et al.: Distributed Ledger Technology Systems: A Conceptual Framework. SSRN Electron. J. (2018) https://doi.org/10.2139/ssrn.3230013
Kannengießer, N., Lins, S., Dehling, T., Sunyaev, A.: Trade-offs between Distributed Ledger Technology Characteristics. ACM Comput. Surv. 53(2), 42:1–42:37 (2020) https://doi.org/10.1145/3379463
El Ioini, N., Pahl, C.: A review of distributed ledger technologies. In: Panetto, H., Debruyne, C., Proper, H.A., Ardagna, C.A., Roman, D., Meersman, R. (eds.) On the Move to Meaningful Internet Systems. OTM 2018 Conferences. Lecture Notes in Computer Science, vol. 11230, pp. 277–288. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-02671-4_16
Siano, P., De Marco, G., Rolan, A., Loia, V.: A survey and evaluation of the potentials of distributed ledger technology for peer-to-peer transactive energy exchanges in local energy markets. IEEE Syst. J. 13(3), 3454–3466 (2019). https://doi.org/10.1109/JSYST.2019.2903172
Putra, G.D., Dedeoglu, V., Kanhere, S.S., Jurdak, R.: Poster abstract: Towards scalable and trustworthy decentralized collaborative intrusion detection system for IoT. In: Proc. - 5th ACM/IEEE Conf. Internet Things Des. Implementation, IoTDI 2020, pp. 256–257 (2020). https://doi.org/10.1109/IoTDI49375.2020.00035
Li, W., Tug, S., Meng, W., Wang, Y.: Designing collaborative blockchained signature-based intrusion detection in IoT environments. Futur. Gener. Comput. Syst. 96, 481–489 (2019). https://doi.org/10.1016/j.future.2019.02.064
Mirsky, Y., Golomb, T., Elovici, Y.: Lightweight collaborative anomaly detection for the IoT using blockchain. J. Parallel Distrib. Comput. 145, 75–97 (2020). https://doi.org/10.1016/j.jpdc.2020.06.008
Kumar, P., Kumar, R., Gupta, G.P., Tripathi, R.: A distributed framework for detecting DDoS attacks in smart contract-based blockchain-IoT systems by leveraging fog computing. Trans. Emerg. Telecommun. Technol. 32(6), 1–31 (2021). https://doi.org/10.1002/ett.4112
Golomb, T., Mirsky, Y., Elovici, Y.: CIoTA: Collaborative Anomaly Detection via Blockchain (2018). https://doi.org/10.14722/diss.2018.23003
Hu, B., Zhou, C., Tian, Y.C., Qin, Y., Junping, X.: A Collaborative Intrusion Detection Approach Using Blockchain for Multimicrogrid Systems. IEEE Trans. Syst. Man, Cybern. Syst. 49( 8), 1720–1730 (2019). https://doi.org/10.1109/TSMC.2019.2911548
Alkadi, O., Moustafa, N., Turnbull, B., Choo, K.K.R.: A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks. IEEE Internet Things J. 8(12), 9463–9472 (2021). https://doi.org/10.1109/JIOT.2020.2996590
Vasilomanolakis, E., Karuppayah, S., Muhlhauser, M., Fischer, M.: Taxonomy and survey of collaborative intrusion detection. ACM Comput. Surv. 47(4), 1–33 (2015). https://doi.org/10.1145/2716260
Liao, H.J., Richard Lin, C.H., Lin, Y.C., Tung, K.Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1) 16–24 (2013). https://doi.org/10.1016/j.jnca.2012.09.004
Alaba, F.A., Othman, M., Hashem, I.A.T., Alotaibi, F.: Internet of things security: a survey. J. Netw. Comput. Appl. 88(April), 10–28 (2017). https://doi.org/10.1016/j.jnca.2017.04.002
Jiang, J., Li, Z., Tian, Y., Al-Nabhan, N.: A Review of Techniques and Methods for IoT Applications in Collaborative Cloud-Fog Environment. Secur. Commun. Netw. 2020, (2020). https://doi.org/10.1155/2020/8849181
Da Xu, L., He, W., Li, S.: Internet of things in industries: a survey. IEEE Trans. Ind. Informatics 10(4), 2233–2243 (2014). https://doi.org/10.1109/TII.2014.2300753
Warzynski, A., Kolaczek, G.: Intrusion detection systems vulnerability on adversarial examples. In: 2018 IEEE International Confernce Innovation Intelligence System Application INISTA 2018,pp. 31–34 (2018). https://doi.org/10.1109/INISTA.2018.8466271
Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J., Alazab, A.: A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks. Electron. 8(11), (2019). https://doi.org/10.3390/electronics8111210
Asharf, J., Moustafa, N., Khurshid, H., Debie, E., Haider, W., Wahab, A.: A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions. Electron. 9(7), 1–4 (2020). https://doi.org/10.3390/electronics9071177
Dasgupta, D., Shrein, J.M., Gupta, K.D.: A survey of blockchain from security perspective. J. Banking Financial Technol. 3(1), 1–17 (2018). https://doi.org/10.1007/s42786-018-00002-6
Antal, C., Cioara, T., Anghel, I., Antal, M., Salomie, I.: Distributed ledger technology review and decentralized applications development guidelines. Futur. Internet 13(3), 1–32 (2021). https://doi.org/10.3390/fi13030062
Natarajan, H., Krause, S.K., Gradstein, H.L.: Distributed Ledger Technology (DLT) and Blockchain. FinTech Note, 1, pp. 1–60, (2017). http://hdl.handle.net/10986/29053%0Ahttp://documents.worldbank.org/curated/en/177911513714062215/pdf/122140-WP-PUBLIC-Distributed-Ledger-Technology-and-Blockchain-Fintech-Notes.pdf
Chowdhury, M.J.M., et al.: A comparative analysis of distributed ledger technology platforms. IEEE Access 7, 167930–167943 (2019). https://doi.org/10.1109/ACCESS.2019.2953729
Farahani, B., Firouzi, F., Luecking, M.: The convergence of IoT and distributed ledger technologies (DLT): Opportunities, challenges, and solutions. J. Netw. Comput. Appl. 177 102936 (2021). https://doi.org/10.1016/j.jnca.2020.102936
Pandl, K.D., Thiebes, S., Schmidt-Kraepelin, M., Sunyaev, A.: On the convergence of artificial intelligence and distributed ledger technology: a scoping Review and future research agenda. IEEE Access 8, 57075–57095 (2020). https://doi.org/10.1109/ACCESS.2020.2981447
Harris, J.D., Waggoner, B.: Decentralized and collaborative AI on blockchain. In: Proceedings of the 2019 2nd IEEE International Conference Blockchain,Blockchain 2019(2) 368–375 (2019). https://doi.org/10.1109/Blockchain.2019.00057
Montes, G.A., Goertzel, B.: Distributed, decentralized, and democratized artificial intelligence. Technol. Forecast. Soc. Change 141 2018 354–358 (2019). https://doi.org/10.1016/j.techfore.2018.11.010
Li, W., Wang, Y., Li, J., Au, M.H.: Toward a blockchain-based framework for challenge-based collaborative intrusion detection. Int. J. Inf. Secur. 20(2), 127–139 (2020). https://doi.org/10.1007/s10207-020-00488-6
Meng, W., Tischhauser, E.W., Wang, Q., Wang, Y., Han, J.: When intrusion detection meets blockchain technology: a review. IEEE Access 6, 10179–10188 (2018). https://doi.org/10.1109/ACCESS.2018.2799854
Alkadi, O., Moustafa, N., Turnbull, B.: A review of intrusion detection and blockchain applications in the cloud: approaches, challenges and solutions. IEEE Access 8, 104893–104917 (2020). https://doi.org/10.1109/ACCESS.2020.2999715
Acknowledgements
The first author would like to thank Wroclaw University of Science and Technology (WUST) and Narodowa Agencja Wymiany Akademickiej (NAWA) for funding this research through PhD scholarship and NAWA STER scholarship. Also, thanks to Telkom University for all the support during this research and PhD studies.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Wardana, A.A., Kołaczek, G., Sukarno, P. (2022). Collaborative Intrusion Detection System for Internet of Things Using Distributed Ledger Technology: A Survey on Challenges and Opportunities. In: Nguyen, N.T., Tran, T.K., Tukayev, U., Hong, TP., Trawiński, B., Szczerbicki, E. (eds) Intelligent Information and Database Systems. ACIIDS 2022. Lecture Notes in Computer Science(), vol 13757. Springer, Cham. https://doi.org/10.1007/978-3-031-21743-2_27
Download citation
DOI: https://doi.org/10.1007/978-3-031-21743-2_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-21742-5
Online ISBN: 978-3-031-21743-2
eBook Packages: Computer ScienceComputer Science (R0)