Towards a Secure Internet of Things: A Comprehensive Study of Second Line Defense Mechanisms

作者: Kamaldeep , Maitreyee Dutta , Jorge Granjal

DOI: 10.1109/ACCESS.2020.3005643

关键词:

摘要: The Internet of Things (IoT) exemplifies a large network sensing and actuating devices that have penetrated into the physical world enabling new applications like smart homes, intelligent transportation, healthcare cities. Through IoT, these consolidated in modern to generate, share, aggregate analyze amount security-critical privacy sensitive data. As this consolidation gets stronger, need for security IoT increases. With first line defense strategies cryptography being unsuited due resource constrained nature, second mechanisms are crucial ensure networks. This paper presents comprehensive study existing standardized protocols analyzes three aspects: Intrusion Detection Systems (IDS), Prevention (IPS) Response (IRS). We begin by providing an overview protocol stack, its layers defensive systems IoT. From there, we build our narrative presenting extended taxonomy IDS, IPS IRS classifying them on their techniques, deployment, attacks, datasets, evaluation metrics data pre-processing methods. then thoroughly review, compare research proposals context, considering unique characteristics involved systems. Based extensive analysis systems, also identifies open challenges directions effective design such networks, which could guide future area.

参考文章(143)
P. Levis, S. Madden, J. Polastre, R. Szewczyk, K. Whitehouse, A. Woo, D. Gay, J. Hill, M. Welsh, E. Brewer, D. Culler, TinyOS: An Operating System for Sensor Networks ambient intelligence. pp. 115- 148 ,(2005) , 10.1007/3-540-27139-2_7
Hung-Jen Liao, Chun-Hung Richard Lin, Ying-Chih Lin, Kuang-Yuan Tung, Review: Intrusion detection system: A comprehensive review Journal of Network and Computer Applications. ,vol. 36, pp. 16- 24 ,(2013) , 10.1016/J.JNCA.2012.09.004
Daesung Moon, Sung Bum Pan, Ikkyun Kim, Host-based intrusion detection system for secure human-centric computing The Journal of Supercomputing. ,vol. 72, pp. 2520- 2536 ,(2016) , 10.1007/S11227-015-1506-9
Christian Cervantes, Diego Poplade, Michele Nogueira, Aldri Luiz dos Santos, Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things integrated network management. pp. 606- 611 ,(2015) , 10.1109/INM.2015.7140344
J. Postel, Transmission Control Protocol Internet Request for Comment (RFC793). ,vol. 793, pp. 1- 91 ,(1981)
Eung Jun Cho, Jin Ho Kim, Choong Seon Hong, Attack Model and Detection Scheme for Botnet on 6LoWPAN Management Enabling the Future Internet for Changing Business and New Computing Services. pp. 515- 518 ,(2009) , 10.1007/978-3-642-04492-2_66
Ismail Butun, Burak Kantarci, Melike Erol-Kantarci, Anomaly detection and privacy preservation in cloud-centric Internet of Things 2015 IEEE International Conference on Communication Workshop (ICCW). pp. 2610- 2615 ,(2015) , 10.1109/ICCW.2015.7247572
Pavan Pongle, Gurunath Chavan, Real Time Intrusion and Wormhole Attack Detection in Internet of Things International Journal of Computer Applications. ,vol. 121, pp. 1- 9 ,(2015) , 10.5120/21565-4589
Choong Seon Hong, Muhammad Shoaib Siddiqui, Young jig Yoon, Syed Obaid Amin, A novel Intrusion Detection Framework for IP-based sensor networks international conference on information networking. pp. 285- 287 ,(2009)
J. Postel, User Datagram Protocol RFC768. ,vol. 768, pp. 1- 3 ,(1980)