Abstract
IoT Security is the area concerned with safeguarding connected systems. IoT involves the set-up of various integrated devices. Devices are identified with a unique identifier, and provided with the ability to transfer data over the network opens them up to several serious vulnerabilities, if not appropriately protected. An Intrusion Detection and Prevention System (IDPS) plays a crucial part in discovering and preventing numerous attacks entering the network and provide an uncompromised secure system. The sheer volume of the sensors in a system comes with limitations such as interoperability, scalability, and storage, where security algorithms like IDS couldn’t perform well as it requires a huge amount of labelled data for training, to detect intrusions and ascertain new attacks. Fog computing plays a major role with a decentralized architecture allows IoT devices to compute, make decisions, take actions, and push only relevant information to the cloud. Data availability is closer and can act immediately for the sensitive information, which in turn helps the IDS to perform well using Artificial Intelligence algorithm to detect and prevent various attacks. This paper categorizes the existing recent researches in IoT Intrusion Detection systems using artificial intelligence and fog computing architecture in terms of technical constraints.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Gartner.com (2019) [Online]. Available: https://www.gartner.com/imagesrv/books/iot/iotEbook_digital.pdf. Accessed 29 Oct 2019
Moustafa N, Choo K, Radwan I, Camtepe S (2019) Outlier Dirichlet mixture mechanism: adversarial statistical learning for anomaly Detection in the fog. IEEE Trans Inf Forensics Secur 14:1975–1987
Hasan M, Islam M, Zarif M, Hashem M (2019) Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet Things 7:100059
Nguyen T, Phan T, Nguyen B, So-In C, Baig Z, Sanguanpong S (2019) SeArch: a collaborative and intelligent NIDS architecture for SDN-based cloud IoT networks. IEEE Access 7:107678–107694
Anthi E, Williams L, Slowinska M, Theodorakopoulos G, Burnap P (2019) A supervised intrusion detection system for smart home IoT devices. IEEE Internet Things J 6:9042–9053
B. Sudqi Khater, A. Abdul Wahab, M. Idris, M. Abdulla Hussain, A. Ahmed Ibrahim, A lightweight perceptron-based intrusion detection system for fog computing. Appl Sci 9 (2019) 178
Alaiz-Moreton H, Aveleira-Mata J, Ondicol-Garcia J, Muñoz-Castañeda A, García I, Benavides C (2019) Multiclass classification procedure for detecting attacks on MQTT-IoT protocol. Complexity 2019:1–11
Chaabouni N, Mosbah M, Zemmari A, Sauvignac C, Faruki P (2019) Network intrusion detection for IoT security based on learning techniques. IEEE Commun Surv Tutor 21:2671–2701
Jan S, Ahmed S, Shakhov V, Koo I (2019) Toward a lightweight intrusion detection system for the internet of things. IEEE Access 7:42450–42471
Wang Y, Meng W, Li W, Li J, Liu W, Xiang Y (2018) A fog-based privacy-preserving approach for distributed signature-based intrusion detection. J Parallel Distrib Comput 122:26–35
Abeshu A, Chilamkurti N (2018) Deep learning: the frontier for distributed attack detection in fog-to-things computing. IEEE Commun Mag 56:169–175
An X, Zhou X, Lü X, Lin F, Yang L (2018) Sample selected extreme learning machine based intrusion detection in fog computing and MEC. Wirel Commun Mobile Comput 2018:1–10
Diro A, Chilamkurti N (2018) Leveraging LSTM networks for attack detection in fog-to-things communications. IEEE Commun Mag 56:124–130
Prabavathy S, Sundarakantham K, Shalinie S (2018) Design of cognitive fog computing for intrusion detection in internet of things. J Commun Netw 20:291–298
Meidan Y, Bohadana M, Mathov Y, Mirsky Y, Shabtai A, Breitenbacher D et al (2018) N-BaIoT—Network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput 17:12–22
McDermott C, Majdani F, Petrovski A (2018) Botnet detection in the internet of things using deep learning approaches. In: 2018 international joint conference on neural networks (IJCNN), pp 1–8
Deng L, Li D, Yao X, Cox D, Wang H (2018) Mobile network intrusion detection for IoT system based on transfer learning algorithm. Clust Comput 21:1–16
Amouri A, Alaparthy VT, Morgera SD (2018) Cross layer-based intrusion detection based on network behavior for IoT. In: IEEE 19th wireless and microwave technology conference (WAMICON). IEEE, Sand Key, pp 1–4
Liu L, Xu B, Zhang X, Wu X (2018) An intrusion detection method for internet of things based on suppressed fuzzy clustering. EURASIP J Wirel Commun Netw 1:113
Stephen R, Arockiam L (2017) Intrusion detection system to detect sinkhole attack on RPL protocol in internet of things. Int J Electr Electron Comput Sci 4(4):16–20
Bostani H, Sheikhan M (2017) Hybrid of anomaly-based and specification-based IDS for internet of things using unsupervised OPF based on MapReduce approach. Comput Commun 98:52–71
Fu Y, Yan Z, Cao J, Ousmane K, Cao X (2017) An automata based intrusion detection method for internet of things. Mob Inf Syst 2017:13
Khan ZA, Herrmann P (2017) A trust based distributed intrusion detection mechanism for internet of things. In: 2017 IEEE 31st international conference on advanced information networking and applications (AINA). IEEE, Taipei, pp 1169–1176
Lopez-Martin M, Carro B, Sanchez-Esguevillas A, Lloret J (2017) Conditional variational autoencoder for prediction and feature recovery applied to intrusion detection in IoT. Sensors 17:1967
Pajouh H, Javidan R, Khayami R, Dehghantanha A, Choo K (2019) A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans Emerg Topics Comput 7:314–323
Le A, Loo J, Chai KK, Aiash M (2016) A specification-based IDS for detecting attacks on RPL-based network topology. Information 7(2):1–19
Bace R, Mell P (2001) Intrusion detections systems, National Institute of Standards and Technology
Hosseinpour F, Vahdani Amoli P, Plosila J, Hämäläinen T, Tenhunen H (2016) An intrusion detection system for fog computing and IoT based logistic systems using a smart data approach. Int J Digital Content Technol Appl 10(5):34–46
Cha H, Yang H, Song Y (2018) A study on the design of fog computing architecture using Sensor networks. Sensors 18(11):3633
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Boyanapalli, A., Shanthini, A. (2021). A Comparative Study of Techniques, Datasets and Performances for Intrusion Detection Systems in IoT. In: Hemanth, D., Vadivu, G., Sangeetha, M., Balas, V. (eds) Artificial Intelligence Techniques for Advanced Computing Applications. Lecture Notes in Networks and Systems, vol 130. Springer, Singapore. https://doi.org/10.1007/978-981-15-5329-5_22
Download citation
DOI: https://doi.org/10.1007/978-981-15-5329-5_22
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5328-8
Online ISBN: 978-981-15-5329-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)