Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges

被引:93
作者
Pundir, Sumit [1 ]
Wazid, Mohammad [1 ]
Singh, Devesh Pratap [1 ]
Das, Ashok Kumar [2 ]
Rodrigues, Joel J. P. C. [3 ,4 ]
Park, Youngho [5 ]
机构
[1] Graph Era Deemed Be Univ, Dept Comp Sci & Engn, Dehra Dun 248002, Uttarakhand, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] Fed Univ Piaui UFPI, PPGEE, BR-64049550 Teresina, Brazil
[4] Inst Telecomunicacoes, P-1049001 Lisbon, Portugal
[5] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
来源
IEEE ACCESS | 2020年 / 8卷 / 08期
基金
新加坡国家研究基金会;
关键词
Wireless sensor network (WSN); Internet of Things (IoT); intrusion detection; cloud computing; fog computing; edge computing; security; USER AUTHENTICATION SCHEME; KEY MANAGEMENT PROTOCOL; DETECTION SYSTEM; ESTABLISHMENT SCHEME; TIME SYNCHRONIZATION; SECURITY PROTOCOLS; IOT; DESIGN; ATTACKS; PERFORMANCE;
D O I
10.1109/ACCESS.2019.2962829
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As we all know that the technology is projected to be next to humans very soon because of its holistic growth. Now-a-days, we see a lot of applications that are making our lives comfortable such as smart cars, smart homes, smart traffic management, smart offices, smart medical consultation, smart cities, etc. All such facilities are in the reach of a common man because of the advancement in Information and Communications Technology (ICT). Because of this advancement, new computing and communication environment such as Internet of Things (IoT) came into picture. Lot of research work is in progress in IoT domain which helps for the overall development of the society and makes the lives easy and comfortable. But in the resource constrained environment of Wireless Sensor Network (WSN) and IoT, it is almost inconceivable to establish a fully secure system. As we are moving forward very fast, technology is becoming more and more vulnerable to the security threats. In future, the number of Internet connected people will be less than the smart objects so we need to prepare a robust system for keeping the above mentioned environments safe and standardized it for the smooth conduction of communication among IoT objects. In this survey paper, we provide the details of threat model applicable for the security of WSN and IoT based communications. We also discuss the security requirements and various attacks possible in WSN and IoT based communication environments. The emerging projects of WSNs integrated to IoT are also briefed. We then provide the details of different architectures of WSN and IoT based communication environments. Next, we discuss the current issues and challenges related to WSN and IoT. We also provide a critical literature survey of recent intrusion detection protocols for IoT and WSN environments along with their comparative analysis. A taxonomy of security and privacy-preservation protocols in WSN and IoT is also highlighted. Finally, we discuss some research challenges which need to be addressed in the coming future.
引用
收藏
页码:3343 / 3363
页数:21
相关论文
共 107 条
[1]   A Multi-Level Intrusion Detection System for Wireless Sensor Networks Based on Immune Theory [J].
Alaparthy, Vishwa Teja ;
Morgera, Salvatore Domenic .
IEEE ACCESS, 2018, 6 :47364-47373
[2]   Internet of Things: A survey on the security of IoT frameworks [J].
Ammar, Mahmoud ;
Russello, Giovanni ;
Crispo, Bruno .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 :8-27
[3]  
[Anonymous], 2006, ACM Trans. Sens. Netw., DOI [DOI 10.1145/1218556.1218559, 10.1145/1218556.1218559]
[4]  
[Anonymous], 2018, STRUCT CONTROL HLTH
[5]  
[Anonymous], P 2 IEEE INT C MOB A
[6]  
[Anonymous], 2016, X509 INFORM TECHNOLO
[7]  
[Anonymous], IEEE ACCESS
[8]  
Ayaz M., 2019, IEEE ACCESS, V7
[9]   Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning [J].
Azmoodeh, Amin ;
Dehghantanha, Ali ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2019, 4 (01) :88-95
[10]   Design and Performance Analysis of a Virtual Ring Architecture for Smart Grid Privacy [J].
Badra, Mohamad ;
Zeadally, Sherali .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (02) :321-329