Affiliation:
1. Central University of Rajasthan, Ajmer, India
Abstract
The latest buzzword in internet technology nowadays is the Internet of Things. The Internet of Things (IoT) is an ever-growing network which will transform real-world objects into smart or intelligent virtual objects. IoT is a heterogeneous network in which devices with different protocols can connect with each other in order to exchange information. These days, human life depends upon the smart things and their activities. Therefore, implementing protected communications in the IoT network is a challenge. Since the IoT network is secured with authentication and encryption, but not secured against cyber-attacks, an Intrusion Detection System is needed. This research article focuses on IoT introduction, architecture, technologies, attacks and IDS. The main objective of this article is to provide a general idea of the Internet of Things, various intrusion detection techniques, and security attacks associated with IoT.
Reference51 articles.
1. Intrusion detection systems in wireless sensor networks: A review.;N. A.Alrajeh;International Journal of Distributed Sensor Networks,2013
2. Amaral, J. P., Oliveira, L. M., Rodrigues, J. J., Han, G., & Shu, L. (2014, June). Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks. In 2014 IEEE International Conference on Communications (ICC) (pp. 1796-1801). IEEE.
3. Amin, S. O., Siddiqui, M. S., Hong, C. S., & Choe, J. (2009, June). A novel coding scheme to implement signature based IDS in IP based Sensor Networks. In IFIP/IEEE International Symposium on Integrated Network Management-Workshops IM'09 (pp. 269-274). IEEE.
4. Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things.;R.An;International Conference on Broadband and Wireless Computing, Communication and Applications,2016
5. Arrington, B., Barnett, L., Rufus, R., & Esterline, A. (2016, August). Behavioral Modeling Intrusion Detection System (BMIDS) Using Internet of Things (IoT) Behavior-Based Anomaly Detection via Immunity-Inspired Algorithms. In 2016 25th International Conference on Computer Communication and Networks (ICCCN) (pp. 1-6). IEEE.
Cited by
27 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献