Reference Hub26
A Survey: Intrusion Detection Techniques for Internet of Things

A Survey: Intrusion Detection Techniques for Internet of Things

Sarika Choudhary, Nishtha Kesswani
Copyright: © 2019 |Volume: 13 |Issue: 1 |Pages: 20
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781522564607|DOI: 10.4018/IJISP.2019010107
Cite Article Cite Article

MLA

Choudhary, Sarika, and Nishtha Kesswani. "A Survey: Intrusion Detection Techniques for Internet of Things." IJISP vol.13, no.1 2019: pp.86-105. http://doi.org/10.4018/IJISP.2019010107

APA

Choudhary, S. & Kesswani, N. (2019). A Survey: Intrusion Detection Techniques for Internet of Things. International Journal of Information Security and Privacy (IJISP), 13(1), 86-105. http://doi.org/10.4018/IJISP.2019010107

Chicago

Choudhary, Sarika, and Nishtha Kesswani. "A Survey: Intrusion Detection Techniques for Internet of Things," International Journal of Information Security and Privacy (IJISP) 13, no.1: 86-105. http://doi.org/10.4018/IJISP.2019010107

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The latest buzzword in internet technology nowadays is the Internet of Things. The Internet of Things (IoT) is an ever-growing network which will transform real-world objects into smart or intelligent virtual objects. IoT is a heterogeneous network in which devices with different protocols can connect with each other in order to exchange information. These days, human life depends upon the smart things and their activities. Therefore, implementing protected communications in the IoT network is a challenge. Since the IoT network is secured with authentication and encryption, but not secured against cyber-attacks, an Intrusion Detection System is needed. This research article focuses on IoT introduction, architecture, technologies, attacks and IDS. The main objective of this article is to provide a general idea of the Internet of Things, various intrusion detection techniques, and security attacks associated with IoT.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.