Affiliation:
1. Central University of Rajasthan, Ajmer, India
Abstract
The latest buzzword in internet technology nowadays is the Internet of Things. The Internet of Things (IoT) is an ever-growing network which will transform real-world objects into smart or intelligent virtual objects. IoT is a heterogeneous network in which devices with different protocols can connect with each other in order to exchange information. These days, human life depends upon the smart things and their activities. Therefore, implementing protected communications in the IoT network is a challenge. Since the IoT network is secured with authentication and encryption, but not secured against cyber-attacks, an Intrusion Detection System is needed. This research article focuses on IoT introduction, architecture, technologies, attacks and IDS. The main objective of this article is to provide a general idea of the Internet of Things, various intrusion detection techniques, and security attacks associated with IoT.
Reference51 articles.
1. Intrusion detection systems in wireless sensor networks: A review.;N. A.Alrajeh;International Journal of Distributed Sensor Networks,2013
2. Amaral, J. P., Oliveira, L. M., Rodrigues, J. J., Han, G., & Shu, L. (2014, June). Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks. In 2014 IEEE International Conference on Communications (ICC) (pp. 1796-1801). IEEE.
3. Amin, S. O., Siddiqui, M. S., Hong, C. S., & Choe, J. (2009, June). A novel coding scheme to implement signature based IDS in IP based Sensor Networks. In IFIP/IEEE International Symposium on Integrated Network Management-Workshops IM'09 (pp. 269-274). IEEE.
4. Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things.;R.An;International Conference on Broadband and Wireless Computing, Communication and Applications,2016
5. Arrington, B., Barnett, L., Rufus, R., & Esterline, A. (2016, August). Behavioral Modeling Intrusion Detection System (BMIDS) Using Internet of Things (IoT) Behavior-Based Anomaly Detection via Immunity-Inspired Algorithms. In 2016 25th International Conference on Computer Communication and Networks (ICCCN) (pp. 1-6). IEEE.
Cited by
24 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Application of Internet and BIM Technique in Smart City Construction Projects;2023 International Conference on Data Science and Network Security (ICDSNS);2023-07-28
2. A Study on the Efficiency of Intrusion Detection Systems in IoT Networks;2023 International Conference on Computer, Information and Telecommunication Systems (CITS);2023-07-10
3. Edge-Based Intrusion Detection using Machine Learning Over the IoT Network;2023 11th International Conference on Emerging Trends in Engineering & Technology - Signal and Information Processing (ICETET - SIP);2023-04-28
4. Hybrid Deep Learning-Based Intrusion Detection System for RPL IoT Networks;Journal of Sensor and Actuator Networks;2023-03-08
5. Why Do People Use IoT-Enabled Devices?;International Journal of Technology and Human Interaction;2022-11-10