Enhanced network intrusion detection system protocol for internet of things

With the emergence of the Internet of Things (IoT), different IoT nodes such as 6LoWPAN devices can be connected as a network to provide integrated services. Since security and intrusion detection are becoming crucial among IoT devices, real-time detection of the attacks are critical to protect the IoT networks. However, there exists limited research for efficient network intrusion detection systems (NIDS) in the IoT networks. This paper therefore proposes a new NIDS protocol with an efficient replica detection algorithm to increase the utility and performance of existing NIDS, where a number of replica test nodes are intentionally inserted into the network to test the reliability and response of witness nodes. The proposed protocol, Enhanced NIDS, can address the vulnerability of NIDS and improve IoT network security to detect severe compromise attacks such as clone attacks. The simulation study shows that compared to the state-of-the-art SVELTE protocol, the proposed protocol can significantly increase the detection probability and reduce the energy consumption for detecting clone attacks in IoT networks.

[1]  Pavan Pongle,et al.  A survey: Attacks on RPL and 6LoWPAN in IoT , 2015, 2015 International Conference on Pervasive Computing (ICPC).

[2]  Mansour Sheikhan,et al.  Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach , 2017, Comput. Commun..

[3]  Umamakeswari Arumugam,et al.  Data driven intrusion detection system for software defined networking enabled industrial internet of things , 2018, J. Intell. Fuzzy Syst..

[4]  Jonathan Loo,et al.  6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..

[5]  Maode Ma,et al.  Secure Group Mobility Support for 6LoWPAN Networks , 2018, IEEE Internet of Things Journal.

[6]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[7]  Sean Carlisto de Alvarenga,et al.  A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..

[8]  C. Jayakumar,et al.  Unique identity and localization based replica node detection in hierarchical wireless sensor networks , 2017, Comput. Electr. Eng..

[9]  V. S. Malemath,et al.  Security attacks and secure routing protocols in RPL-based Internet of Things: Survey , 2017, 2017 International Conference on Emerging Trends & Innovation in ICT (ICEI).

[10]  Mouzhi Ge,et al.  Big Data for Internet of Things: A Survey , 2018, Future Gener. Comput. Syst..

[11]  Vijay Varadharajan,et al.  A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection , 2019, IEEE Communications Surveys & Tutorials.

[12]  Lidong Wang,et al.  Big Data Analytics for Network Intrusion Detection: A Survey , 2017 .

[13]  Elisa Bertino,et al.  Botnets and Internet of Things Security , 2017, Computer.

[14]  Jemal H. Abawajy,et al.  Secure Object Tracking Protocol for the Internet of Things , 2016, IEEE Internet of Things Journal.

[15]  Mauro Conti,et al.  Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks , 2018, Comput. Commun..

[16]  Fazirulhisyam Hashim,et al.  Energy trust system for detecting sybil attack in clustered wireless sensor networks , 2015, 2015 IEEE 12th Malaysia International Conference on Communications (MICC).

[17]  Mouzhi Ge,et al.  Self-adaptive RFID Authentication for Internet of Things , 2019, AINA.

[18]  Lianbing Deng,et al.  Mobile network intrusion detection for IoT system based on transfer learning algorithm , 2018, Cluster Computing.

[19]  Marine Minier,et al.  Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[20]  Kim-Kwang Raymond Choo,et al.  An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things , 2019, IEEE Internet of Things Journal.

[21]  Jaime Lloret,et al.  Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT , 2017, Sensors.

[22]  S. Mercy Shalinie,et al.  Design of cognitive fog computing for intrusion detection in Internet of Things , 2018, Journal of Communications and Networks.

[23]  Antonio F. Gómez-Skarmeta,et al.  Enhancing IoT security through network softwarization and virtual security appliances , 2018, Int. J. Netw. Manag..

[24]  Pavol Zavarsky,et al.  An analysis of security weaknesses in the evolution of RFID enabled passport , 2012, World Congress on Internet Security (WorldCIS-2012).

[25]  Robert C. Atkinson,et al.  Threat analysis of IoT networks using artificial neural network intrusion detection system , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).

[26]  Nei Kato,et al.  State-of-the-Art Deep Learning: Evolving Machine Intelligence Toward Tomorrow’s Intelligent Network Traffic Control Systems , 2017, IEEE Communications Surveys & Tutorials.

[27]  Krishna Kant,et al.  A lightweight Sybil attack detection framework for Wireless Sensor Networks , 2014, 2014 Seventh International Conference on Contemporary Computing (IC3).

[28]  Carsten Maple,et al.  Intrusion Detection Systems for Intra-Vehicle Networks: A Review , 2019, IEEE Access.

[29]  Thiemo Voigt,et al.  Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.

[30]  Jianhui Wang,et al.  Detection and Characterization of Intrusions to Network Parameter Data in Electric Power Systems , 2019, IEEE Transactions on Smart Grid.

[31]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[32]  Walaa Hamouda,et al.  A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems , 2018, IEEE Communications Surveys & Tutorials.

[33]  Adam Dunkels,et al.  Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.

[34]  LeAnhtuan,et al.  6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012 .

[35]  Thiemo Voigt,et al.  Intrusion Detection in the RPL-connected 6LoWPAN Networks , 2017, IoTPTS@AsiaCCS.

[36]  Lalu Banoth,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .

[37]  Hon Sun Chiu,et al.  Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .

[38]  Jatinder Singh,et al.  TBSD: A Defend Against Sybil Attack in Wireless Sensor Networks , 2016 .