Towards a Secure Internet of Things: A Comprehensive Study of Second Line Defense Mechanisms

被引:11
|
作者
Kamaldeep [1 ]
Dutta, Maitreyee [1 ]
Granjal, Jorge [2 ]
机构
[1] Natl Inst Tech Teachers Training & Res, Chandigarh 160019, India
[2] Univ Coimbra, Ctr Informat & Syst, P-3030790 Coimbra, Portugal
关键词
Internet of Things; intrusion detection; intrusion prevention; intrusion response; Internet of Things Security; standardized protocols; INTRUSION DETECTION SYSTEM; DEEP LEARNING APPROACH; DETECTION SCHEME; IOT; LIGHTWEIGHT; ATTACKS; MODEL; CHALLENGES; 6LOWPAN; BOTNET;
D O I
10.1109/ACCESS.2020.3005643
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) exemplifies a large network of sensing and actuating devices that have penetrated into the physical world enabling new applications like smart homes, intelligent transportation, smart healthcare and smart cities. Through IoT, these applications have consolidated in the modern world to generate, share, aggregate and analyze large amount of security-critical and privacy sensitive data. As this consolidation gets stronger, the need for security in IoT increases. With first line of defense strategies like cryptography being unsuited due to the resource constrained nature, second line of defense mechanisms are crucial to ensure security in IoT networks. This paper presents a comprehensive study of existing second line of defense mechanisms for standardized protocols in IoT networks. The paper analyzes existing mechanisms in three aspects: Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) and Intrusion Response Systems (IRS). We begin by providing an overview of standardized protocol stack, its layers and defensive security systems in IoT. From there, we build our narrative by presenting an extended taxonomy of IDS, IPS and IRS classifying them on their techniques, deployment, attacks, datasets, evaluation metrics and data pre-processing methods. We then thoroughly review, compare and analyze the research proposals in this context, considering the unique characteristics involved in these systems. Based on the extensive analysis of the existing defensive security systems, the paper also identifies open research challenges and directions for effective design of such systems for IoT networks, which could guide future research in the area.
引用
收藏
页码:127272 / 127312
页数:41
相关论文
共 50 条
  • [21] Trust Management for Internet of Things: A Comprehensive Study
    Wei, Lijun
    Yang, Yuhan
    Wu, Jing
    Long, Chengnian
    Li, Bo
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (10): : 7664 - 7679
  • [22] A Comprehensive Study of Security of Internet-of-Things
    Mosenia, Arsalan
    Jha, Niraj K.
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2017, 5 (04) : 586 - 602
  • [23] Towards Secure and Intelligent Internet of Health Things: A Survey of Enabling Technologies and Applications
    Zaman, Umar
    Imran
    Mehmood, Faisal
    Iqbal, Naeem
    Kim, Jungsuk
    Ibrahim, Muhammad
    [J]. ELECTRONICS, 2022, 11 (12)
  • [24] Survey of Intrusion Detection Systems towards an End to End Secure Internet of Things
    Gendreau, Audrey A.
    Moorman, Michael
    [J]. 2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2016), 2016, : 84 - 90
  • [25] Towards A Layered and Secure Internet-of-Things Testbed via Hybrid Mesh
    Jones, Tyler
    Dali, Aniket
    Rao, Manoj Ramesh
    Biradar, Neha
    Madassery, Jean
    Liu, Kaikai
    [J]. 2018 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (ICIOT), 2018, : 17 - 24
  • [26] A Comprehensive Review of Fault-Tolerant Routing Mechanisms for the Internet of Things
    Lan, Zhengxin
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (07) : 1083 - 1093
  • [27] Beyond the smart things: Towards the definition and the performance assessment of a secure architecture for the Internet of Nano-Things
    Sicari, S.
    Rizzardi, A.
    Piro, G.
    Coen-Porisini, A.
    Grieco, L. A.
    [J]. COMPUTER NETWORKS, 2019, 162
  • [28] A Comprehensive Study on the Trust Management Techniques in the Internet of Things
    Pourghebleh, Behrouz
    Wakil, Karzan
    Navimipour, Nima Jafari
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06): : 9326 - 9337
  • [29] The Study of Comprehensive Experimental Platform Based on internet of things
    Yong OuYang
    Wang, ChunZhi
    [J]. PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1580 - 1583
  • [30] Study on a Secure Wireless Data Communication in Internet of Things Applications
    Liu, Chibiao
    Qiu, Jinming
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (02): : 18 - 23