Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges

被引:94
作者
Pundir, Sumit [1 ]
Wazid, Mohammad [1 ]
Singh, Devesh Pratap [1 ]
Das, Ashok Kumar [2 ]
Rodrigues, Joel J. P. C. [3 ,4 ]
Park, Youngho [5 ]
机构
[1] Graph Era Deemed Be Univ, Dept Comp Sci & Engn, Dehra Dun 248002, Uttarakhand, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] Fed Univ Piaui UFPI, PPGEE, BR-64049550 Teresina, Brazil
[4] Inst Telecomunicacoes, P-1049001 Lisbon, Portugal
[5] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
基金
新加坡国家研究基金会;
关键词
Wireless sensor network (WSN); Internet of Things (IoT); intrusion detection; cloud computing; fog computing; edge computing; security; USER AUTHENTICATION SCHEME; KEY MANAGEMENT PROTOCOL; DETECTION SYSTEM; ESTABLISHMENT SCHEME; TIME SYNCHRONIZATION; SECURITY PROTOCOLS; IOT; DESIGN; ATTACKS; PERFORMANCE;
D O I
10.1109/ACCESS.2019.2962829
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As we all know that the technology is projected to be next to humans very soon because of its holistic growth. Now-a-days, we see a lot of applications that are making our lives comfortable such as smart cars, smart homes, smart traffic management, smart offices, smart medical consultation, smart cities, etc. All such facilities are in the reach of a common man because of the advancement in Information and Communications Technology (ICT). Because of this advancement, new computing and communication environment such as Internet of Things (IoT) came into picture. Lot of research work is in progress in IoT domain which helps for the overall development of the society and makes the lives easy and comfortable. But in the resource constrained environment of Wireless Sensor Network (WSN) and IoT, it is almost inconceivable to establish a fully secure system. As we are moving forward very fast, technology is becoming more and more vulnerable to the security threats. In future, the number of Internet connected people will be less than the smart objects so we need to prepare a robust system for keeping the above mentioned environments safe and standardized it for the smooth conduction of communication among IoT objects. In this survey paper, we provide the details of threat model applicable for the security of WSN and IoT based communications. We also discuss the security requirements and various attacks possible in WSN and IoT based communication environments. The emerging projects of WSNs integrated to IoT are also briefed. We then provide the details of different architectures of WSN and IoT based communication environments. Next, we discuss the current issues and challenges related to WSN and IoT. We also provide a critical literature survey of recent intrusion detection protocols for IoT and WSN environments along with their comparative analysis. A taxonomy of security and privacy-preservation protocols in WSN and IoT is also highlighted. Finally, we discuss some research challenges which need to be addressed in the coming future.
引用
收藏
页码:3343 / 3363
页数:21
相关论文
共 107 条
[81]   Intrusion detection in homogeneous and heterogeneous Wireless Sensor Networks [J].
Wang, Yun ;
Wang, Xiaodong ;
Xie, Bin ;
Wang, Demin ;
Agrawal, Dharma P. .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (06) :698-711
[82]   Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks [J].
Wang, Yun ;
Fu, Weihuang ;
Agrawal, Dharma P. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (02) :342-355
[83]  
Wazid M., 2017, THESIS
[84]  
Wazid M., IEEE T DEPEND SEC CO
[85]   AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment [J].
Wazid, Mohammad ;
Bagga, Palak ;
Das, Ashok Kumar ;
Shetty, Sachin ;
Rodrigues, Joel J. P. C. ;
Park, Youngho .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8804-8817
[86]   RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment [J].
Wazid, Mohammad ;
Dsouza, Poonam Reshma ;
Das, Ashok Kumar ;
Bhat, Vivekananda K. ;
Kumar, Neeraj ;
Rodrigues, Joel J. P. C. .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (15)
[87]   Authentication in cloud-driven IoT-based big data environment: Survey and outlook [J].
Wazid, Mohammad ;
Das, Ashok Kumar ;
Hussain, Rasheed ;
Succi, Giancarlo ;
Rodrigues, Joel J. P. C. .
JOURNAL OF SYSTEMS ARCHITECTURE, 2019, 97 :185-196
[88]   Design of secure key management and user authentication scheme for fog computing services [J].
Wazid, Mohammad ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Vasilakos, Athanasios V. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 91 (475-492) :475-492
[89]   Authenticated key management protocol for cloud-assisted body area sensor networks [J].
Wazid, Mohammad ;
Das, Ashok Kumar ;
Vasilakos, Athanasios V. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 123 :112-126
[90]   A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment [J].
Wazid, Mohammad ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Conti, Mauro ;
Vasilakos, Athanasios V. .
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2018, 22 (04) :1299-1309