A Review: Collaborative Intrusion Detection for IoT integrating the Blockchain technologies

被引:11
|
作者
Benaddi, Hafsa [1 ]
Ibrahimi, Khalil [1 ]
机构
[1] Ibn Tofail Univ, Fac Sci, Comp Sci Res Lab, Kenitra, Morocco
来源
2020 8TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM 2020) | 2020年
关键词
Detection System; Internet of Things; Cybersecurity; Blockchain; Trust Management; Wireless Sensor Network; Smart Contact; Cryptocurrency; Decentralized Control; Cryptography; Ethereum; Bitcoin; DETECTION SYSTEMS; INTERNET; SECURITY; THINGS; PRIVACY;
D O I
10.1109/wincom50532.2020.9272464
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several anomaly detection systems prototypes are deployed to set up real-world solutions exclusively dedicated to the banking industry due to the high potentials of attacks. Exchanging highly security-sensitive data over a network between nodes requires high-security levels of IoT devices, representing a big challenge. Thus, many systems were developed to detect and predict any malicious activity. In our digital world, it is very challenging to master the fact that we, as a whole internet community, create an uncountable number of bytes of data every 24 hours. This truth leads researchers to explore and discover new technologies to handle massive data by ensuring individuals security and privacy. Inspired by this, our work supports researchers in this field by providing a selective overview of the most relevant findings investigating and proposing solutions on Intrusion Detection Systems (IDS) over the Internet of Thing (IoT). Furthermore, the Blockchain integration as the principal registry for safe data storage is well explained and detailed while covering security qualities that analyze and classify different confronted open challenges in this path.
引用
收藏
页码:72 / 77
页数:6
相关论文
共 50 条
  • [41] A blockchain-assisted security management framework for collaborative intrusion detection in smart cities
    Li, Wenjuan
    Stidsen, Christian
    Adam, Tobias
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 111
  • [42] Intrusion Detection in IoT Using Deep Learning
    Banaamah, Alaa Mohammed
    Ahmad, Iftikhar
    SENSORS, 2022, 22 (21)
  • [43] Network Intrusion Detection: An IoT and Non IoT-Related Survey
    Abdulkareem, Sulyman Age
    Foh, Chuan Heng
    Shojafar, Mohammad
    Carrez, Francois
    Moessner, Klaus
    IEEE ACCESS, 2024, 12 : 147167 - 147191
  • [44] Deep learning enabled intrusion detection system for Industrial IOT environment
    Nandanwar, Himanshu
    Katarya, Rahul
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 249
  • [45] Review on Approaches of Federated Modeling in Anomaly-Based Intrusion Detection for IoT Devices
    Isma'ila, Umar Audi
    Danyaro, Kamaluddeen Usman
    Muazu, Aminu Aminu
    Maiwada, Umar Danjuma
    IEEE ACCESS, 2024, 12 : 30941 - 30961
  • [46] A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions
    Alkadi, Osama
    Moustafa, Nour
    Turnbull, Benjamin
    IEEE ACCESS, 2020, 8 : 104893 - 104917
  • [47] A Comprehensive Systematic Review of Blockchain-based Intrusion Detection Systems
    Adele, Gideon
    Borah, Abinash
    Paranjothi, Anirudh
    Khan, Mohammad S.
    Poulkov, Vladimir K.
    2024 IEEE 5TH ANNUAL WORLD AI IOT CONGRESS, AIIOT 2024, 2024, : 0605 - 0611
  • [48] A Systematic Literature Review of Lightweight Blockchain for IoT
    Stefanescu, Denis
    Montalvillo, Leticia
    Galan-Garcia, Patxi
    Unzilla, Juanjo
    Urbieta, Aitor
    IEEE ACCESS, 2022, 10 : 123138 - 123159
  • [49] Design of Clustering Enabled Intrusion Detection with Blockchain Technology
    Vimal, S.
    Nalini, S.
    Anguraj, K.
    Chelladurai, T.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 33 (03) : 1907 - 1921
  • [50] Blockchain-enabled Collaborative Intrusion Detection in Software Defined Networks
    Fan, Wenjun
    Park, Younghee
    Kumar, Shubham
    Ganta, Priyatham
    Zhou, Xiaobo
    Chang, Sang-Yoon
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 968 - 975