Open Access Open Access  Restricted Access Subscription Access

A Review on Intrusion Detection Systems to Secure IoT Networks


Affiliations
1 Department of Computer Science, St. Joseph’s College (Autonomous) (Affiliated to Bharathidasan University), Tiruchirappalli, Tamil Nadu, India
 

The Internet of Things (IoT) and its rapid advancements will lead to everything being connected in the near future. The number of devices connected to the global network is increasing every day. IoT security challenges arise as a result of the large-scale incorporation of smart devices. Security issues on the Internet of Things have been the most focused area of research over the last decade. As IoT devices have less memory, processing capacity, and power consumption, the traditional security mechanisms are not suitable for IoT. A security mechanism called an Intrusion Detection System (IDS) has a crucial role in protecting the IoT nodes and networks. The lightweight nature of IoT nodes should be considered while designing IDS for the IoT. In this paper, the types of IDS, the major attacks on IoT, the recent research, and contributions to IDS in IoT networks are discussed, and an analytical survey is given based on the study. Though it is a promising area for research, IDS still needs further refinement to ensure high security for IoT networks and devices. Hence, further research, development, and lightweight mechanisms are required for IDS to provide a higher level of security to the resource-limited IoT network.

Keywords

Attack, IoT, Intrusion, IDS, RPL, Security
User
Notifications
Font Size

  • P. Kumar, G. P Gupta and R. Tripathi, “A distributed ensemble design based intrusion detection system using fog computing to protect the Internet of Things networks”, Journal of Ambient Intelligence and Humanized Computing, 12, pp. 9555–9572, 2020, DOI:10.1007/s12652-020-02696-3
  • L. Santos, R. Gonçalves, C. Rabadao and J. Martins, “A flow-based intrusion detection framework for internet of things networks”, Cluster Computing, Springer, 2021, DOI: 10.1007/s10586021-03238-y
  • E. Benkhelifa, T. Welsh and W. Hamouda, “A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Towards Universal and Resilient Systems”, IEEE, 2018, DOI:10.1109/COMST.2018.2844742.
  • D. Oh, D. Kim and W. W. Ro, “A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things”, Sensors, 14 (12), ISSN: 24188–24211, 2014, DOI: 10.3390/s141224188.
  • T. H. Lee, T. H. Wen, L. H. Chang, H. S. Chiang and M.C. Hsieh, “A lightweight Intrusion Detection Scheme based on Energy Consumption Analysis in 6LowPAN”, Advanced Technologies, Embedded and Multimedia for Human-centric Computing, Lecture Notes in Electrical Engineering 260, Springer Netherlands, pp. 1205–1213, 2014.
  • A. Mehmood, M. Mukherjee, S. H. Ahmed, H. Song and M. M. Malik, “NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks”, Journal of Supercomputers, Springer Science+Business Media, LLC, Springer Nature, 2018, DOI:10.1007/s11227-018-2413-7
  • C. Cervantes, D. Poplade, M. Nogueira and A. Santos, “Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things”, IFIP/IEEE International Symposium on Integrated Network Management (IM), pp.606–611, 2015.
  • A. Sforzin and M. Conti, “RpiDS: Raspberry Pi IDS-A fruitful Intrusion Detection System for IoT”, International IEEE Conference on Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart World Congress, 2016, DOI:10.1109/UIC-ATC-Scalcom-CBDCom-IOPSmartWorld.2016.114.
  • D. Midi, A. Rullo, A. Mudgerikar and E. Bertino, “KALIS: A system for knowledge-driven adaptable intrusion detection for the Internet of Things”, Proceedings of the IEEE 37th International Conference on Distributed Computing Systems (ICDCS’17), 2017.
  • A. Wani and S. Revathi, “Analyzing Threats of IoT Networks Using SDN Based Intrusion Detection System (SDIoT-IDS)”, Smart and Innovative Trends in Next Generation Computing Technologies (NGCT-2017), Springer, CCIS 828, pp. 536–542, 2018.
  • J. Amaral, L. Oliveira, J. Rodrigues, G. Han and L. Shu, “Policy and Network-based Intrusion Detection System for IPv6-enabled Wireless Sensor Networks”, IEEE International Conference on Communications (ICC-2014), pp. 1796–1801, 2014.
  • N. K. Thanigaivelan, E. Nigussie, S. Virtanen and J. Isoaho, “Hybrid Internal Anomaly Detection System for IoT: Reactive Nodes with Cross-Layer Operation”, Security and Communication Networks, Article ID: 3672698, 2018, DOI: 10.1155/2018/3672698.
  • O. A. Okpe, O. A. John and S. Emmanuel, “Intrusion Detection in Internet of Things”, International Journal of Advanced Research in Computer Science, 9(1), ISSN: 0976-5697, 2018, DOI:10.26483/ijarcs.v9i1.5429.
  • V. Kumar, A. K. Das and D. Sinha, “UIDS: A Unified Intrusion Detection System for IoT Environment”, Evolutionary Intelligence, 14, pp. 47–59, 2021, DOI: 10.1007/s12065-019-00291-w
  • L. Santos, C. Rabadão and R. Gonçalves, “Intrusion Detection Systems in Internet of Things: A Literature Review”, ResearchGate, 2018, DOI: 10.23919/CISTI.2018.8399291.
  • I. Ulla and Q. H. Mahmoud, “Design and Development of a Deep Learning-Based Model for Anomaly Detection in IoT Networks”, IEEE Access, 9, e-ISSN: 2169-3536, pp. 103906–103926, 2021, DOI:1109/ACCESS.2021.309402.
  • R. Mitchell and I. Chen, “A Survey of Intrusion Detection Techniques for Cyber-physical Systems”, ACM Computing Surveys (CSUR), 46(4), 55, 2014.
  • P. V. Astillo, J. Jeong, W. C. Chien, B. Kim, J. S. Jang, I. You, “SMDAps: A Specification-based Misbehavior Detection System for Implantable Devices in Artificial Pancreas System”, Journal of Internet
  • Technology, 22(1), e-ISSN:2079-4029, 2021, DOI:10.3966/160792642021012201001
  • H. Bostani and M. Sheikhan, “Hybrid of Anomaly-Based and Specification-Based IDS for Internet of Things Using Unsupervised OPF Based on MapReduce Approach”, Computer Communications,
  • (15), pp. 52-71, 2017, DOI:10.1016/j.comcom.2016.12.001.

Abstract Views: 452

PDF Views: 3




  • A Review on Intrusion Detection Systems to Secure IoT Networks

Abstract Views: 452  |  PDF Views: 3

Authors

A. Arul Anitha
Department of Computer Science, St. Joseph’s College (Autonomous) (Affiliated to Bharathidasan University), Tiruchirappalli, Tamil Nadu, India
L. Arockiam
Department of Computer Science, St. Joseph’s College (Autonomous) (Affiliated to Bharathidasan University), Tiruchirappalli, Tamil Nadu, India

Abstract


The Internet of Things (IoT) and its rapid advancements will lead to everything being connected in the near future. The number of devices connected to the global network is increasing every day. IoT security challenges arise as a result of the large-scale incorporation of smart devices. Security issues on the Internet of Things have been the most focused area of research over the last decade. As IoT devices have less memory, processing capacity, and power consumption, the traditional security mechanisms are not suitable for IoT. A security mechanism called an Intrusion Detection System (IDS) has a crucial role in protecting the IoT nodes and networks. The lightweight nature of IoT nodes should be considered while designing IDS for the IoT. In this paper, the types of IDS, the major attacks on IoT, the recent research, and contributions to IDS in IoT networks are discussed, and an analytical survey is given based on the study. Though it is a promising area for research, IDS still needs further refinement to ensure high security for IoT networks and devices. Hence, further research, development, and lightweight mechanisms are required for IDS to provide a higher level of security to the resource-limited IoT network.

Keywords


Attack, IoT, Intrusion, IDS, RPL, Security

References





DOI: https://doi.org/10.22247/ijcna%2F2022%2F211599