Intrusion Detection System for Internet of Things

The Internet of Things (IoT) is an ever-growing network of smart objects. It refers to the physical objects are capable of exchanging information with other physical objects. It introduce various services and human’s routine life depends on its available and reliable activities. The IoT requires multi-facet security solutions where the communication is secured with confidentiality, integrity, and authentication services; the network is protected against intrusions and disruptions; and the data inside a sensor node is stored in an encrypted form. Therefore, the challenge of implementing secure communication in the IoT network must be addressed. The IoT network is secured with encryption and authentication, but it cannot be protected against cyber-attacks. Hence, an Intrusion Detection System is needed. In this paper we proposed a Lightweight Intrusion Detection System to detect Hello flood attack and Sybil attack in IoT network.

[1]  Manish M. Patel,et al.  Security attacks in wireless sensor networks: A survey , 2013, 2013 International Conference on Intelligent Systems and Signal Processing (ISSP).

[2]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[3]  Bo Hu,et al.  A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective , 2014, IEEE Internet of Things Journal.

[4]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[5]  Chen Jun,et al.  Design of Complex Event-Processing IDS in Internet of Things , 2014, 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation.

[6]  Guangjie Han,et al.  Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks , 2014, 2014 IEEE International Conference on Communications (ICC).

[7]  Mohamed Hamdi,et al.  A Survey on Security Models, Techniques, and Tools for the Internet of Things , 2014, 2014 7th International Conference on Advanced Software Engineering and Its Applications.

[8]  Maurizio A. Spirito,et al.  Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[9]  Chezhian Mrs.V.Umadevi,et al.  Security Requirements in Mobile Ad Hoc Networks , 2012 .

[10]  Pooja Khanna,et al.  A Comparative Analysis of Different Classification Techniques for Intrusion Detection System , 2014 .

[11]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[12]  Brajesh Patel,et al.  An Overview on Intrusion Detection System and Types of Attacks It Can Detect Considering Different Protocols , 2012 .

[13]  Jonathan Loo,et al.  Specification-based IDS for securing RPL from topology attacks , 2011, 2011 IFIP Wireless Days (WD).

[14]  Shafiullah Khan,et al.  Intrusion Detection Systems in Wireless Sensor Networks: A Review , 2013, Int. J. Distributed Sens. Networks.

[15]  Ragib Hasan,et al.  Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things , 2015, 2015 IEEE World Congress on Services.

[16]  Hon Sun Chiu,et al.  Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .

[17]  Souvik Sarkar,et al.  Intelligent Intrusion Detection System in Wireless Sensor Network , 2014, FICTA.

[18]  Cengis Hasan,et al.  2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) , 2013 .

[19]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[20]  Shyam Nandan Kumar,et al.  Review on Network Security and Cryptography , 2015 .

[21]  V Jyothsna,et al.  A Review of Anomaly based Intrusion Detection Systems , 2011 .