RPiDS: Raspberry Pi IDS — A Fruitful Intrusion Detection System for IoT

Our technology keeps advancing towards a future where everything is connected together. The Internet of Things (IoT) goal is to make every device accessible from the Internet. Even the most common electrical appliances, such as ovens, light bulbs, will have their own IP address,, will be reachable remotely. While this enhanced connectivity will definitely improve our quality of life, it also raises serious security, privacy, trustworthiness questions, the resource constrained nature of IoT entities makes traditional security techniques impractical. In this paper, we propose an intrusion detection architecture for the IoT. We discuss the feasibility of employing a commodity device as the core component of the architecture. In particular, we evaluated the performance of the Raspberry Pi, one of the most used commodity single-board computers, while running Snort, a widely known, open source Intrusion Detection System (IDS). Our experiments show that our proposed architecture based on resource constrained devices, such as the Raspberry Pi, can effectively serve as IDS in a distributed system such as IoT.

[1]  Serbulent Tozlu,et al.  Wi-Fi enabled sensors for internet of things: A practical approach , 2012, IEEE Communications Magazine.

[2]  Guofei Gu,et al.  PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks , 2013, ICICS.

[3]  Stefano Chessa,et al.  Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..

[4]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .

[5]  K. K. Ramakrishnan,et al.  Eliminating receive livelock in an interrupt-driven kernel , 1996, TOCS.

[6]  Alex Wright,et al.  Hacking cars , 2011, Commun. ACM.

[7]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[8]  Yuzhu Chen,et al.  Pi-IDS: evaluation of open-source intrusion detection systems on Raspberry Pi 2 , 2015, 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec).

[9]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[10]  William Bradley Glisson,et al.  Compromising a Medical Mannequin , 2015, AMCIS.

[11]  Sally Floyd,et al.  Difficulties in simulating the internet , 2001, TNET.

[12]  Sandra Dominikus,et al.  Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.

[13]  Katherine Albrecht,et al.  Privacy Nightmare: When Baby Monitors Go Bad [Opinion] , 2015, IEEE Technol. Soc. Mag..

[14]  David Hutchison,et al.  OpenLIDS: a lightweight intrusion detection system for wireless mesh networks , 2009, MobiCom '09.

[15]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[16]  Martin Roesch,et al.  Snort - Lightweight Intrusion Detection for Networks , 1999 .