Recent Advancements in Intrusion Detection Systems for the Internet of Things

被引:28
作者
Khan, Zeeshan Ali [1 ]
Herrmann, Peter [2 ]
机构
[1] Minhaj Univ, Sch Elect Engn, Lahore, Pakistan
[2] Norwegian Univ Sci & Technol NTNU, Dept Informat Secur & Commun Technol, Trondheim, Norway
关键词
MOBILE AD HOC; SECURITY; NETWORKS;
D O I
10.1155/2019/4301409
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many Internet of Things (IoT) systems run on tiny connected devices that have to deal with severe processor and energy restrictions. Often, the limited processing resources do not allow the use of standard security mechanisms on the nodes, making IoT applications quite vulnerable to different types of attacks. This holds particularly for intrusion detection systems (IDS) that are usually too resource-heavy to be handled by small IoT devices. Thus, many IoT systems are not sufficiently protected against typical network attacks like Denial-of-Service (DoS) and routing attacks. On the other side, IDSs have already been successfully used in adjacent network types like Mobile Ad hoc Networks (MANET), Wireless Sensor Networks (WSN), and Cyber-Physical Systems (CPS) which, in part, face limitations similar to those of IoT applications. Moreover, there is research work ongoing that promises IDSs that may better fit to the limitations of IoT devices. In this article, we will give an overview about IDSs suited for IoT networks. Besides looking on approaches developed particularly for IoT, we introduce also work for the three similar network types mentioned above and discuss if they are also suitable for IoT systems. In addition, we present some suggestions for future research work that could be useful to make IoT networks more secure.
引用
收藏
页数:19
相关论文
共 98 条
[1]  
Abraham A., 2007, Int. J. Netw. Secur, V4, P328
[2]   D-SCIDS: Distributed soft computing intrusion detection system [J].
Abraham, Ajith ;
Jain, Ravi ;
Thomas, Johnson ;
Han, Sang Yong .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) :81-98
[3]   Intrusion detection in sensor networks: A non-cooperative game approach [J].
Agah, A ;
Das, SK ;
Basu, K ;
Asadi, M .
THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, :343-346
[4]  
Agah A., 2007, INT J NETW SECUR, V5, P145
[5]  
Albers P., 2002, Proc. 1st International Workshop on Wireless Information Systems, P1
[6]   Internet of Things: A survey on the security of IoT frameworks [J].
Ammar, Mahmoud ;
Russello, Giovanni ;
Crispo, Bruno .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 :8-27
[7]  
Anantvalee T, 2007, SIGNALS COMMUN TECHN, P159, DOI 10.1007/978-0-387-33112-6_7
[8]  
[Anonymous], 2011, INT J PEER PEER NETW, DOI DOI 10.5121/IJP2P.2011.2203
[9]  
[Anonymous], 2012, 6550RPL IETF RFC
[10]  
[Anonymous], AD HOC NETW, DOI DOI 10.1016/S1570-8705(03)00008-8