A Survey: Intrusion Detection Techniques for Internet of Things

The latest buzzword in internet technology nowadays is the Internet of Things. The Internet of Things (IoT) is an ever-growing network which will transform real-world objects into smart or intelligent virtual objects. IoT is a heterogeneous network in which devices with different protocols can connect with each other in order to exchange information. These days, human life depends upon the smart things and their activities. Therefore, implementing protected communications in the IoT network is a challenge. Since the IoT network is secured with authentication and encryption, but not secured against cyber-attacks, an Intrusion Detection System is needed. This research article focuses on IoT introduction, architecture, technologies, attacks and IDS. The main objective of this article is to provide a general idea of the Internet of Things, various intrusion detection techniques, and security attacks associated with IoT.

[1]  Jonathan Loo,et al.  A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology , 2016, Inf..

[2]  Thiemo Voigt,et al.  Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.

[3]  Michele Nogueira Lima,et al.  Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).

[4]  Maurizio A. Spirito,et al.  Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[5]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[6]  Guangjie Han,et al.  Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks , 2014, 2014 IEEE International Conference on Communications (ICC).

[7]  Pavan Pongle,et al.  A survey: Attacks on RPL and 6LoWPAN in IoT , 2015, 2015 International Conference on Pervasive Computing (ICPC).

[8]  Shafiullah Khan,et al.  Intrusion Detection Systems in Wireless Sensor Networks: A Review , 2013, Int. J. Distributed Sens. Networks.

[9]  Michele Zorzi,et al.  The “Wireless Sensor Networks for City-Wide Ambient Intelligence (WISE-WAI)” Project , 2009, Sensors.

[10]  Audrey A. Gendreau,et al.  Survey of Intrusion Detection Systems towards an End to End Secure Internet of Things , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).

[11]  Michele Zorzi,et al.  Web Services for the Internet of Things through CoAP and EXI , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).

[12]  Albert C. Esterline,et al.  Behavioral Modeling Intrusion Detection System (BMIDS) Using Internet of Things (IoT) Behavior-Based Anomaly Detection via Immunity-Inspired Algorithms , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).

[13]  Rajkumar Buyya,et al.  CloudEyes: Cloud‐based malware detection with reversible sketch for resource‐constrained internet of things (IoT) devices , 2017, Softw. Pract. Exp..

[14]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[15]  Kevin Ashton,et al.  That ‘Internet of Things’ Thing , 1999 .

[16]  Chen Jun,et al.  Design of Complex Event-Processing IDS in Internet of Things , 2014, 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation.

[17]  Xiaohui Liang,et al.  Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.

[18]  Zhou Yan,et al.  A Security Transmission Model for Internet of Things , 2011 .

[19]  Jinquan Zeng,et al.  Research on immunity-based intrusion detection technology for the Internet of Things , 2011, 2011 Seventh International Conference on Natural Computation.

[20]  Joseph G. Tront,et al.  Implementing moving target IPv6 defense to secure 6LoWPAN in the internet of things and smart grid , 2014, CISR '14.

[21]  Yu-Hung Huang,et al.  A lightweight authentication protocol for Internet of Things , 2014, 2014 International Symposium on Next-Generation Electronics (ISNE).

[22]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[23]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[24]  Levente Buttyán,et al.  VeRA - Version Number and Rank Authentication in RPL , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.

[25]  Na Ruan,et al.  DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things , 2012, 2012 International Conference on Selected Topics in Mobile and Wireless Networking.

[26]  Utz Roedig,et al.  Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).

[27]  Pavan Pongle,et al.  Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .

[28]  Chao Chen,et al.  An Artificial Immune-Based Distributed Intrusion Detection Model for the Internet of Things , 2011 .

[29]  Sugata Sanyal,et al.  A Multi-Dimensional approach towards Intrusion Detection System , 2012, ArXiv.

[30]  Kangfeng Zheng,et al.  An intrusion detection scheme based on anomaly mining in Internet of Things , 2011 .

[31]  Kevin Weekly,et al.  Evaluating sinkhole defense techniques in RPL networks , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).

[32]  Gerd Kortuem,et al.  Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.

[33]  Jonathan Loo,et al.  The impacts of internal threats towards Routing Protocol for Low power and lossy network performance , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).

[34]  Jonathan Loo,et al.  The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks , 2013, IEEE Sensors Journal.

[35]  P. Venkata Krishna,et al.  A Learning Automata Based Solution for Preventing Distributed Denial of Service in Internet of Things , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.

[36]  Jian-Feng Ma,et al.  A Security Transmission Model for Internet of Things: A Security Transmission Model for Internet of Things , 2011 .

[37]  Jonathan Loo,et al.  Specification-based IDS for securing RPL from topology attacks , 2011, 2011 IFIP Wireless Days (WD).

[38]  Jonathan Loo,et al.  6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..

[39]  Thomas C. Schmidt,et al.  TRAIL: Topology Authentication in RPL , 2016, EWSN.

[40]  Robert C. Atkinson,et al.  Threat analysis of IoT networks using artificial neural network intrusion detection system , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).

[41]  Syed Obaid Amin,et al.  A novel coding scheme to implement signature based IDS in IP based Sensor Networks , 2009, 2009 IFIP/IEEE International Symposium on Integrated Network Management-Workshops.

[42]  Joel J. P. C. Rodrigues,et al.  Network Admission Control Solution for 6LoWPAN Networks , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[43]  Kian-Lee Tan,et al.  CASTLE: Continuously Anonymizing Data Streams , 2011, IEEE Transactions on Dependable and Secure Computing.

[44]  Hanno Wirtz,et al.  6LoWPAN fragmentation attacks and mitigation mechanisms , 2013, WiSec '13.

[45]  Shanxiong Chen,et al.  SVM Intrusion Detection Model Based on Compressed Sampling , 2016, J. Electr. Comput. Eng..

[46]  Bo Hu,et al.  A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective , 2014, IEEE Internet of Things Journal.

[47]  Taeshik Shon,et al.  Wormhole attack prevention mechanism for RPL based LLN network , 2013, 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN).