Reference Hub7
A Novel Intrusion Detection System for Internet of Things Network Security

A Novel Intrusion Detection System for Internet of Things Network Security

Arun Kumar Bediya, Rajendra Kumar
Copyright: © 2021 |Volume: 14 |Issue: 3 |Pages: 18
ISSN: 1938-7857|EISSN: 1938-7865|EISBN13: 9781799860020|DOI: 10.4018/JITR.2021070102
Cite Article Cite Article

MLA

Bediya, Arun Kumar, and Rajendra Kumar. "A Novel Intrusion Detection System for Internet of Things Network Security." JITR vol.14, no.3 2021: pp.20-37. http://doi.org/10.4018/JITR.2021070102

APA

Bediya, A. K. & Kumar, R. (2021). A Novel Intrusion Detection System for Internet of Things Network Security. Journal of Information Technology Research (JITR), 14(3), 20-37. http://doi.org/10.4018/JITR.2021070102

Chicago

Bediya, Arun Kumar, and Rajendra Kumar. "A Novel Intrusion Detection System for Internet of Things Network Security," Journal of Information Technology Research (JITR) 14, no.3: 20-37. http://doi.org/10.4018/JITR.2021070102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Internet of things (IoT) comprises a developing ecosystem of responsive and interconnected devices, sensors, networks, and software. The internet of things keeps on extending with the number of its different equipment segments for smart cities, healthcare, smart homes, assisted living, smart vehicles, transportation, framework, and many more are the areas where the internet of things benefits human lives. IoT networks are meant to be monitored on real-time events, and if these devices get attacked, it can have an unfavorable effect on the system. This paper discussed many possible attacks at IoT networks and distributed denial of service (DDoS) attack is one of the most dangerous among them. Blockchain technology can be utilized to develop a framework to protect IoT systems; blockchain is a new technology used for cryptocurrency transactions. This paper proposed BIoTIDS an intrusion detection system for the IoT network using blockchain. BIoTIDS is able to detect an intruder in the IoT network and also able to identify DDoS attacks in IoT networks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.