Recent Advancements in Intrusion Detection Systems for the Internet of Things

被引:28
作者
Khan, Zeeshan Ali [1 ]
Herrmann, Peter [2 ]
机构
[1] Minhaj Univ, Sch Elect Engn, Lahore, Pakistan
[2] Norwegian Univ Sci & Technol NTNU, Dept Informat Secur & Commun Technol, Trondheim, Norway
关键词
MOBILE AD HOC; SECURITY; NETWORKS;
D O I
10.1155/2019/4301409
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many Internet of Things (IoT) systems run on tiny connected devices that have to deal with severe processor and energy restrictions. Often, the limited processing resources do not allow the use of standard security mechanisms on the nodes, making IoT applications quite vulnerable to different types of attacks. This holds particularly for intrusion detection systems (IDS) that are usually too resource-heavy to be handled by small IoT devices. Thus, many IoT systems are not sufficiently protected against typical network attacks like Denial-of-Service (DoS) and routing attacks. On the other side, IDSs have already been successfully used in adjacent network types like Mobile Ad hoc Networks (MANET), Wireless Sensor Networks (WSN), and Cyber-Physical Systems (CPS) which, in part, face limitations similar to those of IoT applications. Moreover, there is research work ongoing that promises IDSs that may better fit to the limitations of IoT devices. In this article, we will give an overview about IDSs suited for IoT networks. Besides looking on approaches developed particularly for IoT, we introduce also work for the three similar network types mentioned above and discuss if they are also suitable for IoT systems. In addition, we present some suggestions for future research work that could be useful to make IoT networks more secure.
引用
收藏
页数:19
相关论文
共 98 条
[51]   Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things [J].
La, Quang Duy ;
Quek, Tony Q. S. ;
Lee, Jemin ;
Jin, Shi ;
Zhu, Hongbo .
IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (06) :1025-1035
[52]   AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks [J].
Li, Jiaqi ;
Zhao, Zhifeng ;
Li, Rongpeng ;
Zhang, Honggang .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :2093-2102
[53]  
Liu N, 2011, INT SYM QUAL ELECT, P212
[54]  
Liu YB, 2014, 2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), P1142, DOI 10.1109/ICSESS.2014.6933768
[55]   Intrusion detection for routing attacks in sensor networks [J].
Loo, Chong Eik ;
Ng, Mun Yong ;
Leckie, Christopher ;
Palaniswami, Marimuthu .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2006, 2 (04) :313-332
[56]   A Global Hybrid Intrusion Detection System for Wireless Sensor Networks [J].
Maleh, Yassine ;
Ezzati, Abdellah ;
Qasmaoui, Youssef ;
Mbida, Mohamed .
6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015), 2015, 52 :1047-1052
[57]  
Mamu M.S. Islam., 2010, International Journal of Network Security Its Applications (IJNSA), V2, P102
[58]  
Matsunaga T, 2014, 2014 11TH INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATIONS SYSTEMS (ISWCS), P427, DOI 10.1109/ISWCS.2014.6933391
[59]  
Mayzaud A, 2014, LECT NOTES COMPUT SC, V8508, P92, DOI 10.1007/978-3-662-43862-6_12
[60]  
Michiardi P, 2002, INT FED INFO PROC, V100, P107