A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems

被引:127
作者
Benkhelifa, Elhadj [1 ]
Welsh, Thomas [1 ]
Hamouda, Walaa [2 ]
机构
[1] Staffordshire Univ, Sch Comp & Digital Technol, Stoke On Trent ST4 2DE, Staffs, England
[2] Concordia Univ, Dept Elect & Comp Engn, Montreal, PQ H3G 2W1, Canada
关键词
Intrusion detection systems (IDS); IoT security; wireless sensor networks; universal IDS; MOBILE AD HOC; INTERNET; PRIVACY; ATTACKS; THINGS;
D O I
10.1109/COMST.2018.2844742
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet-of-Things (IoT) is rapidly becoming ubiquitous. However the heterogeneous nature of devices and protocols in use, the sensitivity of the data contained within, as well as the legal and privacy issues, make security for the IoT a growing research priority and industry concern. With many security practices being unsuitable due to their resource intensive nature, it is deemed important to include second line defences into IoT networks. These systems will also need to be assessed for their efficacy in a variety of different network types and protocols. To shed light on these issues, this paper is concerned with advancements in intrusion detection practices in IoT. It provides a comprehensive review of current intrusion detection systems (IDSs) for IoT technologies, focusing on architecture types. A proposal for future directions in IoT based IDS are then presented and evaluated. We show how traditional practices are unsuitable due to their inherent features providing poor coverage of the IoT domain. In order to develop a secure, robust and optimized solution for these networks, the current research for intrusion detection in IoT will need to move in a different direction. An example of which is proposed in order to illustrate how malicious nodes might be passively detected.
引用
收藏
页码:3496 / 3509
页数:14
相关论文
共 77 条
[1]   On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks [J].
Abduvaliyev, Abror ;
Pathan, Al-Sakib Khan ;
Zhou, Jianying ;
Roman, Rodrigo ;
Wong, Wai-Choong .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (03) :1223-1237
[2]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[3]   Intrusion Detection Systems in Wireless Sensor Networks: A Review [J].
Alrajeh, Nabil Ali ;
Khan, S. ;
Shams, Bilal .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
[4]  
Amaral JP, 2014, IEEE ICC, P1796, DOI 10.1109/ICC.2014.6883583
[5]  
[Anonymous], 2011, P 2011 INT C COMM CO
[6]  
[Anonymous], 2008, PROC 41 ANN HAWAII I, DOI [10.1109/HICSS.2008.319, DOI 10.1109/HICSS.2008.319]
[7]  
[Anonymous], 2016, 2016 25 INT C COMP C
[8]  
[Anonymous], AD HOC NETWORKS, DOI DOI 10.1016/S1570-8705(03)00008-8
[9]  
[Anonymous], 2013, P ACM C COMP COMM SE, DOI [10.1145/2508859.2512494, DOI 10.1145/2508859.2512494]
[10]   Smart Meter Data Privacy: A Survey [J].
Asghar, Muhammad Rizwan ;
Dan, Gyorgy ;
Miorandi, Daniele ;
Chlamtac, Imrich .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (04) :2820-2835