Abstract

The Internet of Things (IoT) exemplifies a large network of sensing and actuating devices that have penetrated into the physical world enabling new applications like smart homes, intelligent transportation, smart healthcare and smart cities. Through IoT, these applications have consolidated in the modern world to generate, share, aggregate and analyze large amount of security-critical and privacy sensitive data. As this consolidation gets stronger, the need for security in IoT increases. With first line of defense strategies like cryptography being unsuited due to the resource constrained nature, second line of defense mechanisms are crucial to ensure security in IoT networks. This paper presents a comprehensive study of existing second line of defense mechanisms for standardized protocols in IoT networks. The paper analyzes existing mechanisms in three aspects: Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) and Intrusion Response Systems (IRS). We begin by providing an overview of standardized protocol stack, its layers and defensive security systems in IoT. From there, we build our narrative by presenting an extended taxonomy of IDS, IPS and IRS classifying them on their techniques, deployment, attacks, datasets, evaluation metrics and data pre-processing methods. We then thoroughly review, compare and analyze the research proposals in this context, considering the unique characteristics involved in these systems. Based on the extensive analysis of the existing defensive security systems, the paper also identifies open research challenges and directions for effective design of such systems for IoT networks, which could guide future research in the area.

Highlights

  • The Internet of things (IoT) is touted to be one of the key enablers of the revolution in the digital world

  • 5) EVALUATION METRICS Several metrics as accuracy, True positive rate (TPR), false positive rate (FPR), memory overhead have been used by researchers to evaluate IoT Intrusion Detection Systems (IDS), but if one has to compare the metrics of different proposals they must be trained and tested using the same data and operational setting

  • 6) DATA PREPROCESSING-DIMENSIONALITY REDUCTION Whether it is intrusion detection or prevention, both are incomplete without the selection of accurate network features, which are fed into machine learning algorithms during training process

Read more

Summary

Introduction

The Internet of things (IoT) is touted to be one of the key enablers of the revolution in the digital world. The IoT allows to connect everyday objects ( referred to as things) to the Internet, by equipping them with identifying, sensing, actuating, networking and processing capabilities. Such capabilities allows objects with sensing and actuating capabilities to communicate with one another, and with other devices and services over the Internet, in order to accomplish tasks in the context of IoT applications. Them being already deployed at various levels These applications include smart homes, wearable technology, smart grid, smart cities, smart healthcare, smart agriculture, among many others [1]. IoT was coined by British entrepreneur Kevin Ashton in the year 1999 while commencing his work at MIT AutoID Center.

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call