Skip to main content

A Survey on Different Security Frameworks and IDS in Internet of Things

  • Conference paper
  • First Online:
Proceedings of International Conference on Recent Innovations in Computing

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 1001))

Abstract

Internet of things has significantly revamped the whole dynamics of communication. It consists of multiple heterogeneous devices which exchange and receive data over the Internet with phenomenal ubiquitous connection. The heavy penetration of these devices into everyone’s life poses diverse nature of cyber security threats. IoT devices are susceptible to vast range of attacks due to their limited computation capabilities, low power and memory constraints. Even within one IoT standard, a device typically has multiple options to communicate with other devices. Various security measures have been proposed to counter these attacks from time to time. Intrusion detection system are excellent frameworks to save these devices from such vulnerabilities. This paper aims to conduct a deep, systematic and comprehensive survey on different IDS and security frameworks. Also, a novel security framework based on deep learning algorithms and blockchain platform has been proposed for this study.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Sethi P, Sarangi S (2017) Internet of Things: architectures, protocols, and applications. J Electr Comput Eng 1–25

    Google Scholar 

  2. Different types of intrusion detection systems (IDS). https://wisdomplexus.com/blogs/different-types-of-intrusion-detection-systems-ids/. Last accessed 2022/05/02

  3. Bostani H, Sheikh M (2016) Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach. Comput Commun. Elsevier

    Google Scholar 

  4. Diro A, Chilamkurti N (2017) Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener Comput Syst. https://doi.org/10.1016/j.future.2017.08.043

    Article  Google Scholar 

  5. CasadoVara R, Prieta F, Prieto J, Corchado J (2018) Blockchain framework for IoT data quality via edge computing. In: BlockSys’18: proceedings of the 1st workshop on blockchain-enabled networked sensor systems 2018. ACM, pp 19–24

    Google Scholar 

  6. Fakhri D, Mutijarsa K (2018) Secure IoT communication using blockchain technology. In: International symposium on electronics and smart devices 2018. IEEE, pp 1–6. https://doi.org/10.1109/ISESD.2018.8605485

  7. Zhao H, Zhang Y, Peng Y, Xu R (2018) Efficient key management scheme for health blockchain keys. CAAI Trans Intell Technol 3

    Google Scholar 

  8. Singh S, Rathore S, Park J (2020) BlockIoTIntelligence: a blockchain-enabled Intelligent IoT architecture with artificial intelligence. Future Gener Comput Syst 110:721–743. https://doi.org/10.1016/j.future.2019.09.002

  9. Li D, Deng L, Lee M, Wang H (2019) IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning. Int J Inf Manage 49:533–545. https://doi.org/10.1016/j.ijinfomgt.2019.04.006

    Article  Google Scholar 

  10. Anthi E, Williams L, Slowinska M, Theodorakopoulos G, Burnap P (2019) A supervised intrusion detection system for smart home IoT devices. IEEE Internet Things J 6:9042–9053. https://doi.org/10.1109/jiot.2019.2926365

  11. Ferdowsi A, Saad W (2019) Generative adversarial networks for distributed intrusion detection in the Internet of Things. In: IEEE global communications conference 2019. IEEE, pp 1–6. https://doi.org/10.1109/GLOBECOM38437.2019.9014102

  12. Rathore S, Pan Y, Park J (2019) BlockDeepNet: a blockchain-based secure deep learning for IoT network. Sustainability 11(14):3974. https://doi.org/10.3390/su11143974

    Article  Google Scholar 

  13. Arshad J, Azad M, Abdeltaif M, Salah K (2020) An intrusion detection framework for energy constrained IoT devices. Mech Syst Sig Process 136:106436. https://doi.org/10.1016/j.ymssp.2019.106436

    Article  Google Scholar 

  14. Liang C, Shanmugam B, Azam S, Karim A, Islam A, Zamani M, Kavianpour S, Bashah N (2020) Intrusion detection system for the Internet of Things based on blockchain and multi-agent systems. Electronics 9:1120. https://doi.org/10.3390/electronics9071120

    Article  Google Scholar 

  15. Sai Kiran K, Devisetty R, Kalyan N, Mukundini K, Karthi R (2020) Building a intrusion detection system for IoT environment using machine learning techniques. Procedia Comput Sci 171:2372–2379. https://doi.org/10.1016/j.procs.2020.04.257

  16. Singh S, Azzaoui A, Kim TW, Pan Y, Park JH (2021) DeepBlockScheme: a deep learning-based blockchain driven scheme for secure smart city. Sustain Cities Soc 11. https://doi.org/10.22967/HCIS.2021.11.012

  17. Alzubaidi L, Zhang J, Humaidi A et al (2021) Review of deep learning: concepts, CNN architectures, challenges, applications, future directions. J Big Data. https://doi.org/10.1186/s40537-021-00444-8

    Article  Google Scholar 

  18. Singh M, Aujla G, Bali R (2021) A deep learning-based blockchain mechanism for secure internet of drones environment. IEEE Trans Intell Transp Syst 22:4404–4413. https://doi.org/10.1109/tits.2020.2997469

  19. Al-Garadi M, Mohamed A, Al-Ali A et al (2020) A survey of machine and deep learning methods for Internet of Things (IoT) security. IEEE Commun Surv 22:1646–1685. https://doi.org/10.1109/comst.2020.2988293

  20. Alfandi O, Khanji S, Ahmad L, Khattak A (2021) A survey on boosting IoT security and privacy through blockchain. In: Cluster computing. Springer, pp 37–55. https://doi.org/10.1007/s10586-020-03137-8

  21. Xu M, Chen X, Kou G (2019) A systematic review of blockchain. Financ Innov. https://doi.org/10.1186/s40854-019-0147-z

    Article  Google Scholar 

  22. Zheng XR, Lu Y (2021) Blockchain technology—recent research and future trend. Enterprise Inform Syst. https://doi.org/10.1080/17517575.2021.1939895

    Article  Google Scholar 

  23. Christidis K, Devetsikiotis M (2016) Blockchains and smart contracts for the Internet of Things. IEEE Access. 4:2292–2303. https://doi.org/10.1109/ACCESS.2016.2566339

    Article  Google Scholar 

  24. Garg R, Gupta P, Kaur A (2021) Secure IoT via blockchain. IOP Conf Ser Mater Sci Eng

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hiteshwari Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharma, H., Manhas, J., Sharma, V. (2023). A Survey on Different Security Frameworks and IDS in Internet of Things. In: Singh, Y., Singh, P.K., Kolekar, M.H., Kar, A.K., Gonçalves, P.J.S. (eds) Proceedings of International Conference on Recent Innovations in Computing. Lecture Notes in Electrical Engineering, vol 1001. Springer, Singapore. https://doi.org/10.1007/978-981-19-9876-8_17

Download citation

Publish with us

Policies and ethics