Abstract
The Internet of Things (IoT) is a fast-expanding network of smart heterogeneous objects. It refers to the physical devices that are capable of communicating with other physical devices. Unlike the wireless sensor networks (WSNs), IoT is connected to worldwide Internet that exposes it to global intrusion in addition to wireless attacks inside an IoT network. It is protected by cryptographic and network security techniques, but they are vulnerable to internal and external attacks. The IoT devices are resource constrained in terms of limited storage, battery, limited transmission range and processing. To protect these tiny devices from the inside and outside cyberattacks, we need a lightweight security system that can run efficiently and effectively on these IoT devices. We also need a system, which can identify the type of intrusion and trigger an alarm in intrusion scenario to take appropriate preventive measure. Hence, an Intrusion Detection System (IDS) plays an important role to prevent such cyberattacks in IoT. These devices can be static or mobile in an IoT environment; this must be considered while designing IDS for IoT system. This book chapter presents various IDSs for an IoT system and their comparisons in terms of detection rate, false positive and accuracy in both static and mobility of devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sherasiya, T., Upadhyay, & H., Patel, H. B. (2016). A survey: Intrusion detection system for internet of thing. International Journal of Computer Science and Engineering, 5(2), 91–98.
Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S. L., Kumar, S. S., & Wehrle, K. (2011). Security challenges in the ip-based Internet of Things. Wireless Personal Communications, 61(3), 527–542.
Garcia-Morchon, O., Kumar, S., Struik, R., Keoh, S., & Hummen, R. (2013). Security considerations in the ip-based Internet of Things (pp. 1–19).
Hameed, S., Khan, F. I., & Hameed, B. (2019). Understanding security requirements and challenges in Internet of Things (IoT): A review. Journal of Computer Networks and Communications, 2019, 1–14.
Neto, A. L. M., Souza, A. L. F., Cunha, I., Nogueira, M., Nunes, I. O., Cotta, L., et al. (2016). Aot: Authentication and access control for the entire iot device life-cycle. In Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM (pp. 1–15). ACM.
Pongle, P., & Chavan, G. (2015). Real time intrusion and wormhole attack detection in Internet of Things. International Journal of Computer Applications, 1–9.
Fuchsberger, A. (2005). Intrusion Detection Systems and Intrusion Prevention Systems: Information Security Technical Report 10 (pp. 134–139).
Zarpelao, B. B., Miani, R. S., Kawakani, C. T., & de Alvarenga, S. C. (2017). A survey of intrusion detection in Internet of Things. Journal of Network and Computer Applications, 84, 25–37.
Sherasiya, T., & Upadhyay, H. (2016). Intrusion detection system for Internet of Things. International Journal of Advance Research and Innovative Ideas in Education (IJARIIE), 2(3), 2244–2249.
Govindarajan, M., & Chandrasekaran, R. M. (2011). Intrusion detection using neural based hybrid classification methods. Computer Networks, 1662–1671.
Raza, S., Wallgren, L., & Voigt, T. (2013). SVELTE: Real-time intrusion detection in the Internet of Things. Ad Hoc Networks, 2661–2674.
Naika, S., & Shekokarb, N. (2015). Conservation of energy in wireless sensor network by preventing denial of sleep attack. Procedia Computer Science, 370 – 379.
Kasinathan, P., Pastrone, C., Spirito, M. A., & Vinkovits, M. (2013). Denial-of-Service detection in 6LoWPAN based Internet of Things. In 9th International Conference on Wireless and Mobile Computing, Networking and Communications (pp. 1–8). IEEE.
Suricata—The next generation intrusion detection system. http://www.openinfosecfoundation.org.
Tomasi, R., Bruno, L., Pastrone, C., & Spirito, M. (2011). Meta-exploitation of ipv6-based wireless sensor networks. In 3rd International workshop on Security and Communication Networks (pp. 39–44).
Wahab, O. A., Otrok, H., & Mourad, A. (2014). A cooperative watchdog model based on dempster–shafer for detecting misbehaving vehicles. Computer Communications, 43–54.
Perez-Toro, C. R., Panta, R. K., & Bagchi, S. (2010). Rdas: Reputation-based resilient data aggregation in sensor network. In 7th IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks (pp. 1–9).
Cervantes, C., Poplade, D., Nogueira, M., & Santos, A. (2015). Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In IEEE International Symposium on Integrated Network Management (pp. 606–611).
Bhatt, C., Dey, N., & Ashour, A. S. (Eds.) (2017). Internet of Things and Big Data technologies for next generation healthcare (pp. 978–3).
Dey, N., Hassanien, A. E., Bhatt, C., Ashour, A., & Satapathy, S. C. (Eds.) (2018). Internet of Things and big data analytics toward next-generation intelligence. Berlin: Springer.
Hassanien, A. E., Dey, N., & Borra, S. (Eds.). (2018). Medical Big Data and internet of medical things: Advances, challenges and applications. CRC Press.
Binh, H. T. T., & Dey, N. (Eds.). (2018). Soft computing in wireless sensor networks. CRC Press.
Das, S. K., & Tripathi, S. (2018). Energy efficient routing formation algorithm for hybrid ad-hoc network: A geometric programming approach. Peer-to-Peer Networking and Applications, 1–27.
Das, S. K., Yadav, A. K., & Tripathi, S. (2017). IE2 M: Design of intellectual energy efficient multicast routing protocol for ad-hoc network. Peer-to-Peer Networking and Applications, 10(3), 670–687.
Yadav, A. K., Das, S. K., & Tripathi, S. (2017). EFMMRP: Design of efficient fuzzy based multi-constraint multicast routing protocol for wireless ad-hoc network. Computer Networks, 118, 15–23.
Rappaport, T. S. (1996). Wireless communications: Principles and practice (Vol. 2). New Jersey: Prentice Hall PTR.
Österlind, F., Dunkels, A., Eriksson, J., Finne, N., & Voigt, T. (2006). Cross-level sensor network simulation with Cooja. In Proceedings of 31st IEEE Conference on Local Computer Networks (pp. 641–648).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Gautam, S.K., Om, H., Dixit, K. (2020). Intrusion Detection System in Internet of Things. In: Das, S., Samanta, S., Dey, N., Kumar, R. (eds) Design Frameworks for Wireless Networks. Lecture Notes in Networks and Systems, vol 82. Springer, Singapore. https://doi.org/10.1007/978-981-13-9574-1_4
Download citation
DOI: https://doi.org/10.1007/978-981-13-9574-1_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-9573-4
Online ISBN: 978-981-13-9574-1
eBook Packages: EngineeringEngineering (R0)