A Novel Intrusion Detection System for Internet of Things Network Security

A Novel Intrusion Detection System for Internet of Things Network Security

Arun Kumar Bediya, Rajendra Kumar
Copyright: © 2021 |Pages: 18
DOI: 10.4018/JITR.2021070102
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Internet of things (IoT) comprises a developing ecosystem of responsive and interconnected devices, sensors, networks, and software. The internet of things keeps on extending with the number of its different equipment segments for smart cities, healthcare, smart homes, assisted living, smart vehicles, transportation, framework, and many more are the areas where the internet of things benefits human lives. IoT networks are meant to be monitored on real-time events, and if these devices get attacked, it can have an unfavorable effect on the system. This paper discussed many possible attacks at IoT networks and distributed denial of service (DDoS) attack is one of the most dangerous among them. Blockchain technology can be utilized to develop a framework to protect IoT systems; blockchain is a new technology used for cryptocurrency transactions. This paper proposed BIoTIDS an intrusion detection system for the IoT network using blockchain. BIoTIDS is able to detect an intruder in the IoT network and also able to identify DDoS attacks in IoT networks.
Article Preview
Top

Introduction

The Internet of Things (IoT) technology and IoT devices are widening at a swift pace, many reports speculate that IoT devices will expand to 26 billion by 2020, Currently, it is numerous times that was evaluated total devices in 2009 and it is undeniably more than the 7.3 billion cell phones, PCs and tablets that are dependent upon to being used by 2020 (Middleton, Kjeldsen, & Tully, 2013).

The IoT can be defined as “an overall system of interconnected objects”, these objects must have three characteristics, a unique identity by which it can be addressed, it can be accessed using the internet or smart interface, and lastly it must be self-organized and repairable. IoT is a combination of hardware and software, where hardware may consist of sensor nodes, Radio Frequency Identification (RFID), low energy Bluetooth devices, Near Field Communication (NFC) and many more. The software provides middleware, information queries, data repository, and data retrieval and exchange. All WSN devices turn on the IoT component when it is supervised using the internet and significant security issues happen just when nodes are associated with the internet. This acquires many concerns identified with privacy and security, standardization and power management (Billure, Tayur, & Mahesh, 2015"Internet of Things,"). Internet of things architecture comprises of three layer perception layer, network layer, and application layer. At perception layer sensors and actuators perform the collecting of data from the environment and prepare data to propagate towards the network layer. At network layer transmission of data from one device to another device is the primary task performed by this layer. Gateways, cloud computing devices, Routers, Switches are connected at this layer and use 3G, 4G, Wi-Fi, and Bluetooth networks. Finally providing smart surroundings is the primary task of the application layer. Data integrity, data authenticity, and data confidentiality are ensured at the application layer(Bediya & Kumar, 2019). Distributed denial of service (DDoS) attack is possible at each layer of IoT thus it is important to secure IoT networks with DDoS. DDoS detection, identification, and countermeasure have become a critical demand to secure IoT devices (Vlajic & Zhou, 2018Zargar, Joshi, & Tipper, 2013).

Computer systems infected by malicious programs and remotely controlled by hackers are botnets (Choi, Lee, & Kim, 2009Cooke, Jahanian, & McPherson, 2005). Botnets are generally utilized by unauthorized users to perform activities such as monetary frauds, illegal access to computer machines, and leak information (Mahjabin, Xiao, Sun, & Jiang, 2017). Botnets are a serious issue to computer networks and currently, IoT devices and networks do not have sufficient security mechanisms but have weak configuration and obtained hard coded credentials. Finally, the IoT system becomes easy targets for attackers that have such vulnerabilities (Aldaej, 2019). Research shows that approximately 16-25% of computers linked with the internet are active participants of botnets (AsSadhan, Moura, Lapsley, Jones, & Strayer, 2009Kambourakis, Kolias, & Stavrou, 2017Sturgeon, 2007).

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 15: 6 Issues (2022): 1 Released, 5 Forthcoming
Volume 14: 4 Issues (2021)
Volume 13: 4 Issues (2020)
Volume 12: 4 Issues (2019)
Volume 11: 4 Issues (2018)
Volume 10: 4 Issues (2017)
Volume 9: 4 Issues (2016)
Volume 8: 4 Issues (2015)
Volume 7: 4 Issues (2014)
Volume 6: 4 Issues (2013)
Volume 5: 4 Issues (2012)
Volume 4: 4 Issues (2011)
Volume 3: 4 Issues (2010)
Volume 2: 4 Issues (2009)
Volume 1: 4 Issues (2008)
View Complete Journal Contents Listing