A Review on Intrusion Detection System for IoT based Systems

被引:0
作者
Samita [1 ]
机构
[1] Department of Computer Science and Applications, Panjab University, Chandigarh
关键词
Internet of things; Intrusion detection systems; Smart environments;
D O I
10.1007/s42979-024-02702-x
中图分类号
学科分类号
摘要
One of the key objectives of intelligent Internet of Things-based systems is to improve people's quality of life in terms of simplicity and efficiency. The paradigm for the Internet of Things (IoT) has surfaced recently as a technology to construct intelligent IoT systems. Security and privacy are essential considerations for all intelligent systems built on the Internet of Things concept. Because of the restricted processing and storage capabilities of IoT devices as well as their unique protocols, traditional IDSs are not a practical choice in an IoT environment. An overview of the most recent IDSs created for the IoT paradigm is given in this article, with particular attention to the techniques, features, and procedures of each. This essay also offers a thorough analysis of the IoT architecture, new security flaws, and how they relate to the layers of the IoT architecture. This study suggests that, despite previous studies on the design and implementation of integrated information systems in IoT paradigms, it is still an important task to develop efficient, reliable or trustworthy integrated information systems for IoT-based intelligent systems. This review concludes with future perspectives and important aspects to consider in the development of these IDS. © The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd 2024.
引用
收藏
相关论文
共 107 条
[1]  
Weber M., Boban M., Security challenges of the internet of things, 2016 39Th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, Opatija, pp. 638-643, (2016)
[2]  
Gendreau A.A., Moorman M., Survey of intrusion detection systems towards an end to end secure internet of things, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), pp. 84-90, (2016)
[3]  
Kafle V.P., Fukushima Y., Harai H., Internet of things standardization in ITU and prospective networking technologies, IEEE Commun Mag, 54, 9, pp. 43-49, (2016)
[4]  
Zanella A., Bui N., Castellani A., Vangelista L., Zorzi M., Internet of things for smart cities, IEEE Internet Things J, 1, 1, pp. 22-32, (2014)
[5]  
Iot Bots Cause Massive Internet Outage
[6]  
Zarpelao B.B., Miani R.S., Kawakani C.T., de Alvarenga S.C., A survey of intrusion detection in internet of things, J Netw Comput Appl, 84, pp. 25-37, (2017)
[7]  
Ayoub W., Mroue M., Nouvel F., Samhat A.E., Prevotet J., Towards IP over LPWANs technologies: LoRaWAN, DASH7, NB-IoT, 2018 Sixth International Conference on Digital Information, Networking, and Wireless Communications (DINWC). IEEE, Beirut, pp. 43-47, (2018)
[8]  
Aras E., Ramachandran G.S., Lawrence P.D., Exploring the security vulnerabilities of LoRa, In: 2017 3Rd IEEE International Conference on Cybernetics (CYBCONF)., pp. 1-6, (2017)
[9]  
Butun I., Pereira N.M., Analysis of LoRaWAN v1.1 security, In: Proceedings of the 4Th ACM Mobihoc Workshop on Experiences with the Design and Implementation of Smart Objects, pp. 5-156, (2018)
[10]  
Colakovi c A HadzialicM, Internet of things (IoT): A review of ´ enabling technologies, challenges, and open research issues, Comput Netw, 144, pp. 17-39, (2018)