Towards a Secure Internet of Things: A Comprehensive Study of Second Line Defense Mechanisms

被引:11
|
作者
Kamaldeep [1 ]
Dutta, Maitreyee [1 ]
Granjal, Jorge [2 ]
机构
[1] Natl Inst Tech Teachers Training & Res, Chandigarh 160019, India
[2] Univ Coimbra, Ctr Informat & Syst, P-3030790 Coimbra, Portugal
关键词
Internet of Things; intrusion detection; intrusion prevention; intrusion response; Internet of Things Security; standardized protocols; INTRUSION DETECTION SYSTEM; DEEP LEARNING APPROACH; DETECTION SCHEME; IOT; LIGHTWEIGHT; ATTACKS; MODEL; CHALLENGES; 6LOWPAN; BOTNET;
D O I
10.1109/ACCESS.2020.3005643
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) exemplifies a large network of sensing and actuating devices that have penetrated into the physical world enabling new applications like smart homes, intelligent transportation, smart healthcare and smart cities. Through IoT, these applications have consolidated in the modern world to generate, share, aggregate and analyze large amount of security-critical and privacy sensitive data. As this consolidation gets stronger, the need for security in IoT increases. With first line of defense strategies like cryptography being unsuited due to the resource constrained nature, second line of defense mechanisms are crucial to ensure security in IoT networks. This paper presents a comprehensive study of existing second line of defense mechanisms for standardized protocols in IoT networks. The paper analyzes existing mechanisms in three aspects: Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) and Intrusion Response Systems (IRS). We begin by providing an overview of standardized protocol stack, its layers and defensive security systems in IoT. From there, we build our narrative by presenting an extended taxonomy of IDS, IPS and IRS classifying them on their techniques, deployment, attacks, datasets, evaluation metrics and data pre-processing methods. We then thoroughly review, compare and analyze the research proposals in this context, considering the unique characteristics involved in these systems. Based on the extensive analysis of the existing defensive security systems, the paper also identifies open research challenges and directions for effective design of such systems for IoT networks, which could guide future research in the area.
引用
收藏
页码:127272 / 127312
页数:41
相关论文
共 50 条
  • [31] A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion
    Ding, Wenxiu
    Jing, Xuyang
    Yan, Zheng
    Yang, Laurence T.
    [J]. INFORMATION FUSION, 2019, 51 : 129 - 144
  • [32] A Cross-Layer Secure and Energy-Efficient Framework for the Internet of Things: A Comprehensive Survey
    Mustafa, Rashid
    Sarkar, Nurul I.
    Mohaghegh, Mahsa
    Pervez, Shahbaz
    [J]. Sensors, 2024, 24 (22)
  • [33] A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions
    Rao, Patruni Muralidhara
    Deebak, B. D.
    [J]. AD HOC NETWORKS, 2023, 146
  • [34] A Comprehensive Review on Secure Routing in Internet of Things: Mitigation Methods and Trust-Based Approaches
    Muzammal, Syeda M.
    Murugesan, Raja Kumar
    Jhanjhi, N. Z.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) : 4186 - 4210
  • [35] Caching Mechanisms towards Single-Level Storage Systems for Internet of Things
    Bando, Yosuke
    Watanabe, Konosuke
    Maeda, Ken-ichi
    Kudo, Hiroki
    Ishiyama, Masahiro
    Kunimatsu, Atsushi
    Nakai, Hiroto
    Takahashi, Masafumi
    Oowaki, Yukihito
    [J]. 2015 SYMPOSIUM ON VLSI CIRCUITS (VLSI CIRCUITS), 2015,
  • [36] Towards Lightweight Identity-Based Encryption for the Post-Quantum-Secure Internet of Things
    Gueneysu, Tim
    Oder, Tobias
    [J]. PROCEEDINGS OF THE EIGHTEENTH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED), 2017, : 319 - 324
  • [37] Towards Secure Elements For The Internet of Things: The eLock Use Case Work in Progress - Invited Paper
    Urien, Pascal
    [J]. PROCEEDINGS OF THE 2016 SECOND CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2016,
  • [38] Service management mechanisms in the internet of things: an organized and thorough study
    Yu, Jiuhong
    Wang, Mengfei
    Liu, Jinfan
    Abnosian, Karlo
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (01) : 75 - 86
  • [39] Service management mechanisms in the internet of things: an organized and thorough study
    Jiuhong Yu
    Mengfei Wang
    Jinfan Liu
    Karlo Abnosian
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 75 - 86
  • [40] Review on Routing Performance Matrices,Tools, Security Attacks and Defense Mechanisms in Context of Internet of Things
    Gothawal, Deepali B.
    Nagaraj, S. V.
    [J]. 2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,