Intrusion Detection Systems for Internet of Things

Intrusion Detection Systems for Internet of Things

Gayathri K. S., Tony Thomas
Copyright: © 2020 |Pages: 24
DOI: 10.4018/978-1-7998-2242-4.ch008
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Internet of things (IoT) is revolutionizing this world with its evolving applications in various aspects of life such as sensing, healthcare, remote monitoring, and so on. These systems improve the comfort and efficiency of human life, but the inherent vulnerabilities in these IoT devices create a backdoor for intruders to enter and attack the entire system. Hence, there is a need for intrusion detection systems (IDSs) designed for IoT environments to mitigate IoT-related security attacks that exploit some of these security vulnerabilities. Due to the limited computing and storage capabilities of IoT devices and the specific protocols used, conventional IDSs may not be an option for IoT environments. Since the security of IoT systems is critical, this chapter presents recent research in intrusion detection systems in IoT systems.
Chapter Preview
Top

2. Iot Network And Architecture

IoT is not a single technology, rather a collection of various technologies that work together in a collaborative manner. IoT devices are embedded with sensors, actuators, processors and transceivers. Sensors are devices that collect data from the physical environment. Common sensors are temperature, camera, pressure, UV etc., Data from sensors are stored and processed either on the edge of the network or in remote servers. Actuators are devices used to effect a change in the environment based on the processed information. IoT devices are installed at geographically dispersed location and so uses wireless communication medium. Devices, local network (gateway), Internet and back-end services form the core infrastructure of IoT architecture.

The most basic architecture of IoT is a three-layered architecture. The three layers are perception layer, network layer and application layer as shown in Fig 1.

Figure 1.

3-layered architecture of IoT

978-1-7998-2242-4.ch008.f01

Complete Chapter List

Search this Book:
Reset