Abstract
Security of Embedded Systems (ES) has become a major concern due to their growing usage in numerous industries. Their connectivity to the internet made them vulnerable to sophisticated cyber-attacks. One of the most important strategies for strengthening their security posture is using Intrusion Detection Systems (IDS). However, the limited resources of ES make it difficult to utilize IDS. This paper reviews the primary studies that contributed to developing IDS systems applicable to ES. It examines the challenges of building such systems, reports the current trends, and proposes future recommendations to enhance the deployment of IDS in ES. The findings showed that most studies currently employ machine and deep learning algorithms to build IDS for ES. Although significant results were achieved, several gaps were reported. The proposed frameworks did not investigate the security, privacy, and interpretability concerns of employing machine and deep learning. Moreover, a feasible framework to address all the ES resource constraints is lacking. Future recommendations include solutions to enhance such models’ security, privacy, and interoperability. Moreover, it includes the employment of differential privacy, explainable artificial intelligence, federated learning, and trusted executed environments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Vahid, F., Givargis, T.D.: Embedded System Design: A Unified Hardware/Software Introduction. Wiley, New York (2001)
Papp, D., Ma, Z., Buttyan, L.: Embedded systems security: threats, vulnerabilities, and attack taxonomy. In: 2015 13th Annual Conference on Privacy, Security and Trust (PST), Izmir, Turkey, pp. 145-152 (2015)
Hammoudeh, M., Newman, R.: Information extraction from sensor networks using the Watershed transform algorithm. Inf. Fusion 22, 39–49 (2015)
Ambrose, J.A., Ragel, R.G., Jayasinghe, D., Li, T., Parameswaran, S.: Side channel attacks in embedded systems: a tale of hostilities and deterrence. In: Sixteenth International Symposium on Quality Electronic Design, Santa Clara, CA, USA, pp. 452–459 (2015)
Azzedin, F., Albinali, H.: Security in Internet of Things: RPL attacks taxonomy. In: The 5th International Conference on Future Networks & Distributed Systems, pp. 820–825 (2021)
Azzedin, F., Alhejri, I.: A layered taxonomy of internet of things attacks. In: Proceedings of the 6th International Conference on Future Networks & Distributed Systems, pp. 631–636 (2022)
Epiphaniou, G., Pillai, P., Bottarelli, M., Al-Khateeb, H., Hammoudesh, M., Maple, C.: Electronic regulation of data sharing and processing using smart ledger technologies for supply-chain security. IEEE Trans. Eng. Manage. 67(4), 1059–1073 (2020)
Benoudifa, O., Wakrime, A.A., Benaini, R.: Autonomous solution for controller placement problem of software-defined networking using MuZero based intelligent agents. J. King Saud Univ.-Comput. Inf. Sci. 35(10), 101842 (2023)
Saadatmand, M., Cicchetti, A., Sjödin, M.: On generating security implementations from models of embedded systems. In: International Conference on Software Engineering Advances, Barcelona, Spain, (2011)
Cysneiros, L.M., do Prado Leite, J.C.S.: Nonfunctional requirements: from elicitation to conceptual models. IEEE Trans. Softw. Eng. 30(5), 328–350 (2004)
Gala, Y., Vanjari, N., Doshi, D., Radhanpurwala, I.: AI based techniques for network-based intrusion detection system: a review. In: 2023 10th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, pp. 1544–1551 (2023)
Sethi, K., Kumar, R., Prajapati, N., Bera, P.: A lightweight intrusion detection system using Benford’s law and network flow size difference. In: 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS), Bengaluru, India, pp. 1–6 (2020)
Carlin, A., Hammoudeh, M., Aldabbas, O.: Intrusion detection and countermeasure of virtual cloud systems-state of the art and current challenges. Int. J. Adv. Comput. Sci. Appl. 6(6) (2015)
Lahbib, A., Ait Wakrime, A., Laouiti, A., Toumi, K., Martin, S.: An event-B based approach for formal modelling and verification of smart contracts. In: Advanced Information Networking and Applications: Proceedings of the 34th International Conference on Advanced Information Networking and Applications (AINA-2020), pp. 1303–1318 (2020)
Aloseel, A., He, H., Shaw, C., Khan, M.A.: Analytical review of cybersecurity for embedded systems. IEEE Access 9, 961–982 (2021)
Bansod, G., Raval, N., Pisharoty, N.: Implementation of a new lightweight encryption design for embedded security. IEEE Trans. Inf. Forensics Secur. 10(1), 142–151 (2015)
Koopman, P.: Embedded System Security. Computer 37(7), 95–97 (2004)
National Institute of Standards and Technology. https://www.nist.gov/publications/intrusion-detection-systems
Binbusayyis, A., Vaiyapuri, T.: Comprehensive analysis and recommendation of feature evaluation measures for intrusion detection. Heliyon 6(7), e04262 (2020)
Kumar, S., Gupta, S., Arora, S.: Research trends in network-based intrusion detection systems: a review. IEEE Access 9, 157761–157779 (2021)
Aloseel, A., He, H., Shaw, C., Khan, M.A.: Analytical review of cybersecurity for embedded systems. IEEE Access 9, 961–982 (2020)
Ghorbani, A.A., Lu, W., Tavallaee, M.: Network Intrusion Detection and Prevention: Concepts and Techniques. Springer Science & Business Media, 47 (2009). https://doi.org/10.1007/978-0-387-88771-5
Anchugam, C.V., Thangadurai, K.: Classification of network attacks and countermeasures of different attacks. In: Network Security Attacks and Countermeasures, pp. 115–156. IGI Global (2016)
Agrawal, S., et al.: Federated Learning for Intrusion Detection System: Concepts. Challenges and Future Directions, Computer Communications (2022)
Butt, M.A., Qayyum, A., Ali, H., Al-Fuqaha, A., Qadir, J.: Towards secure private and trustworthy human-centric embedded machine learning: an emotion-aware facial recognition case study. Comput. Secur. 125, 103058 (2023)
Hammoudeh, M., Newman, R., Dennett, C., Mount, S., Aldabbas, O.: Map as a service: a framework for visualising and maximising information return from multi-modal wireless sensor networks. Sensors 15(9), 22970–23003 (2015)
Balasaraswathi, V.R., Sugumaran, M., Hamid, Y.: Feature selection techniques for intrusion detection using non-bio-inspired and bio-inspired optimization algorithms. J. Commun. Inf. Netw. 2, 107–119 (2017)
Walshe, M., Epiphaniou, G., Al-Khateeb, H., Hammoudeh, M., Katos, V., Dehghantanha, A.: Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments. Ad Hoc Netw. 95, 101988 (2019)
Liu, H., Lang, B.: Machine learning and deep learning methods for intrusion detection systems: a survey. Appl. Sci. 9(20), 4396 (2019)
Sharmila, B.S., Nagapadma, R.: Quantized autoencoder (QAE) intrusion detection system for anomaly detection in resource-constrained IoT devices using RT-IoT2022 dataset. Cybersecurity 6(1), 41 (2023)
Mahbooba, B., Timilsina, M., Sahal, R., Serrano, M.: Explainable artificial intelligence (XAI) to enhance trust management in intrusion detection systems using decision tree model. Complexity 2021, 1–11 (2021)
Martinez, C.V., Vogel-Heuser, B.: A host intrusion detection system architecture for embedded industrial devices. J. Franklin Inst. 358(1), 210–236 (2021)
Reyes, D.L., Perez-Pons, A., Dean, R.B.: Anomaly detection in embedded devices through hardware introspection. In: 2023 Silicon Valley Cybersecurity Conference (SVCC), pp. 1–7, IEEE, San Jose, CA, USA (2023)
de Almeida Florencio, F., Moreno, E.D., Macedo, H.T., de Britto Salgueiro, R.J.P., do Nascimento, F.B., Santos, F.A.O.: Intrusion detection via MLP neural network using an arduino embedded system. In: 2018 VIII Brazilian Symposium on Computing Systems Engineering (SBESC), pp. 190–195. IEEE, Salvador, Brazil (2018)
Liu, M., Xue, Z., He, X.: Two-tier intrusion detection framework for embedded systems. IEEE Consum. Electron. Mag. 10(5), 102–108 (2020)
Khan, H.A., et al.: IDEA: intrusion detection through electromagnetic-signal analysis for critical embedded and cyber-physical systems. IEEE Trans. Dependable Secure Comput. 18(3), 1150–1163 (2019)
Kadar, M., Tverdyshev, S., Fohler, G.: Towards host intrusion detection for embedded industrial systems. In: 2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S), pp. 5–8. IEEE, Valencia, Spain (2020)
Viegas, E., Santin, A., Oliveira, L., Franca, A., Jasinski, R., Pedroni, V.: A reliable and energy-efficient classifier combination scheme for intrusion detection in embedded systems. Comput. Secur. 78, 16–32 (2018)
Viegas, E.K., Santin, A.O., Oliveira, L.S.: Toward a reliable anomaly-based intrusion detection in real-world environments. Comput. Netw. 127, 200–216 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Alansari, A., Alfaqeer, R., Hammoudeh, M. (2024). A Review of the Progressive Odyssey of AI-Driven Intrusion Detection Within Embedded Systems. In: Ait Wakrime, A., Navarro-Arribas, G., Cuppens, F., Cuppens, N., Benaini, R. (eds) Risks and Security of Internet and Systems. CRiSIS 2023. Lecture Notes in Computer Science, vol 14529. Springer, Cham. https://doi.org/10.1007/978-3-031-61231-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-031-61231-2_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-61230-5
Online ISBN: 978-3-031-61231-2
eBook Packages: Computer ScienceComputer Science (R0)