A survey of intrusion detection in Internet of Things

被引:548
作者
Zarpelao, Bruno Bogaz [1 ]
Miani, Rodrigo Sanches [2 ]
Kawakani, Claudio Toshio [1 ]
de Alvarenga, Sean Carlisto [1 ]
机构
[1] State Univ Londrina UEL, Dept Comp Sci, Rodovia Celso Garcia Cid,S-N, BR-86057970 Londrina, Brazil
[2] Univ Fed Uberlandia, Sch Comp Sci FACOM, Uberlandia, MG, Brazil
关键词
Intrusion detection system; Internet of Things; Cybersecurity; DETECTION SYSTEMS; NETWORKS; COMMUNICATION; SECURITY; ENERGY; TRUST;
D O I
10.1016/j.jnca.2017.02.009
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is a new paradigm that integrates the Internet and physical objects belonging to different domains such as home automation, industrial process, human health and environmental monitoring. It deepens the presence of Internet-connected devices in our daily activities, bringing, in addition to, many benefits, challenges related to security issues. For more than two decades, Intrusion Detection Systems (IDS) have been an important tool for the protection of networks and information systems. However, applying traditional IDS techniques to IoT is difficult due to its particular characteristics such as constrained-resource devices, specific protocol stacks, and standards. In this paper, we present a survey of IDS research efforts for IoT. Our objective is to identify leading trends, open issues, and future research possibilities. We classified the IDSs proposed in the literature according to the following attributes: detection method, IDS placement strategy, security threat and validation strategy. We also discussed the different possibilities for each attribute, detailing aspects of works that either propose specific IDS schemes for IoT or develop attack detection strategies for IoT threats that might be embedded in IDSs.
引用
收藏
页码:25 / 37
页数:13
相关论文
共 80 条
  • [1] On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks
    Abduvaliyev, Abror
    Pathan, Al-Sakib Khan
    Zhou, Jianying
    Roman, Rodrigo
    Wong, Wai-Choong
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (03): : 1223 - 1237
  • [2] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
    Al-Fuqaha, Ala
    Guizani, Mohsen
    Mohammadi, Mehdi
    Aledhari, Mohammed
    Ayyash, Moussa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
  • [3] Amaral JP, 2014, IEEE ICC, P1796, DOI 10.1109/ICC.2014.6883583
  • [4] Anantvalee T, 2007, SIGNALS COMMUN TECHN, P159, DOI 10.1007/978-0-387-33112-6_7
  • [5] [Anonymous], 2014, MQTT Version 3.1.1
  • [6] [Anonymous], 1980, Computer Security Threat Monitoring and Surveillance
  • [7] [Anonymous], 2014, RFC 7252, DOI [DOI 10.17487/RFC7252, 10.17487/RFC7252]
  • [8] [Anonymous], ANAL 1999 DARPA LINC
  • [9] [Anonymous], 2014, Advanced Technologies, Embedded and Multimedia for Human-centric Computing
  • [10] [Anonymous], 2013, P ACM C COMP COMM SE, DOI [10.1145/2508859.2512494, DOI 10.1145/2508859.2512494]