Internet of Things (IoT) and their Intrusion: Solution and Potential Challenges
Keywords:
IoT, IDS, Attacks, ChallengesAbstract
As we know, the cyber-attacks are merging day by day. Everything that relates to the internet has compromised with the attacks. Internet connection and their connectivity with other devices make them more vulnerable to attacks. Numerous industries, including aerial observation, wireless communication, healthcare, construction, precision farming, search and rescue, and the military, heavily rely on their usage. Moreover, these systems or networks are still exposed and have loopholes that make it welcomed to attackers to invade the system or network easily. Intrusion detection system is the system that is used to sense and also protect the network from cyber-attacks that are possible due to internet connections. This paper highlights the threat and issues that are link with the intrusion detection system in IoT domain. Also, paper emphasis on the significance or importance of the IDS in IoT. Also highlights the various IDS like signature-based IDS, anomaly-based IDS etc. Furthermore, describes and elaborates the problems that are faced with respect to each type of IDS. Finally, suggest remediation against each problem of each type of IDS to safeguard the IoT domain.
References
Spadaccino, P., & Cuomo, F. Intrusion Detection Systems for IoT: opportunities and challenges offered by Edge Computing and Machine Learning. arXiv preprint arXiv:2012.01174,2020
Sanju, P. Enhancing Intrusion Detection in IoT Systems: A Hybrid Metaheuristics-Deep Learning Approach with Ensemble of Recurrent Neural Networks. Journal of Engineering Research, 100122, 2023
Sicato, J. C. S., Singh, S. K., Rathore, S., & Park, J. H. A comprehensive analyses of intrusion detection system for IoT environment. Journal of Information Processing Systems, 16(4), 975-990, 2020
R. Nicole, “Title of paper with only first word capitalized,” J. Name Khan, A. R., Kashif, M., Jhaveri, R. H., Raut, R., Saba, T., & Bahaj, S. A. Deep learning for intrusion detection and security of Internet of things (IoT): current analysis, challenges, and possible solutions. Security and Communication Networks, 2022.Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interface,” IEEE Transl. J. Magn. Japan, vol. 2, pp. 740–741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982],2022
Benkhelifa, E., Welsh, T., & Hamouda, W. A critical review of practices and challenges in intrusion detection systems for IoT: Toward universal and resilient systems. IEEE communications surveys & tutorials, 20(4), 3496-3509.2018
Hassija, V.; Saxena, V.; Chamola, V. Scheduling drone charging for multi-drone network based on consensus time-stamp and game theory. Comput. Commun. 2019, 149, 51–61. [Google Scholar] [CrossRef]
Khraisat, A., & Alazab, A. A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity, 4, 1-27, 2021
Awajan, A. A novel deep learning-based intrusion detection system for IOT networks. Computers, 12(2), 34,2023
Santhosh Kumar, S. V. N., Selvi, M., & Kannan, A. A comprehensive survey on machine learning-based intrusion detection systems for secure communication in internet of things. Computational Intelligence and Neuroscience, 2023.
Mohy-eddine, M., Guezzaz, A., Benkirane, S., & Azrour, M. An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection. Multimedia Tools and Applications, 1-19,2023
Shah, H., Shah, D., Jadav, N. K., Gupta, R., Tanwar, S., Alfarraj, O., ... & Marina, V. Deep learning-based malicious smart contract and intrusion detection system for IoT environment. Mathematics, 11(2), 418.,2023
Othman, T. S., Koy, K. R., & Abdullah, S. M. Intrusion Detection Systems for IoT Attack Detection and Identification Using Intelligent Techniques. networks, 5(6),2023
Savanovi?, N., Toskovic, A., Petrovic, A., Zivkovic, M., Damaševi?ius, R., Jovanovic, L., ... & Nikolic, B. Intrusion detection in healthcare 4.0 internet of things systems via metaheuristics optimized machine learning. Sustainability, 15(16), 12563 ,2023
Bhavsar, M., Roy, K., Kelly, J., & Olusola, O. Anomaly-based intrusion detection system for IoT application. Discover Internet of Things, 3(1), 5 ,2023
Mahadik, S., Pawar, P. M., & Muthalagu, R. Efficient Intelligent Intrusion Detection System for Heterogeneous Internet of Things (HetIoT). Journal of Network and Systems Management, 31(1), 2,2023
Heidari, A., & Jabraeil Jamali, M. A. Internet of Things intrusion detection systems: A comprehensive review and future directions. Cluster Computing, 26(6), 3753-3780 ,2023
Jeyaselvi, M., Dhanaraj, R. K., Sathya, M., Memon, F. H., Krishnasamy, L., Dev, K., ... & Qureshi, N. M. F. A highly secured intrusion detection system for IoT using EXPSO-STFA feature selection for LAANN to detect attacks. Cluster Computing, 26(1), 559-574 ,2023
Musleh, D., Alotaibi, M., Alhaidari, F., Rahman, A., & Mohammad, R. M. Intrusion Detection System Using Feature Extraction with Machine Learning Algorithms in IoT. Journal of Sensor and Actuator Networks, 12(2), 29,2023
Al Sawafi, Y., Touzene, A., & Hedjam, R.Hybrid Deep Learning-Based Intrusion Detection System for RPL IoT Networks. Journal of Sensor and Actuator Networks, 12(2), 21,2023
Otoum, Y., Liu, D., & Nayak, A. DL?IDS: a deep learning–based intrusion detection framework for securing IoT. Transactions on Emerging Telecommunications Technologies, 33(3), e3803,2022
Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., & Ahmad, F. Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1), e4150,2021
Visoottiviseth, V., Sakarin, P., Thongwilai, J., & Choobanjong, T. Signature-based and behavior-based attack detection with machine learning for home IoT devices. In 2020 IEEE REGION 10 CONFERENCE (TENCON) (pp. 829-834). IEEE,2020
Khattak, H. A., Shah, M. A., Khan, S., Ali, I., & Imran, M. Perception layer security in Internet of Things. Future Generation Computer Systems, 100, 144-164. 2019
OS, J. N., & Bhanu, S. M. S. A survey on code injection attacks in mobile cloud computing environment. In 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (pp. 1-6). IEEE.2018, January
M. Devi and A. Majumder, ‘‘Side-channel attack in Internet of Things: A survey,’’ in Applications of Internet of Things (Lecture Notes in Networks and Systems), J. K. Mandal, S. Mukhopadhyay, and A. Roy, Eds. Singapore: Springer, 2021, pp. 213–222.
K. O. A. Alimi, K. Ouahada, A. M. Abu-Mahfouz, and S. Rimer, ‘‘A survey on the security of low power wide area networks: Threats, challenges, and potential solutions,’’ Sensors, vol. 20, no. 20, pp. 1–19, 2020
H. Mrabet, S. Belguith, A. Alhomoud, and A. Jemai, ‘‘A survey of IoT security based on a layered architecture of sensing and data analysis,’’ K. Nirmal, B. Janet, and R. Kumar, ‘‘Analyzing and eliminating phishing
R. Vishwakarma and A. K. Jain, ‘‘A survey of DDoS attacking techniques and defence mechanisms in the IoT network,’’ Telecommun. Syst., vol. 73, no. 1, pp. 3–25, Jan. 2020
Raoof, A. Matrawy, and C.-H. Lung, ‘‘Enhancing routing security in IoT: Performance evaluation of RPL’s secure mode under attacks,’’ IEEE Internet Things J., vol. 7, no. 12, pp. 11536–11546, Dec. 2020.
D. Dinculean? and X. Cheng, ‘‘Vulnerabilities and limitations of MQTT protocol used between IoT devices,’’ Appl. Sci., vol. 9, no. 5, p. 848, Feb. 2019.
Tewari and B. B. Gupta, ‘‘Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework,’’ Future Gener. Comput. Syst., vol. 108, pp. 909–920, Jul. 2020.
Ahlawat, A. Sangwan, and V. Sindhu, ‘‘IoT system model, challenges and threats,’’ Int. J. Sci. Technol. Res., vol. 9, no. 3, pp. 6771–6776, 2020.
Prabadevi and N. Jeyanthi, ‘‘A review on various sniffing attacks and its mitigation techniques,’’ Indonesian J. Elect. Eng. Comput. Sci., vol. 12, no. 3, pp. 1117–1125, 2018
Tariq, N., Saboor, T., Ashraf, M., Butt, R., Anwar, M., & Humayun, M. IoT Security, Future Challenges, and Open Issues. In Cybersecurity Measures for Logistics Industry Framework (pp. 116-140). IGI Global. 2024
Butt, M. H. F., Li, J. P., Saboor, T., Arslan, M., & Butt, M. A. F. Intelligent Phishing Url Detection: A Solution Based On Deep Learning Framework. In 2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) (pp. 434-439). IEEE. 2021, December.
Butt, M. H. F., Li, J. P., & Saboor, T. A tunable and explainable attributes (TEA) for recommendation system. In 2020 17th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) (pp. 39-43). IEEE. 2020, December
Mortada M. Abdulwahab, Hadeel A.Mohamed, Mutseuim A. Alameen, Mohamed A. Mosalam, Faris M.Elsadig, "Wireless Sensor Network of Monitoring Water Distribution Network Service using IoT," International Journal of Scientific Research in Computer Science and Engineering, Vol.11, Issue.1, pp.51-55, 2023
Prabhat Bisht, Manmohan Singh Rauthan, "Machine Learning and Natural Language Processing Based Web Application Firewall for Mitigating Cyber Attacks in Cloud," International Journal of Scientific Research in Computer Science and Engineering, Vol.11, Issue.3, pp.1-15, 2023
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.