Towards a Secure Internet of Things: A Comprehensive Study of Second Line Defense Mechanisms

被引:11
|
作者
Kamaldeep [1 ]
Dutta, Maitreyee [1 ]
Granjal, Jorge [2 ]
机构
[1] Natl Inst Tech Teachers Training & Res, Chandigarh 160019, India
[2] Univ Coimbra, Ctr Informat & Syst, P-3030790 Coimbra, Portugal
关键词
Internet of Things; intrusion detection; intrusion prevention; intrusion response; Internet of Things Security; standardized protocols; INTRUSION DETECTION SYSTEM; DEEP LEARNING APPROACH; DETECTION SCHEME; IOT; LIGHTWEIGHT; ATTACKS; MODEL; CHALLENGES; 6LOWPAN; BOTNET;
D O I
10.1109/ACCESS.2020.3005643
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) exemplifies a large network of sensing and actuating devices that have penetrated into the physical world enabling new applications like smart homes, intelligent transportation, smart healthcare and smart cities. Through IoT, these applications have consolidated in the modern world to generate, share, aggregate and analyze large amount of security-critical and privacy sensitive data. As this consolidation gets stronger, the need for security in IoT increases. With first line of defense strategies like cryptography being unsuited due to the resource constrained nature, second line of defense mechanisms are crucial to ensure security in IoT networks. This paper presents a comprehensive study of existing second line of defense mechanisms for standardized protocols in IoT networks. The paper analyzes existing mechanisms in three aspects: Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) and Intrusion Response Systems (IRS). We begin by providing an overview of standardized protocol stack, its layers and defensive security systems in IoT. From there, we build our narrative by presenting an extended taxonomy of IDS, IPS and IRS classifying them on their techniques, deployment, attacks, datasets, evaluation metrics and data pre-processing methods. We then thoroughly review, compare and analyze the research proposals in this context, considering the unique characteristics involved in these systems. Based on the extensive analysis of the existing defensive security systems, the paper also identifies open research challenges and directions for effective design of such systems for IoT networks, which could guide future research in the area.
引用
收藏
页码:127272 / 127312
页数:41
相关论文
共 50 条
  • [1] Internet of Things: A Comprehensive Study of Security Issues and Defense Mechanisms
    Ahanger, Tariq Ahamed
    Aljumah, Abdullah
    [J]. IEEE ACCESS, 2019, 7 : 11020 - 11028
  • [2] Towards a Secure Internet of Things
    Levis, Phil
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), 2018, : 1 - 1
  • [3] Towards Secure Internet of Things-Enabled Intelligent Transportation Systems: A Comprehensive Review
    Lu, Changxia
    Wang, Fengyun
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (07) : 82 - 93
  • [4] Towards Secure Communications in Heterogeneous Internet of Things
    Nguyen, James H.
    Liao, Weixian
    Yu, Wei
    [J]. 2023 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2023, : 426 - 430
  • [5] Optimal Deployments of Defense Mechanisms for the Internet of Things
    Ge, Mengmeng
    Cho, Jin-Hee
    Kamhoua, Charles A.
    Kim, Dong Seong
    [J]. 2018 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT 2018), 2018, : 8 - 17
  • [6] Towards the internet of underwater things: a comprehensive survey
    Mohsan, Syed Agha Hassnain
    Mazinani, Alireza
    Othman, Nawaf Qasem Hamood
    Amjad, Hussain
    [J]. EARTH SCIENCE INFORMATICS, 2022, 15 (02) : 735 - 764
  • [7] Towards the internet of underwater things: a comprehensive survey
    Syed Agha Hassnain Mohsan
    Alireza Mazinani
    Nawaf Qasem Hamood Othman
    Hussain Amjad
    [J]. Earth Science Informatics, 2022, 15 : 735 - 764
  • [8] Towards A Secure Access Control Architecture for the Internet of Things
    Pal, Shantanu
    Hitchens, Michael
    Varadharajan, Vijay
    [J]. 2017 IEEE 42ND CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2017, : 219 - 222
  • [9] Service selection mechanisms in the Internet of Things (IoT): a systematic and comprehensive study
    Li, Yunyan
    Huang, Yuansheng
    Zhang, Meimei
    Rajabion, Lila
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (02): : 1163 - 1183
  • [10] Service selection mechanisms in the Internet of Things (IoT): a systematic and comprehensive study
    Yunyan Li
    Yuansheng Huang
    Meimei Zhang
    Lila Rajabion
    [J]. Cluster Computing, 2020, 23 : 1163 - 1183