Network Intrusion Detection in Internet of Things (IoT): A Systematic Review

Network Intrusion Detection in Internet of Things (IoT): A Systematic Review

Winfred Yaokumah, Richard Nunoo Clottey, Justice Kwame Appati
Copyright: © 2021 |Pages: 17
DOI: 10.4018/IJSST.2021010104
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The open nature of the internet of things network makes it vulnerable to cyber-attacks. Intrusion detection systems aid in detecting and preventing such attacks. This paper offered a systematic review of studies on intrusion detection in IoT, focusing on metrics, methods, datasets, and attack types. This review used 33 network intrusion detection papers in 31 journals and 2 conference proceedings. The results revealed that the majority of the studies used generated or private datasets. Machine learning (ML)-based methods (85%) were used in the studies, while the rest used statistical methods. Eight categories of metrics were identified as prominent in evaluating IoT performance, and 94.9% of the ML-based methods employed average detection rate. Moreover, over 20 attacks on IoT networks were detected, with denial of service (DoS) and sinkhole being the majority. Based on the review, the future direction of research should focus on using public datasets, machine learning-based methods, and metrics such as resource consumption, energy consumption, and power consumption.
Article Preview
Top

Introduction

Internet of Things (IoT) is an intelligent and interoperability node interconnected in a dynamic global infrastructure network. As a things-connected ecosystem, the devices are linked wirelessly via various smart sensors (Anthi, Williams, & Burnap, 2018) to exchange information among themselves. IoT seeks to implement the connectivity concept of anything from anywhere at any time (Ali, Ali, & Badawy, 2015). It is applied in several fields, including healthcare (smart health care systems), smart homes, smart cities, finances, energy distribution, and tourism (Chaabouni et al., 2020) to increase efficiency and performance. Developments and advancements in IoT devices and their connectivity via the Internet to exchange information across the network expose them to cyber-attacks and privacy violations. The attackers usually target the network, putting sensitive information and critical infrastructure on the network at risk. There are various IoT network attacks, include routing attacks, Denial of Service (DoS) attacks, hello flood attacks, data leakage, Distributed Denial of Service (DDoS), spoofing, wormhole attacks, and insecure gateways.

A successful attack on a single device or component in an IoT environment can cripple part or the complete IoT network (Chaabouni et al., 2020), interfering with the network’s services’ operations. Hence, there is a need to develop effective security systems to detect and prevent attacks in the IoT environment. Recent studies have used various approaches such as deep learning techniques (Al-hawawreh, Sitnikova, & Hartog, 2019), random neural networks (Saeed, Ahmadinia, Javed, & Larijani, 2016), binary logistic regression (Ioannou & Vassiliou, 2018), K-Nearest Neighbor (KNN) (Li, Yi, Wu, Pan, & Li, 2014), Naïve Bayes classification (Mehmood, Mukherjee, Ahmed, Song, & Malik, 2018), and neighbor discovery protocol (Alsadhan et al., 2019) to detect intrusion and attacks in IoT environment.

This paper reviews journal articles and conference papers on network intrusion detection in the Internet of Things (IoT) environment to assess the current developments and to provide future research direction of IoT security. The review aims to evaluate studies used in network intrusion detection of published papers on IoT. Papers published from 2012 to 2019 were evaluated using methods, datasets, metrics, and attack types. Six research questions and the motivations which aided in collecting the necessary information from papers for the review are summarized in Table 1.

Table 1.
Research Questions
Research QuestionsMotivation
RQ1Which journals are the leading publishers of network intrusion detection in IoT?Identification of the vital network intrusion detection in IoT journals.
RQ2What kind of datasets are mostly used for network intrusion detection?Identifying whether detection models are repeatable or not by checking the use of datasets.
RQ3What kind of methods are mostly used for network intrusion detection in the IoT network?Identifying trends and opportunities for network intrusion detection in the IoT environment.
RQ4What kind of metrics are mostly used for network intrusion detection in IoT network?Identifying trends and opportunities for network intrusion detection of the metrics used in IoT.
RQ5What is the percentage of papers published after the year 2016?Identifying if papers published after 2016 represent the larger portion of papers in literature or not.
RQ6What kind of issues or anomalies detected in IoT network?Identifying the issues or anomalies detected in IoT network.

Complete Article List

Search this Journal:
Reset
Volume 10: 1 Issue (2024)
Volume 9: 2 Issues (2022): 1 Released, 1 Forthcoming
Volume 8: 2 Issues (2021)
Volume 7: 2 Issues (2020)
Volume 6: 2 Issues (2019)
View Complete Journal Contents Listing