ArticlePDF Available

Abstract and Figures

Many Internet of Things (IoT) systems run on tiny connected devices that have to deal with severe processor and energy restrictions. Often, the limited processing resources do not allow the use of standard security mechanisms on the nodes, making IoT applications quite vulnerable to different types of attacks. This holds particularly for intrusion detection systems (IDS) that are usually too resource-heavy to be handled by small IoT devices. Thus, many IoT systems are not sufficiently protected against typical network attacks like Denial-of-Service (DoS) and routing attacks. On the other side, IDSs have already been successfully used in adjacent network types like Mobile Ad hoc Networks (MANET), Wireless Sensor Networks (WSN), and Cyber-Physical Systems (CPS) which, in part, face limitations similar to those of IoT applications. Moreover, there is research work ongoing that promises IDSs that may better fit to the limitations of IoT devices. In this article, we will give an overview about IDSs suited for IoT networks. Besides looking on approaches developed particularly for IoT, we introduce also work for the three similar network types mentioned above and discuss if they are also suitable for IoT systems. In addition, we present some suggestions for future research work that could be useful to make IoT networks more secure.
This content is subject to copyright. Terms and conditions apply.
Review Article
Recent Advancements in Intrusion Detection Systems for
the Internet of Things
Zeeshan Ali Khan 1and Peter Herrmann 2
1School of Electrical Engineering, Minhaj University, Lahore, Pakistan
2Department of Information Security and Communication Technology, Norwegian University of Science and Technology (NTNU),
Trond heim, Nor way
Correspondence should be addressed to Peter Herrmann; herrmann@ntnu.no
Received 31 January 2019; Revised 20 May 2019; Accepted 29 May 2019; Published 3 July 2019
Guest Editor: Jose M. Alcaraz-Calero
Copyright ©  Zeeshan Ali Khan and Peter Herrmann. is is an open access article distributed under the Creative Commons
Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is
properly cited.
Many Internet of ings (IoT) systems run on tiny connected devices that have to deal with severe processor and energy restrictions.
Oen, the limited processing resources do not allow the use of standard security mechanisms on the nodes, making IoT applications
quite vulnerable to dierent types of attacks. is holds particularly for intrusion detection systems (IDS) that are usually too
resource-heavy to be handled by small IoT devices. us, many IoT systems are not suciently protected against typical network
attacks like Denial-of-Service (DoS) and routing attacks. On the other side, IDSs have already been successfully used in adjacent
network types like Mobile Ad hoc Networks (MANET), Wireless Sensor Networks (WSN), and Cyber-Physical Systems (CPS)
which, in part, face limitations similar to those of IoT applications. Moreover, there is research work ongoing that promises IDSs
that may better t to the limitations of IoT devices. In this article, we will give an overview about IDSs suited for IoT networks.
Besides looking on approaches developed particularly for IoT, we introducea lso work for the three similar network types mentioned
above and discuss if they are also suitable for IoT systems. In addition, we present some suggestions for future research work that
could be useful to make IoT networks more secure.
1. Introduction
e Internet of ings (IoT) is an emerging technology used
in various elds of application like healthcare, transport, and
smart grid. IoT (to improve the readability, we list in Table 
the abbreviations used in our article) applications oen make
a dierence since they comprise very small devices that can,
e.g., be worn on the skin or attached to domestic appliances.
etininessofthedevicesandthefactthat,tobemobile,
they oen have to rely on light batteries, however, limit their
processing capabilities and restrict their energy supply. is
makes traditional security mechanisms too heavy-weight to
be eciently applied on such systems. In consequence, the
devices are used without sucient protection such that they
caneitherbeattackeddirectlyorutilizedbyattackersto
launch attacks on third parties. For instance, multiple IoT
devices were used to start a distributed Denial-of-Service
(DDoS) attack on an American Internet services company
that made it impossible for many customers to access certain
Internet services; see Nordrum []. Cases like this reveal that
thereisanurgentneedtobuildsecuresolutionsthatare
suitable for IoT devices. In general, security of IoT networks
is a relatively new research area that, however, can prot from
related research carried out for similar networks like Mobile
Ad hoc Networks (MANET), Wireless Sensor Networks
(WSN), and Cyber-Physical Systems (CPS). At least some of
the ndings in these areas seem to be promising also for the
development of protection mechanisms for IoT networks.
Intrusion Detection Systems (IDSs) are an important
countermeasure against many types of network attacks. Most
existing IDSs, however, require a signicant amount of
resources aggravating their usability on small IoT devices.
us, there is a demand for special IDS solutions that are
lightweight but, nevertheless, give a high degree of protection.
In this paper, we give a survey of existing IDS approaches
thataresuitedforIoTnetworks.SinceonlyrelativelyfewIDSs
Hindawi
Security and Communication Networks
Volume 2019, Article ID 4301409, 19 pages
https://doi.org/10.1155/2019/4301409
Security and Communication Networks
T : List of abbreviations.
AI Articial Intelligence
AODV Ad-hoc On-demand Distance Vector
API Application Programming Interface
BS Base Station
CH Cluster Head
CPS Cyber Physical System
DDoS Distributed Denial of Service
DoS Denial of Service
FSM Finite State Machine
GPS Global Positioning System
IDS Intrusion Detection System
IMS Intrusion Mitigation System
IoT Internet of ings
IPS Intrusion Prevention System
MANET Mobile Ad-hoc Network
RPL Routing Protocol for Low power
and Lossy networks
SVM Support Vector Machine
WSN Wireless Sensor Networks
for IoT systems have, yet, been developed, we further extend
ouroverviewonIDSsproposedforWSNs,MANETs,and
CPSs that have properties similar to IoT applications.
e article is structured as follows. First, we sketch
some relevant aspects of security issues for IoT networks in
Section . ereaer, in Section  we give an introduction
to IDSs including a scheme to characterize their proper-
ties that was developed by Anantvalee and Wu []. ese
characteristics can then be used to distinguish the presented
IDS approaches and evaluate if they are appropriate for
IoT networks. is is discussed in Section . ereaer, we
introduce IDS approaches for WSNs, MANETs, and CPSs
in Section  and discuss whether and how the solutions for
these akin network types can be adapted to IoT systems.
is is followed by the introduction of the IDS approaches
particularly developed for IoT networks in Section . Finally,
we present two suggestions for interesting research areas in
Section  followed by a conclusion.
is article is signicantly dierent to others already
published:
(i) Butun et al. [] consider various types of IDSs that are
implemented for WSNs. ey, however, do not dis-
cuss the eligibility of these methods for IoT networks.
(ii) Granjal et al. [] present a survey article that discusses
IoT security issues in general, but does not focus on
the development of IDSs.
(iii) Gendreau and Moorman [] discuss IDSs for IoT
networks but more with the focus on properties, these
systems should have, and less a survey.
(iv) Benkhelifa et al. [] discuss the advancements in
intrusion detection systems for the IoT. However, they
do not write about intrusion detection solutions for
WSNs, MANETs, and CPSs that have the potential to
be also implemented for IoT networks. Likewise, in
contrast to this paper, they do not discuss implemen-
tation issues for the IoT networks.
(v) Ammar et al. [] published another article related to
IoT security. Yet, it is signicantly dierent from ours
as it only explains the security of IoT frameworks with
regard to their internal architecture.
(vi) Restuccia et al. [] provide a survey on IoT secu-
rity research by considering the application of
machine learning and soware-dened networking
only. erefore, it is signicantly dierent from our
survey article, as we consider a lot more techniques
that are suitable for IoT networks.
(vii) Ud Din et al. [] only discuss a survey on trust
management techniques for the IoT networks, with-
out considering the advancements in other elds
of IoT security. Further, the authors refrain from
discussing the challenges faced in deploying IDSs on
real platforms. Moreover, the article does not take
advantage of considering work done in akin network
types.
2. IoT Security
As mentioned above, important properties of IoT systems
arethelimitedprocessingandenergyresourcesoftheir
nodes. at is based on the fact that many IoT devices
shallbedirectlywornbypeople.isholdsparticularly
for IoT systems used in healthcare and ambient assisted
living that are seen as major elds of application for the
technology. In consequence, it is oen dicult to use well-
knownprotectiontechnologytosafeguardIoTdevices.For
instance, encryption tends to be processing-intensive making
itdiculttoencryptandsigndatatobetransmittedviaan
IoT network. us, encryption is oen omitted making the
wireless communication vulnerable against attacks; see Ngu
et al. [].
Another characteristic of these systems is their openness
andexibility.edevicesareoenplacedinphysicallyunse-
cured areas such that they can be easily accessed by attackers.
Moreover, they use decentralized wireless communication
making it easy to connect with them from the outside. In
addition, many IoT applications need to be highly exible in
accepting new devices for further temporary or permanent
usage. All this makes it relatively simple for attackers to add
malicious behavior to the system. As discussed in Roosta et al.
[], utilizing these vulnerabilities, various kinds of physical
tamperingaswellasnetworkattackscanbelaunched.While
some attacks compromise only few IoT nodes, others can be
massive and bring down whole networks.
Further, due to the required exibility and the hetero-
geneous nature of the devices, it is oen challenging to
develop correctly working, robust, and secure solutions. For
example, the heterogeneity of the devices makes it dicult
to embed them on well-understood infrastructures such
that important functions like network access, routing, or
encryption have to be built up from scratch. In addition,
the developer of an IoT network has also to consider the
Security and Communication Networks
IDS
Decision
Quality
Responses
on Attacks
Attacker Ty pe o f Detection Implementation
Typ e Attack Technique Strategy
F : Classication of IDSs, taken in modied form from Anantvalee and Wu [].
varying physical infrastructure. For instance, a patient may
be riding in a car or train operating in a tunnel or in remote
areas without cellular network access; see Balandina et al. [].
erefore, bandwidth and throughput of such networks need
to be carefully utilized without draining the scarce battery
resources of a device by too many transmissions. In spite
of these limitations, IoT systems in healthcare have to be
extremely robust and secure to avoid medical malpractice
of their users. All these factors must be considered while
designing, engineering, and deploying an IoT network. For
all these reasons, IoT devices are subject to various kinds of
malicious attacks.
Typical attacks based on physical access are the replace-
ment of nodes or their batteries as well as the reprogramming
of nodes; see Mohammadi and Jadidoleslamy []. With
respect to network attacks, we can distinguish between active
andpassiveattacks;seeKhanandLoo[].Passiveattacks
only extract the vital information from the network without
harming its integrity. In contrast, active attacks assail the
communication of network nodes by tempering, dropping
or misdirecting the data packets. An active attack can easily
inuence a large number of IoT devices since a network
oen consists of peripherally deployed units that cooperate
with each other based on multihop communication. A well-
known example is Denial-of-Service (DoS) attacks that try to
disable the nodes from providing their tasks. Another active
type of attack is radio jamming in which the communication
is spoiled by the introduction of noise or faulty packets.
A type of attack special to IoT systems with weak devices
is battery exhaustion attacks. For instance, a device is kept
busybyleadingittosendorreceivedataunnecessarilyin
order to drain its battery power faster. Alternatively, one can
attack the network layer that is responsible for sending the
packet towards its destination using an appropriate route;
see Popescu et al. []. In most IoT devices, the protocol
mechanisms of the network layer are not protected such
that soware changes causing packet dropping and the
misdirection of packets are possible.
e typical countermeasure against all these types of
attack is intrusion detection systems (IDSs) that are intro-
duced in the following.
3. Intrusion Detection Systems (IDSs)
e IDS is a well-known technique to protect networks
against attacks as those named above. It is oen seen as a
solution for the second line of defense when attacks cannot
be detected by other security mechanisms like encryption or
access control; see Djenouri et al. []. e task of an IDS is
to detect unusual activities that potentially indicate ongoing
attacks.
To rate the IDSs presented in this paper, we use, in
adapted form, the classication scheme from Anantvalee and
Wu [] that is depicted in Figure . us, we consider the
six criteria decision quality,Responses on Attacks,Attacker
Type ,Type of At tac k,Detection Technique,andimplemen-
tation strategy.erstvearediscussedinthefollowing
subsections. Since the selected implementation strategy of an
IDS is very important for its usability for IoT networks, we
look more in-depth on this criterion. is is done in S ection .
3.1. Decision Quality. Important for the quality of an IDS is, of
course, whether it detects all occurring attacks. Moreover, the
IDS should report only actual attacks but not behavior that is
benevolent but was misinterpreted as an attack. Particularly,
the ratio between alerts given by an IDS and the actual
appearance of attacks is relevant to evaluate the decision
quality. In this context, the following terms are used; see
Patcha and Park []:
(i) True positive: an attack is happening in the system
which is correctly detected and alerted by the IDS.
(ii) True negative: no attack is happening in the system,
and the IDS correctly considers the behavior as
normal.
(iii) False positive: no attack is happening in the system,
but the IDS misinterprets the behavior as an attack
and gives a false alert.
(iv) False negative: an attack is happening in the system
which, however, is not detected by the IDS such that
no alert about the attack is given.
According to Zhang et al. [], an IDS should have a “low
falsepositiverate,calculatedasthepercentageofnormalcy
variations detected as anomalies, and high true positive rate,
calculated as the percentage of anomalies detected.”us,
it should have a minimum number of false positives and
negatives. Moreover, an IDS should have low overhead and
not degrade the system performance which is particularly
relevant for the use in IoT networks. Further, it should not
add new vulnerabilities.
3.2. Responses on Attacks. In its pure form, an IDS is not
intended to antagonize attacks by itself but it shall only alert
the network operators about ongoing attacks such that these
Security and Communication Networks
can decide about taking precautions and countermeasures.
An IDS comprises three main components:
(i) Monitoring module: used to constantly monitor the
network trac and/or events happening at certain
network nodes.
(ii) Detection module: tries to detect a malicious attack
basedonthemonitoreddata.
(iii) Alarm module: raises an alarm if an intrusion activity
has been detected.
Most systems used in practice are such IDSs without
autonomous correction capabilities but two variants that can
intervene themselves exist as well; see Fuchsberger []:
(i) An Intrusion Prevention System (IPS) automatically
takes countermeasures aer detecting an attack guar-
anteeing a timely reaction. On the other side, an
IPSalsoreactsonfalsepositiveswhichcanmake
the network unstable. ese wrong reactions can be
vulnerability in itself since sometimes false positives
can be deliberately created by attackers who want to
utilize the wrong countermeasures.
(ii) An Intruder Mitigation System (IMS) quarantines
nodes that were detected as sources of malicious net-
work attacks. As measures typically taken by an IMS,
Butun et al. [] name the generation of audit records
to gain evidence, the information of network nodes
about presumed attackers by revealing its location
and identity, and the initiation of a mitigation process
quarantining the attacker. Also this type is subject to
false positives which might lead to wrong expulsions
of correct working nodes.
e absence of reacting automatically on false positives is
themainreasonthatpureIDSsaremuchmoreoenused
in practice than IPSs and IMSs. Indeed, all approaches,
discussed in this article, are IDSs without the ability to correct
autonomously.
3.3. Attacker Type. Like other network types, an IoT system
can be threatened by both, attackers controlling one or more
network nodes and those from the environment that do
not have control over network devices. us, we dene the
following attacker types:
(i) External attacker: a node outside the network that
connects to network nodes in order to launch a
malicious attack.
(ii) Internal attacker: a node within the network that is
compromised and tries to launch attacks on other
nodes of the network.
One can distinguish whether an IDS is suited to detect attacks
launched from only external attackers, internal ones, or both
types.
3.4. Type of Attack. ere are several kinds of attacks to be
usedagainstnetworks.Withrespecttothespecialproperties
of IoT networks, we see the following types of attack:
(i) Selective forwarding (see Karlof and Wagner [];
Wallgren et al. []): due to the weakness of IoT
devices, the strengths of their transmitters are oen
limited. erefore, not all packets can be sent to their
destination in a single hop but intermediate nodes
have to be used to relay messages. By compromising
an intermediate node, an attacker can block the
forwarding of certain packets such that only those
benetting the attacker are forwarded.
(ii) Sinkhole/black hole/packet dropping (see Karlof and
Wagner []; Wallgren et al. []): oen, IoT networks
organize themselves impromptu using special proto-
cols like the RoutingProtocolforLowpowerandLossy
networks (RPL) (see IETF []). In such protocols, a
node oen prefers neighbors that guarantee a short
number of hops to the destination. By falsely claiming
a shorter number of hops than it can provide in reality,
a malicious node can attract a lot of trac from
its neighbors such that other attacks like selective
forwarding have a greater impact.
(iii) Node selshness (see Michiardi and Molva []): to
conserve its limited resources, a node may falsely
claim a higher number of hops to the destination such
that it has to forward less packets. is selsh behavior
strains the battery of neighboring nodes and degrades
the overall network performance.
(iv)Versionnumber(seeMayzaudetal.[]):thistype
of attack is also relevant for ad hoc networks. If,
duetochangesinthetopologyorcongestions,the
routing structure of a network needs to be changed, in
protocols like RPL, a new version number is assigned
triggeringafullrebuildofthenetwork.Rebuilding,
however, demands to exchange a relatively large
number of packets such that the energy resources
ofthenodesarestrained.Inconsequence,byini-
tiating many rebuilds, a malicious node may attack
the batteries of weaker nodes. Moreover, during the
rebuilding process, the network tends to be unstable
since data transfer in both versions is active at the
same time which may lead to erroneous behavior like
loops in the routing. ese vulnerabilities can be used
for other attacks.
(v) Resource depletion/battery exhaustion (see Onat and
Miri []; Boubiche and Bilami []): as already
mentioned, avoiding the straining of battery power
is an important property of wireless devices. In this
type of attack, the attacker explicitly tries to deplete
these resources of the network by using multiple
techniques. is may include the generation of high
volumes of unnecessary data injected into the net-
work.
e types of attack introduced above are particular to
IoT networks with resource-constrained nodes. In addition,
these systems are also subject to more standard types of
network attacks that have to be addressed by IDSs, too. In the
following, we name those more general attack types:
Security and Communication Networks
(i) Denial-of-Service (DoS) (see Abraham et al. [];
Albers et al. []): an attacker may overwhelm the
nodes of a network with duties such that they cannot
provide their intended tasks anymore. While DoS
attacks are critical for all network types, they are
particularly problematic for IoT devices since they are
oen also Resource Depletion attacks.
(ii) Distributed Denial-of-Service (DDoS) (see Shamshir-
bandetal.[]):thisisavariantofDoSinwhich
an attack is carried out in a coordinated manner by
ateamofattackers.Inthisway,evenlargerdamage
canbedonetothenetworkanditsnodes.
(iii) Jamming (see Bao et al. []; Sajjad et al. []): this
isalsoavariantofaDoSattack.eattackerspoils
the communication within a wireless network by
intentionally transmitting interferences on the used
communication band. us, the nodes in the network
cannot cooperate anymore.
(iv) Unauthorized access (see Abraham et al. [, ]): this
type of attack refers to gaining access to resources
without permission.
(v) Remote-to-Local (see Tsang and Kwong []): this
variant of unauthorized access attacks may happen
if an attacker has the ability to send packets to a
network from the outside, but does not have direct
access to any of the network nodes. In this case, the
attacker may utilize possible vulnerabilities to achieve
unauthorized access to the system.
(vi) User-to-Root (see Tsang and Kwong []): this is also
akindofunauthorizedaccessattack.eattacker
has only access to a normal user account but utilizes
vulnerabilities in the network to get also root access
on the system.
(vii) Probing (see Tsang and Kwong []; Abraham et
al.[]):Attackerslaunchacollaborativeattackby
probing a node. is might give useful information
helping to break its defense mechanisms.
(viii) Spoong (see Boubiche and Bilami []; Chen et al.
[]): here, packets with a false source IP address are
used to hide the identity of an attacker.
(ix) Packet repetition (see Da Silva et al. []): attackers
construct fake packets which appear as if they are
part of the normal communication. Amongst others,
this will lead to an increase in network load and
performance degradation.
(x) Packet delay (see Da Silva et al. []): valid data
transmissions are maliciously delayed but, in contrast
to selective forwarding attacks, not removed. us,
the attack leads to delayed data delivery and, in
consequence, to network performance degradation.
(xi) Wormhole (see Maleh et al. []; Da Silva et al. []):
the attacker uses two or more malicious nodes which
are linked by a nonlegitimate connection, a so-called
tunnel, faking a route that is shorter than the original
one within the network. Packets passing the tunnel
canthenbeusedforotherkindsofattack.
(xii) Packet alteration/bad data injection (see Da Silva et al.
[]): these attacks try to alter the contents of a packet
to inject malicious data into the network nodes.
(xiii) Periodic route error (see Eik Loo et al. []): here,
a compromised node broadcasts special route error
messages to neighboring nodes. ese messages say
that the route to the border router is down at the
moment and there is a need to search a new path. is
will lead to network performance degradation.
(xiv) Hello ooding, (see Maleh et al. []): most proto-
cols supporting the dynamical adding of nodes to a
network use hello messages to indicate that a node
wants to join. An attacker with a strong transmitter
unitmayconstantlytransmitsuchhellopacketstoa
large number of neighboring nodes. is may confuse
the receiving nodes, reduce their performance, and
decrease the overall network performance.
(xv) Routing misdirection and disruption (see Zhang et al.
[]): these attacks are launched by router nodes that
forward trac along wrong paths. As a consequence,
the data transmission is delayed.
(xvi) Node capture (see Mitchell and Chen [, ]): a node
is maliciously captured in order to help in launching
other attacks in the network.
(xvii) Eavesdropping (see Shin et al. []): this attack is an
unauthorized interception of data that may lead to the
extraction of useful information.
Another group of attacks can apply to trust management
systems that are used to rate the behavior of nodes in a
network. A trust management system provides a computer
system with mechanisms reecting the natural trust and
reputation gaining process of humans; see, e.g., Khare and
Riin []. In particular, it allows us to describe the trust
in an entity by a special trust value; see Jøsang []. Using
certain metrics, these trust values are computed from the
numbers of positive and negative experiences the system has
with a trustee. Moreover, the trust values of several trusters
inthesametrusteecanbeaggregatedsuchthatonecanrate
the general reputation of this trustee. In IoT networks, one
can build reputations of nodes depending on observations of
their behavior by neighboring nodes. If a node proves to be
distrustful, it can be quarantined; see Khan and Herrmann
[]. Further, one can use the reputation of a node for
routing decisions. Trust management systems, however, are
themselves vulnerable to certain attacks:
(i) Self-promotion (see Chen et al. []): a node can
promoteitselfbyeitherprovidinggoodrecommenda-
tions for itself or inciting other nodes to do so. us,
like with sinkhole attacks, it can gain more trac
thatitmaymisusetocarryoutselectiveforwarding
attacks.
(ii) Bad-mouthing (see Chen et al. []): an attacker can
issue baseless, bad trust evaluations about benevolent
nodes reducing the trac through them.
(iii) Sybil (see Karuppiah et al. []; Mitchell and Chen
[]): a malicious node creates a large number of
Security and Communication Networks
pseudonymous entities that all can rate other parties.
us, the attacking node inuences the reputation of
other nodes disproportionately. is attack type can
be utilized to target at routing, data storage, and fair
resource allocation in the network.
(iv) Ballot stung (see Chen et al. []): this is a type
of attack complementary to self-promotion attacks.
Several malicious nodes can form an alliance, and
each node provides positive trust recommendations
about its allies increasing their reputation values.
Promoting other bad nodes will eventually lead to
higher trac through them that can be misused, e.g.,
for selective forwarding or sinkhole attacks.
3.5. Detection Techniques. IDSs use signatures, anomalies,
and hybrids between both of them as the main techniques to
detect attacks. ese three techniques will be introduced in
the following.
3.5.1. Signature-Based IDSs. Systems following this strategy
are also known as rule-based IDSs. A signature refers to
system and network behavior that typically occurs when
attacks of a certain kind are launched. A signature-based IDS
keeps databases of these signatures and constantly checks the
actual network behavior for compliance with them. If the
observed behavior ts with one or more signatures, the IDS
raises an alarm. Signature-based IDSs have oen excellent
false positive rates but are not able to detect novel types of
attack for which they do not have signatures ready. erefore,
they tend to be subject to a large number of false negatives.
In order to implement this technique, proles of known
attacks are generated from which the signatures are formed.
An example of a signature could be: “If there are  or more
unsuccessful tries to login within  minutes, a brute force
unauthorized access attack is on its way”. Da Silva et al. []
dene a number of rules that are typical for signatures:
(i) Interval rule: the time dierence between two consec-
utive packet arrivals is considered.
(ii) Retransmission rule: this rule measures the rate of
correctly retransmitted transit messages by interme-
diate nodes.
(iii) Integrity rule: it is checked if a message is changed on
its way towards the destination node.
(iv) Delay rule: this rule takes the time an intermediate
node needs between receiving and further transmit-
ting a message into account.
(v) Repetition rule: the number of retransmissions of a
certainmessagebyanodeischecked.
(vi) Radio transmission range: in order to nd newly
deployed unauthorized nodes, the IDS tests if all
messages are originated by known stations within a
certain radio transmission range.
(vii) Jamming rule: the number of collisions faced by
a node is counted. It should not exceed a certain
threshold.
To detect also version number attacks one can add the
following rule type:
(i) Version number check: if the version number of
an ad hoc network changes, it is checked which
node has initiated this amendment that leads to a
reconguration of a network. Only certain nodes have
the permission to trigger adaptations of the version.
3.5.2. Anomaly-Based IDSs. ese IDSs use a set of rules to
detect anomalies in the network behavior based on heuristic
techniques. Oen, thresholds for certain behavioral patterns
are used to dene whether the activity is an intrusion or not.
In this way, a system can recognize not already known attacks.
On the other side, these IDSs tend to produce a relatively
high rate of false positives since, e.g., a threshold can also be
exceeded for other reasons that do not result from malicious
attacks. In addition, it is oen dicult to frame a useful
heuristic such that sometimes even well-known attacks can
be hardly detected.
3.5.3. Hybrid IDSs. is type of IDS combines the signature-
and anomaly-based approaches. A hybrid IDS uses two
modules, one that detects attacks based on signatures while
the other one nds anomalies from the normal network
behavior prole. A hybrid IDS has a lower number of false
positives and negatives compared to the singular approaches,
but requires signicantly higher computational resources
sincebothmoduleshavetoruninparallel.
4. Implementation Strategies
AnIDSmayresideinasinglenodefromwhichthenetwork
trac is observed or distributed over several nodes. Since IoT
applications are inherently distributed, stand-alone solutions
in which an IDS resides in a local node and protects just
this node are a bad t. As a centralized solution, we name
an IDS that is implemented on a single node but watches
also other ones and makes its decisions based on the locally
observed behavior. Also this layout does not seem suited for
IoT networks consisting of many nodes since the IDS is quite
processor-intensive such that the node executing it would
be strained. Not surprisingly, we did not nd any solutions
using these technologies for the network types discussed
in this paper. In consequence, all implementation strategies
discussed below are distributed.
Altogether, the IDSs used for WSNs, MANETs, CPSs,
and IoT networks follow nine dierent implementation
strategies listed in Table . ese strategies are not completely
orthogonal. For instance, the mentioned voting-based IDSs
and reputation-based IDSs are special forms of distributed and
collaborative IDSs that, however, use particular methods to
evaluate network behavior. Also the statistical detection-based
IDSs and machine learning-based IDSs are related. Garcia-
Teodoro et al. [] distinguishes three main techniques
allowing an anomaly-based IDS to detect the anomalies in
the system. Two are the statistical- and the machine learning-
based IDSs. e third one is knowledge-based IDSs. In this
type of system, the dierences with respect to network data
and behavior are “learned” for normal as well as for attack
Security and Communication Networks
T : IDS implementation schemes for IoT networks.
Implementation
Strategy
Energy
Consumption
Processor Requirements in
a Net With Powerful Nodes
Processor Requirements in
a Net Without Powerful
Nodes
Detection
Accuracy
Implementation on
Resource-constrained
Nodes
Hierarchical BACCA
Distributed and
Collaborative DB BCC
Voti n g A A A D A
Reputation E A A C A
Cross Layer F F F A D
Mobile Agent E E E C F
Game eory E E E B F
Statistical Detection E B F B F
Machine Learning E B F B F
e cluster head has a higher energy consumption that can be rated as E.
conditions. Such an IDS can be implemented using various
techniques from Articial Intelligence (AI) including Expert
Systems, Finite State Machines, or Data Clustering and
Outlier Detection. Since these AI methods tend to be highly
processor-intensive, this strategy seems to be unsuited for
IoT networks with their vast number of small and resource-
restricted devices. We did not nd any knowledge-based
strategies for monitoring the four network types.
Analyzing the various IDSs, we found out that the type
of nodes typically used in an IoT network plays an important
role for deciding about the suitability of an approach. Some
IDSs will only work in networks consisting of a mix of
resource limited and more powerful nodes since the latter
can take the more complex and resource-constraining system
tasks. Other techniques seem to work well also in a network
consisting only of performance-restricted nodes. In Table ,
we give an overview about how we rate the suitability
of the dierent implementation strategies with respect to
the energy consumption, the processor requirements, the
accuracy of the methods, and the possibility of implementing
the IDSs on IoTs with many resource-constrained nodes. e
two conguration types, i.e., IoT networks with or without
powerful nodes, are separated with respect to the processor
requirements. In the table, we use letters from Ato Fas
applied for grading in schools and universities in the US and
other countries. e letter Agives the best rating while Fis
the worst.
Inthefollowing,weintroducethenineimplementation
strategies to greater detail. Further, we elaborate their impact
on energy and processing resources. is determines whether
IDSs using a certain strategy have the potential to be a good
t for IoT networks.
4.1. Hierarchical IDSs. e network is partitioned into clus-
ters. Here, nodes that are close to each other usually belong
to the same cluster. Each cluster is assigned a leader, the so-
called cluster head (CH), that monitors the member nodes
and participates in network-wide analyses.
e formation of the clusters is oen a highly inter-
active process that requires a fair amount of communica-
tion between the nodes and is therefore energy-intensive.
Aer completing the cluster building, however, most of the
coordination necessary to nd signatures or anomalies is
performed within the clusters. erefore, the resources to
monitor a cluster and to process the observed results tend
to be manageable and will likely not exceed the processor,
storage, and energy restrictions of typical IoT nodes. In
addition,energyissavedduetothesmallernumberof
messages to be exchanged. On the other side, in spite of the
fact that most of the communication takes place within the
clusters, a CH oen has to relay data between members of its
cluster and other CHs. is additional communication can
strain the resources of a CH.
Altogether, using this strategy for IoT networks consisting
just of energy- and processing-restricted nodes will be prob-
lematic as those acting as CHs will probably be signicantly
strained over time. Nevertheless, hierarchical IDSs seem to t
well for IoT systems that contain some more powerful nodes
sincethesecanthentaketheroleoftheCHs.
4.2. Distributed and Collaborative IDSs. Here, an IDS is
implemented on several nodes that observe separate aspects
ofasystem.elocallyobserveddataarethenshared
between the dierent nodes, which make a collaborative
decision whether the network behavior should be rated as
malicious.
is solution is promising for IoT systems without strong
devices since signatures or anomalies are detected by several
collaborating nodes. us, the processing eort is spread over
several devices such that the stress for each one is reduced. On
the other side, the coordination between the nodes requires a
lot of data exchange which tends to consume energy.
4.3. Voting-Based IDSs. In this variant of Distributed and
CollaborativeIDSs,thedecisionaboutevaluatingthecurrent
behavior as an intrusion is made collaboratively based on a
ballot of the distributed components.
Security and Communication Networks
is type of scheme is lightweight in nature and friendly
for the processor and battery of a node. us, it seems suited
for typical IoT systems. However due to its simplistic nature,
the rate of false negatives, i.e., not detected attacks, can be
quite large.
4.4. Reputation-Based IDSs. at is another variant of the
distributed and collaborative IDSs, in which the benevolence
of nodes is rated based on their previous behavior. us, each
node has a reputation that can be modeled and calculated
using trust management mechanisms as described in Sec-
tion ..
In general, the trust values do not need a lot of storage,
and the metrics for trust value computation and aggregation
consist of relatively simple calculations that are processor-
friendly. is makes the approach suited for IoT devices. A
problem, however, is the way nodes observe their neighbors.
For that, they oen have not only to listen to their own
network trac but also to those of the observed nodes. at
leads to long channel listening times which may drain the
battery of the unit faster. is aspect is taken up in the sug-
gestion for future research directions discussed in Section ..
Another issue is the exchange of trust values to compute a
general reputation but, thanks to their compactness, that is
less problematic.
Like other Distributed and Collaborative IDSs, this
method seems to be a good t to IoT networks thanks to
the simple computation and storage mechanisms used but
the potentially signicant communication eort can be an
impeding factor.
4.5. Cross Layer IDSs. Each of the implementation strategies
mentioned above operates on a single layer of the OSI
stack and detects attacks on this layer only. In contrast, a
cross layer IDS observes dierent layers. Critical information
is exchanged between the layers, and the decision about
intrusions is made based on the synthesized observations.
eadvantageofthismethodisagooddecisionquality.
Realizing this strategy, however, demands to process data
on several layers as well as a large amount of coordination
between dierent nodes that has to cover all observed layers.
erefore, this technique tends to require a lot of energy and
computational resources. us, this approach seems to be
less suited to IoT networks with the processor and battery
restrictions of their nodes.
4.6. Mobile Agent-Based IDSs. eIDSisrealizedasamobile
agent that may relocate itself between the nodes of the
network. In the various positions, the agent may conduct
the observations necessary to decide about the presence of
attacks.
is technology mainly used for MANETs reduces the
communication costs between nodes. On the other side, it
requires lengthy transfers of the agent code and data which
will drain battery power. Moreover, there can be signicant
congestions between the network coordinator and the agent
node. e processing power of a node is unevenly strained
by this mechanism since the node only carries out IDS-
related computations when it bears the agent while all other
nodes cannot contribute to the intrusion detection process.
is can be a problem when nodes with weak processors
slow down the overall analysis process. Finally, it can be
quite problematic to realize the complex agent-handling
functionalityondeviceswithlimitedAPIs.
In consequence, this strategy does not seem to be a good
t for IoT networks with many restricted devices.
4.7. Game eory-Based IDSs. In this strategy, an IDS is real-
ized using mathematical models of conict and cooperation
knownfromgametheory;seeMyerson[].
e eligibility of this method for IoT systems is hard to
predict since the processor and energy load depends heavily
on the games used. If one applies games that only strain few
devices in the network, it may be a t for IoT networks with
some more powerful devices. A more general problem is that
game theory-based systems tend to be interactive since the
network administrators need to adjust the detection rate from
time to time. is makes them highly personal-intensive and
therefore expensive.
4.8. Statistical Detection-Based IDSs. isisoneofthethree
strategies mentioned above, where Garcia-Teodoro et al.
[] suggest to use for anomaly-based IDSs. It comprises
the generation of a stochastic prole for the trac to be
observed. ereaer the network is monitored and the real
trac is compared with the reference prole. e IDS ags
an anomaly if the behavior exceeds a certain threshold in
comparison with the pattern. e statistic models can be
univariate, multivariate, and time series models.
e strategy includes the handling of large amounts of
data which, however, requires strong processors and good
storage abilities. In addition, the statistical computation tends
to be computational intensive. Since the computations are
usually done centrally, statistical detection, yet, can be applied
when an IoT system uses some more powerful components
like a border router. is device can then keep the informa-
tion, compute it based on the detection model to be used, and,
if necessary, forward relevant data from time to time to the
other stations.
Like the hierarchical IDSs, this strategy seems only to t
to IoT networks that include a fair number of powerful nodes.
4.9. Machine Learning-Based IDSs. isisanotherstrat-
egy suggested by Garcia-Teodoro et al. [] to categorize
anomaly-based IDSs. In such an IDS, a model of the analyzed
patterns is generated. ese models are constantly updated to
increase the detection rate of the IDS. Machine learning can
be realized by various techniques such as Bayesian Networks,
Markov Models, Fuzzy Logic, Genetic Algorithms, Neural
Networks, and Principal Component Analysis.
Since machine learning uses processing-intensive algo-
rithms, the same issues as for statistical detection will apply
and the method seems to suit only IoT networks with a fair
amount of powerful nodes.
5. IDSs for WSNs, MANETs, and CPSs
As discussed in the introduction, we will not only look on
IDSs particularly developed for IoT networks but also look
Security and Communication Networks
on those protecting adjacent network types. In this respect,
we see WSNs, MANETs, and CPSs as worthwhile since they
have properties that, in part, resemble those of IoT networks.
ese three network types can be described as follows (see
also Mitchell and Chen []):
(i) Wireless Sensor Networks (WSNs) are used to trans-
port data from physically dislocated sensors to a
common sink. us, the data ows tend to be more
uniform than in IoT networks in which the devices
oen have both sensor and actuator functionality.
Further, the WSN nodes are, in general, not connected
to external networks and cannot be accessed through
the Internet. Moreover, they are oen screwed to xed
positions and not mobile. On the other side, like IoT
devices, many WSN nodes have limited energy and
processing capabilities.
(ii) Mobile Ad hoc Networks (MANET) are self-
conguring networks without a central control unit
that have mobile member nodes. Since IoT nodes
canalsobemobile;e.g.,iftheyareusedintransport
vehicles, their structure is close to those of MANETs.
A dierence is, however, that not all IoT nodes
cooperateinanadhocstylewitheachotherbutcan
also have a stable network topology.
(iii) Cyber-Physical Systems (CPS) are heterogeneous
control systems for technical systems acting in the
physical space, e.g., transport systems, industrial
plants,orrobots.Oen,thesesystemsfacemultiple
interacting control loops, varying networks and hard
real-time properties to fulll. In addition, many CPSs
operate in hazardous locations with extreme temper-
ature or in the vicinity of dangerous materials. Also,
various units operate in close proximity to each other
such that collisions have to be avoided.
Altogether, the three mentioned networks have properties
that are quite close to those of IoT systems such that the con-
versionofIDSsdevelopedforthemtoIoTnetworksseems
promising. However, there are some signicant dierences
that may aggravate this conversion:
(i) Computational capacity: MANET nodes are usually
more powerful units, e.g., modern personal com-
puters with powerful processors and a large storage
capability. at is very dierent to the oen very small
nodes used in IoT or WSN networks.
(ii) Power supply: the same holds for the energy supply.
MANET devices are oen plugged or use large bat-
teries while those in the other network types have to
rely on small batteries that can be easily drained.
(iii) Mobility: IoT, MANET, and CPS nodes are oen
installedonmobileunitswhileWSNnodestendto
be xed.
(iv) Node density: since the nodes of IoT, WSN, and
CPS networks are in many cases used to sense and
inuence physical environments, there are typically
more of them in a geographical area than MANET
nodes.
(v) Communication range: due to the physical limitations
of their transmitters, the communication range for
IoT and WSN devices is in the range of  to 
meters, while MANET nodes can transmit data up to
distances of  meters.
(vi) Communication bandwidth: likewise, the communi-
cation bandwidth of WSN and IoT devices is less than
that of MANET nodes.
(vii) Internet connectivity: the IoT network and MANET
nodes are oen connected via the Internet using an
IPv-enabled border router, while WSNs and CPSs
are usually private networks that are not connected to
the outer world.
Keeping these dierences in mind, we look in the fol-
lowing subsections for particular IDS solutions for WSNs,
MANETs, and CPSs.
5.1. WSNs. e IDSs for Wireless Sensor Networks are
realized using altogether seven of the nine implementation
strategies introduced in Section . In each of the following
subsections, we list all approaches realizing a certain strategy.
Further, we discuss if our expectations about the suitability
of the implementation strategies for IoT networks are met
by the actual IDS realizations. To keep track of the various
approaches, we also sketch them together with their most
relevant properties in Table . ere, we also mark if an
IDS approach seems to be suitable for being used for IoT
networks.
5.1.1. Hierarchical IDSs. In Shin et al. [], the authors pro-
pose a one-hop clustering mechanism for intrusion detection.
e target application for the proposed solution is industrial
applications. Similarly, Chen et al. [] talk about an energy-
ecient way for intrusion detection in WSNs using an
isolation table. In their solution, two levels of clustering
are proposed to detect intrusions in a performance-eective
way. When the leader of a lower level detects an intrusion
in a subcluster, it forwards the according message to the
leader of the higher level who forwards it to the base
station. While this approach is performance-eective, since
a leader has to observe smaller subclusters, the problem
of hierarchical IDSs that a malicious leader may not pass
analerttothesinkisnotsolvedhere.InStrikos[],
the author proposes a method to place intruder detectors
to strategic positions of the network such that the whole
network is covered. However, no simulation or experimental
results proving his claims are provided. Rajasegarar et al. []
discuss an anomaly detection algorithm for a clustered WSN
that minimizes the communication overhead. e proposed
scheme is evaluated using a real-world project. Eik Loo et
al. [] present a clustered IDS for WSNs that dierentiates
between normal and abnormal trac using a normal trac
model. us, it is able to detect route errors and sinkhole
attacks. Another approach distinguishing between normal
and abnormal behavior is introduced in Mamun and Kabir
[]. It comprises a hybrid IDS for WSNs that are divided
into hexagonal regions each having a cluster head. e attack
signatures are propagated from the base station towards the
 Security and Communication Networks
T : Comparative analysis of IDSs implemented for WSNs.
IDS Implementation Detection Attacks IoT
Abraham et al. [] Statistical Detection Signature DoS, Unauthorized Access N
Abraham et al. [] Statistical Detection Signature Probing, Unauthorized Access N
Agah et al. [] Game eory Signature N/A N
Agah and Das [] Game eory Signature DoS, Selective Forwarding N
Bao et al. [] Reputation Signature Jamming, Sybil, DoS, Sinkhole
Boubiche and Bilami [] Cross Layer Signature Sinkhole, Spoong, Battery Exhaustion
Chen et al. [] Hierarchical Signature Spoong, Sinkhole
Da Silva et al. [] Distributed and
Collaborative Signature Repetition, Packet Delay, Wormhole, Packet,
Alteration,Blackhole,SelectiveForwarding
Deng et al. [] Machine Learning Anomaly Blackhole N
Doumit and Agrawal [] Statistical Detection Anomaly N/A
Eik Loo et al. [] Hierarchical Anomaly Periodic Route Error, Sinkhole
Guerroumi et al. [] Hierarchical Signature Sinkhole
Ioannis et al. [] Distributed and
Collaborative Signature Selective Forwarding, Blackhole
Jadidoleslamy [] Hierarchical Signature N/A
Khan and Loo [] Cross Layer Signature Hello Flooding
Krontiris et al. [] Distributed and
Collaborative Signature Selective Forwarding
Maleh et al. [] Machine Learning Hybrid Blackhole, Wormhole, Hello Flooding, Selective
Forwarding
Mamun and Kabir [] Hierarchical Hybrid N/A
Ngai et al. [] Statistical Detection Anomaly Sinkhole
Onat and Miri [] Statistical Detection Anomaly Hello Flooding
Onat and Miri [] Statistical Detection Signature Resource Depletion N
Rajasegarar et al. [] Hierarchical Anomaly N/A
Sedjelmaci and Feham [] Machine Learning Hybrid Routing Disruption
Shamshirband et al. [] Game eory Anomaly Distributed DoS
Shin et al. [] Hierarchical Signature Selective Forwarding
Strikos [] Hierarchical Signature DoS, Routing Disruption
Wang et al. [] Reputation Signature Selective Forwarding
Suited for IoT networks with some stations without energy limitations that can act as cluster heads.
leaf nodes and the mechanism has predened specications
for normal and abnormal behavior. e anomaly detection
is done by measuring deviations from the predened speci-
cations. A signature-based IDS is presented in Jadidoleslamy
[]. It is distributed and hierarchical making the detection
of both active and passive response-based attacks possible.
Guerroumi et al. [] propose an intrusion detection system
against sinkhole attacks on IDSs with mobile sinks. e
scheme is implemented in a hierarchical topology using
attack signatures.
Evaluating these approaches conrms our prediction
about hierarchical IDSs made in Section .. ey seem to be
a good t also for IoT networks since each cluster consists of
a limited number of nodes. Nevertheless, it is good if an IoT
network also contains stronger nodes that can take the role of
the CHs.
5.1.2. Distributed and Collaborative IDSs. In Ioannis et al.
[], a collaborative watching scheme is used for a distributed
IDS implementation, in order to detect selective forwarding
attacks. Krontiris et al. [] present an IDS, which applies
nodes equipped with a local detector that triggers suspicions
about a neighbor. Moreover, the nodes collaborate to evaluate
suspicions in order to detect whether a node in question is,
indeed, an attacker. Similarly, Da Silva et al. [] discuss a
specication-based IDS that uses a decentralized detection
process. In this algorithm, the collection of a data unit and
itsprocessingisperformedinadistributedmannertomake
theIDSscalableandrobust.
AspredictedinSection.,theseIDSsseemtot
generally well to IoT networks while the extended data
exchange necessary for coordination may have an impact on
the energy resources.
Security and Communication Networks 
5.1.3. Reputation-Based IDS. Wang et al. [] propose an IDS
that uses the idea of marking the exchanged packets while
heuristic ranking algorithms identify malicious nodes in the
network. When the sink receives a marked packet, it can
compute the average dropping ratio for each node. If this ratio
exceeds a threshold, the node is declared to be malicious. Bao
et al. [] propose a probability model-based technique to
analyzesubjectiveversusobjectivetrust.eauthorsclaim
that the proposed scheme has a better detection capability
than anomaly-based IDS. e two schemes are lightweight in
nature. erefore, as predicted in Section ., they are suitable
for IoT networks.
5.1.4. Cross Layer IDS. Boubiche and Bilami [] introduce
a cross layer IDS that uses an intrusion detection agent
to exchange information between the physical, MAC, and
network layers of a protocol stack. Comparing the obser-
vations on the dierent layers makes the agent capable of
detecting multilayer attacks. Another cross layer design is
proposed in Khan and Loo []. It detects ooding by using
and comparing parameters from the MAC and network
layers. In both approaches, the processing requirements
seem moderate such that, in contrast to our predictions in
Section ., the IDSs might also be implemented on IoT
networks.
5.1.5. Game eory-Based IDSs. A noncooperative game for
WSNs is presented in Agah et al. [] and Agah and Das
[]. e goal of the game is to determine the weakest
node in the network and thereaer to propose strategies to
defend it against malicious attacks. A disadvantage of this
approachisthatthegamedetectsonlyasingleattackeven
in the presence of multiple ones, such that the others are le
undetected. is weakness makes the approach less suited to
IoT networks for which we expect simultaneous attacks on
dierent network nodes. Shamshirband et al. [] introduce
a game theoretic strategy that adopts a combination of a fuzzy
Q-learning algorithm and a game theoretic approach. e
proposed model consists of sink nodes, a base station, and
an attacker that are tested for distributed DoS attacks. e
authors claim that the proposed model has a better defense
rate than Markovian game theoretic solutions. Since the
approach seems to be lightweight with respect to resources,
it may also be applied to IoT devices.
5.1.6. Statistical Detection-Based IDSs. In Ngai et al. [],
an IDS for sinkhole attacks is presented that rst identies
suspected nodes and then detects attackers using a network
ow graph. is algorithm applies the Chi-square based
multivariate analysis technique that is carried out using
simulations and theoretical analysis. e authors claim that
the proposed strategy has a low performance overhead which
makesitsuitedtoIoTnetworks.DoumitandAgrawal[]
use a hidden Markov Model to nd unusual activities.
e authors claim that their algorithm requires minimal
processing resources using experimental scenario. Hence, it
canalsobeusedforanIoTbasednetwork.OnatandMiri
[] discuss an algorithm that is based on processing arrival
trac. In particular, the arrival trac pattern for a node is
observed, and, based on these studies, a technique to nd
anomalies is devised. Short term statistics are kept by the
algorithm using a multilevel sliding window that reduces the
resource requirement. erefore, such a scheme can also be
considered for resource-constrained IoT devices. Another
algorithm by the same authors is introduced in Onat and
Miri []. Here, each node develops a model for its neighbors
based on their transceiver behavior and packet arrival rates.
When there are major deviations, this is considered as
abnormal behavior. is approach, however, may require
monitoring every neighbor which can demand a lot of energy
consumption. us, it might not be a feasible solution for
IoT devices. Abraham et al. [] present an IDS that is
eective against Denial-of-Service (DoS) and unauthorized
attacks.ItisbasedontheGeneticProgrammingTechnique.
A fuzzy rule-based classier for intrusion detection is shown
in Abraham et al. []. It is claimed to have % accuracy for
every type of attack. e technique, however, seems to be not
very energy-ecient making it less suited for IoT networks.
5.1.7. Machine Learning-Based IDSs. In Deng et al. [], an
anomaly-based IDS using a Support Vector Machine (SVM)
is implemented to detect routing attacks. A SVM is also
proposed by Sedjelmaci and Feham [] who distinguish
between normal and abnormal patterns. e scheme seems
to be energy consuming but it can run on an IoT node
with larger processing capabilities. us, as predicted in Sec-
tion ., it ts with IoT networks containing more powerful
nodes. e IDS presented in Maleh et al. [] bridges machine
learning with using clusters. It is basically a hierarchical
IDS that, however, uses also SVMs to nd out about attack
signatures. So, it ts also for IoT networks with some stronger
nodes that both can act as CH and can execute the machine
learning computations.
5.2. MANETs. e approaches for Mobile Ad hoc Networks
(MANETs) are also arranged with respect to the implementa-
tionstrategiesused.eyareintroducedbelow.Further,we
depict the introduced approaches in Table . Here, we also
mark approaches suited to be usable for IoT systems.
5.2.1. Hierarchical IDSs. Kachirski and Guha [] present an
approach in which only the cluster heads (CH) are responsi-
ble for making decisions such that the energy consumption
is reduced. In Huang and Lee [], clustering is used in
monitors that are sparsely positioned over the network.
eir purpose is to detect routing intrusions using anomaly
detection. e CH is periodically elected to avoid that the
energy of single nodes is drained too much. us, in contrast
to our predictions in Section ., this hierarchical IDS works
also for IoT networks without stronger nodes. Sterne et al.
[] introduce a dynamic hierarchic scheme that reduces
intrusion detection data packets by data aggregation. e
proposed scheme is tested for intentional data dropping and
attacks on network and higher layer protocols. In Sun et al.
[], an IDS is presented in which the network is divided into
nonoverlapping physical zones. A local agent is responsible
for broadcasting alerts in its zone. Moreover, a special gateway
zone is dened that aggregates locally generated alerts and
 Security and Communication Networks
T : Comparative analysis of IDSs implemented for MANETs.
IDS Implementation Detection Attacks IoT
Albers et al. [] Mobile Agent Signature DoS N
Buchegger and Le Boudec [] Reputation Signature Packet Dropping
Huang and Lee [] Hierarchical Anomaly Routing, DoS
Kachirski and Guha [] Hierarchical Anomaly Packet Dropping
Michiardi and Molva [] Reputation Anomaly Node Selshness
Patcha and Park [] Game eory Signature DoS
Puttini et al. [] Statistical Detection Anomaly Routing Disruption N
Rao and Kesidis [] Statistical Detection Signature Routing Disruption N
Shakshuki et al. [] Machine Learning Signature Routing Disruption N
Sterne et al. [] Hierarchical Hybrid Packet Dropping, Node Capture
Sun et al. [] Hierarchical Anomaly Routing Disruption N
Zhang and Lee [] Mobile Agent Anomaly DoS N
Zhang et al. [] Mobile Agent Anomaly Routing Misdirection, Packet Dropping N
Suited for IoT networks with some stations without energy limitations that can act as cluster heads.
disseminates network-wide alarms. e purpose of such a
system is to process the detection results in the zones locally
while the gateway nodes process nal system-wide results
from the disseminated results in the various zones. Since
the approach operates with GPS data, it cannot be directly
transferred to IoT networks in which not all nodes can be
expected to have GPS receivers available.
5.2.2. Reputation-Based IDSs. Michiardi and Molva []
describeamechanismthatcomputesthereputationforeach
node in a network based on supervision of its behavior
byothernodes.ereputationisusedfortherouting
decisions, and a node selects neighbors with high reputation
values. Further, a watchdog mechanism is used to deny
communication with a node whose reputation falls below
a certain threshold. In Buchegger and Le Boudec [], a
system for reactive source routing protocols is presented.
e reputation of a node is updated based on input from
fully trusted nodes that monitor their neighbors using a
special watching scheme. As predicted in Section ., both
presented approaches are relatively lightweight and, with
some modications, can therefore be used for IoT networks.
5.2.3. Mobile Agent-Based IDSs. In Zhang and Lee [], the
authors propose an agent-based distributed and collaborative
IDS. e approach uses a local data collection block that
collects and analyzes the observed data in real-time. If it
unambiguously detects an anomaly, it informs either a local
or a global response block in order to initiate a remedy of a
subsystem.Iftheresultoftheobservationsisinconclusive,the
data collection block interacts with those in the neighboring
nodesviaasecurechannel,andacollaborativedecisionis
made. Each agent has a local detection engine that uses a
modeling algorithm to decide based on predened match-
ing criteria whether an incidence is normal or anomalous.
Depending on whether a decision was taken locally or aer
coordination with other nodes, either a local or a global
response is initiated. In extension to this work, the authors
introduce a cross layer IDS in Zhang et al. []. In this
work, each layer has an IDS module but the detection on
onelayermaybeinitiatedbythoseontheotherlayerssuch
that attacks on dierent layers can be detected. As described
in Section ., due to the amount of coordination required
and the somehow complex functionality to be implemented,
we are skeptical about the usability of this approach on
IoT networks with tiny devices. In Albers et al. [], the
authors describe a distributed mobile agent-based IDS in
which the agents migrate to the various data sources. us,
theworkloadofeachnodecanbedecreased.Whilethissaves
processing resources, the approach might, nevertheless, not
be a suitable approach for IoT based networks since the freely
migrating mobile agents might exceed the abilities of many
IoT nodes.
5.2.4. Game eory-Based IDSs. Patcha and Park [] present
an IDS that models interactions between nodes of a MANET
as a noncooperative game with two players. e scheme
requires a central processing unit computing the collected
observations that runs on a high-performance microproces-
sor and demands a relatively large amount of memory for data
storage and processing. erefore, this scheme may only be
usable for IoT networks with a border router that oers the
necessary processing and storage capabilities.
5.2.5. Statistical Detection-Based IDSs. In Puttini et al. [],
theauthorsintroduceanIDSbasedonBayesianclassication.
It models reference behavior statistically observing various
network applications. e behavioral model forms then the
basis for the detection algorithm that monitors the network
for anomalies. Rao and Kesidis [] use the estimation of
congestions to make decisions about the packet dropping
problem. eir IDS is dedicated to networks without band-
width constraints but that have security requirements. Due to
this limitation, we do not think that this technique is suitable
for resource-constrained IoT devices.
5.2.6. Machine Learning-Based IDSs. In Shakshuki et al. [],
evolutionary computation techniques are used to detect the
Security and Communication Networks 
T : Comparative analysis of IDSs implemented for CPSs.
IDS Implementation Detection Attacks IoT
Mitchell and Chen [] Voting Signature Spoong, Bad Data Injection
Porras and Neumann [] Statistical Detection Hybrid N/A N
Shin et al. [] Hierarchical Hybrid Eavesdropping, DoS, Routing Misdirection
Tsang and Kwong [] Machine Learning Anomaly DoS, Remote-to-Local, User-to-Root, Probing
Suited for IoT networks with some stations without energy limitations that can act as cluster heads.
presence of attackers in a MANET causing ooding and
route disruption attacks. e performance of such a scheme
is evaluated using simulations for dierent mobility and
trac patterns. is technique demands a high processing
capability on all the nodes such that it seems not suitable for
resource-constrained IoT networks.
5.3. CPSs. For Cyber-Physical Systems (CPSs), we found only
four IDS solutions that each uses a separate implementation
strategy. e approaches are described below and depicted in
Tabl e  .
5.3.1. Hierarchical IDSs. Shin et al. [] combine one-hop
clustering for intrusion detection with multihop clustering
for data aggregation, carefully balancing the eciency of the
procedure against the provided security. e approach uses
a base station, gateways, cluster heads, and leaf nodes each
playingacertainroleintheIDS.estructurehelpstodetect
anumberofattacktypescarriedoutonthenetwork.e
performance for each node seems to be moderate such that,
against our predictions in Section ., the approach might be
a suitable scheme also for resource-constrained IoT devices.
5.3.2. Voting-Based IDSs. e IDS presented in Mitchell
and Chen [] uses a voting-based mechanism for anomaly
detection. e authors validate their design by considering
spoong and data manipulation attacks. e scheme is quite
simple and, as predicted in Section ., seems suited for
being implemented also in IoT networks. Nevertheless, the
detection rate for a particular network conguration should
be analyzed thoroughly rst.
5.3.3. Statistical Detection-Based IDSs. Porras and Neumann
[] discuss an IDS that applies hybrid analysis. A signature-
based analysis checks nodes for compliance with a rule set. In
addition, an anomaly-based analysis uses statistical analysis
to detect intrusions that are not yet covered by the rules. e
scheme is not dedicated to any specic attack type such that
a complex analysis of the observed data is expected. at
would make it dicult to implement this technique on IoT
networks.
5.3.4. Machine Learning-Based IDSs. TsangandKwong[]
present an unsupervised machine learning-based approach
to detect anomalies. A goal of this approach is to reduce the
usually high rate of false positives in anomaly-based IDS.
Since this machine learning approach requires signicant
computing resources, it is only suitable for IoT networks with
ecient border routers.
6. IDSs for IoTs
In this section, we discuss IDS approaches that have been
explicitly developed for the use in IoT systems. Since the
Internetofingsisarelativelynewtechnology,onlyfew
approaches have been published, yet. Nevertheless, we found
some promising solutions that we again grouped according to
the implementation strategies used. To give a summary, the
approaches are further depicted in Table .
6.1. Distributed and Collaborative IDSs. Liu et al. [] use
articial immunity mechanisms to protect IoT networks.
eir approach comprehends an attack library to which the
sensed behavior is compared. A similar IDS is introduced by
Kasinathan et al. [] who, however, use penetration testing
to detect the DoS attacks. Raza et al. [] introduce a hybrid
IDS for IoT networks that targets typical routing attacks such
as sinkhole, spoofed, and selective forwarding. e technique
is based on network graph inconsistency detection. is
approach is criticized by Matsunaga et al. [] for its high
rate of false positives. Arshad et al. [] describe an intrusion
detection mechanism using active collaboration between
resource-constrained devices and border nodes, using a col-
laborative and distributed technique. e technique assigns
processing-intensive tasks to the border nodes, in order to
eciently exploit their capabilities.
6.2. Reputation-Based IDSs. Cervantes et al. [] present an
IDS that uses trust-based solutions to detect anomalies in
mobile IoT networks. e solution targets sinkhole attacks on
the routing layer of IoT networks by using a watchdog and
trust-based mechanism. If the trust of a device falls below
a certain threshold, it is declared as a threat to the system.
A similar approach but with particular consideration of the
processinglimitationsofIoTdevicesisdiscussedbyourselves
in Khan and Herrmann []. is approach is tailored to
the Routing Protocol for Low power and Lossy networks
(RPL) (see IETF []) that has become quite popular for IoT
systems. e communication behavior of network nodes is
observed by their neighbors for selective forwarding, sink-
hole, and version number attacks. Based on the observations,
a general reputation of a node is computed in a processor-
friendly way using the Subjective Logic; see Jøsang []. If
theamountofdistrustinanodeexceedsacertainthreshold,
it will be quarantined. In Khan et al. [], we further show that
our approach also addresses self-promotion, bad-mouthing,
and ballot stung attacks successfully.
6.3. Game eory-Based IDSs. Sedjelmaci et al. [] intro-
duce an anomaly detection approach that tries to minimize
 Security and Communication Networks
T : Comparative analysis of IDSs for IoT networks.
IDS Implementation Detection Attacks
Anthi et al. [] Machine Learning Anomaly DoS, Hello Flood, Sybil, Sinkhole attacks
Arrington et al. [] Statistical Detection Anomaly N/A
Arshad et al. [] Distributed and Collaborative Anomaly Routing and application specic attacks
Azmoodeh et al. [] Machine Learning Anomaly Junk code insertion attacks
Cervantes et al. [] Reputation Anomaly Sinkhole Attacks
Fu et al. [] Statistical Detection Anomaly Bad Data Injection, DoS
Kasinathan et al. [] Distributed and Collaborative Rule DoS
Khan and Herrmann [] Reputation Rule Selective Forwarding, Sinkhole, Version Number
Khan et al. [] Reputation Rule Self Promoting, Bad Mouthing, Ballot Stung
La et al. [] Game eory Rule N/A
Li et al. [] Machine Learning Anomaly Probing, DoS
Liu et al. [] Distributed and Collaborative Rule N/A
LiuandWu[] StatisticalDetection Anomaly N/A
Liu et al. [] Machine Learning Anomaly N/A
Raza et al. [] Distributed and Collaborative Hybrid Spoong, Sinkhole, Selective Forwarding
Sedjelmaci et al. [] Game eory Anomaly DoS
Summerville et al. [] Statistical Detection Anomaly Wormhole, Bad Data Injection, User-to-Root
Xiao et al. [] Machine Learning Anomaly Identity based, Malwares, Ooading attacks
Yang et al. [] Machine Learning Anomaly Packet dropping, hole attacks, eavesdropping
the energy consumption. In particular, game theory is used to
nd out whether the signature of a new attack is expected to
occur. Only then, the energy-intensive anomaly detection is
activated.Laetal.[]proposeamodelwhichcomprehends
attacks of varying seriousness that demand dierent degrees
of action. e problem is modeled as a Bayesian game and
its results determine the threshold to declare an activity as
an intrusion. In this way, a lower rate of false positives and
negatives shall be achieved.
6.4. Statistical Detection-Based IDSs. Arrington et al. []
simulate IoT-driven smart homes in order to detect behav-
ioral anomalies. e system constructs behavioral models
using special immunity-inspired algorithms for anomaly
detection. ese models can then be compared with the data
captured by the IoT sensors to detect deviations from the
expected behavior. Fu et al. [] present an anomaly mining
IDS to detect anomalies at the perception layer. A distributed
intrusion detection scheme uses the anomaly data to nd out
about attacks. A similar approach that, in addition, addresses
the processing limitations of IoT networks, is introduced by
Liu and Wu [] who propose a very lightweight anomaly
mining algorithm using the Jaccard coecient. Summerville
et al. [] publish an anomaly-based approach that provides
a discrimination between abnormal and normal packets. It
relies on bit pattern matching using a lookup table. e
processing limitations are addressed by making it possible to
implement the algorithm not only traditionally in soware
butalsodirectlyonthehardwarelayer.
6.5. Machine Learning-Based IDSs. In recent literature, a
number of machine learning approaches have been presented
forthedevelopmentofIDS.Yangetal.[]discussanactive
learning approach using human-in-the-loop for intrusion
detection in the IoT systems. Instead of just using machine
learning, the authors propose to combine machine and
human intelligence which allows them to detect malicious
nodes in the network more accurately. Li et al. [] depict
a soware-dened IoT network for enhancing the perfor-
mance of IoT applications, based on Articial Intelligence-
based two stage intrusion detection. e approach uses the
Bat Algorithm with Swarm Division and Binary Dierential
Mutation for selecting features. However, this may also
increase the overhead in comparison with existing sim-
ilar solutions. Liu et al. [] discuss intrusion detection
using fuzzy clustering and Principal Component Analysis.
e authors classify the data into low risk and high risk
while analysis is performed using simulations. Although
this approach may have better results in comparison with
traditional techniques, it also increases the implementation
overhead. Xiao et al. [] explore IoT security using super-
vised learning, unsupervised learning, and reinforcement
learning-based machine learning techniques. Anthi et al.
[] employ machine learning techniques for detecting net-
work scanning probing and Denial-of-Service (DoS) attacks.
Finally, Azmoodeh et al. [] use deep learning methods to
detect Internet Of Battleeld ings (IoBT) malware via the
devices Operational Code (OpCode) sequence.
7. Future Directions
Based on the experience made during working for this
publication, we found out two research directions for IDSs
safeguarding IoT networks that, in our opinion, seem worth-
whiletobepursued.eyareintroducedinthefollowing.
Security and Communication Networks 
7.1. Intrusion Detection As a Service in Fog Computing. Tabl e 
gives the impression that one has more possibilities to
apply approaches existing for WSNs, MANETs, and CPSs
also for an IoT network if it contains at least some nodes
with sucient processing and energy capabilities. at holds
particularly when these high-performance nodes are plugged
such that energy issues are alleviated. ese devices can then
execute the computing intensive centralized IDS approaches
while the resource limited nodes only assist by delivering
data. is ts well to the novel Fog Computing concept;
see, e.g., Bonomi et al. []. Fog Computing is seen as an
alternative to traditional Cloud Computing in which the
various cloud services are not provided by remote data
centers but by local machines that are under the control of
the local network operator. For instance, local WLAN routers
that are provided with greater processing power and storage
facilities can, besides routing data packets between the wired
and the wireless network segments, oer various services
known from the cloud.
Since border routers connecting an IoT system with the
outside world are oen WLAN routers, the new Fog Com-
putingtechnologycaneasilybeintegratedintothenetwork.
For instance, it could run a centralized IDS protecting the IoT
network nodes to which it is connected or take processing-
and energy-intensive tasks of the implementation strategies
discussed in this paper. Moreover, if the IoT is larger and
applies several border routers, one can use their Fog Comput-
ing capabilities to realize a hierarchical IDS. In consequence,
we see the integration of IDSs on Fog Computing platforms
as a promising future research direction. Following the highly
virtual nature of the platforms, the IDS functionality can
then, like other cloud-based functionality, be oered in form
of services, which could be named intrusion detection as a
Service.
7.2. Reducing Active Channel Listening Times When Rating
Network Behavior. To realize an IDS is more dicult for IoT
systems when all nodes are resource-constrained, Table 
reveals for this case that there are three basic strategies
available. One is voting-based IDSs that are already su-
ciently lightweight to be used in a resource-friendly way.
Unfortunately, their accuracy is still suboptimal and further
research is needed to reduce the rate of false negatives.
e second strategy is to reduce the workload by splitting
it into subtasks executed by dierent cooperating nodes. at
is done by hierarchical IDSs as well as the Distributed and
CollaborativeIDSs.eproblemhereisthatthereductionof
computation eorts takes place at the expense of more data
exchange which leads to a faster battery draining. To avoid
that, one should investigate the research and development
of IDSs that allow the nodes to cooperate with each other
minimizing the amount of data to exchange. Here, recent
developments in communication protocol technology will be
of help. An example is the new IEEE .. protocol (see
Bhar []) that reduces active channel listening. For that, the
data frames are divided into a number of slots, and a station
hastoonlylistenattimeintervalswhenslotsdedicatedto
itself are transmitted. For larger systems, that reduces the idle
listening time of a station signicantly.
e third strategy is to use reputation and trust man-
agement that provides IDSs with lightweight computation
and storage mechanisms. e approaches using trust man-
agement, however, are subject to increased active channel
listening since a node now also needs to listen to the
communication towards its neighbors, the behavior of which
shallbeevaluated.Ifournodehastolistencontinuously,this
can consume a lot of energy. erefore, it might be helpful to
conduct research in the combination of the approaches with
resource-friendly communication protocols. For instance, a
rst analysis to adapt the approach presented in Khan and
Herrmann [] and Khan et al. [] to the IEEE ..
protocol revealed that the active channel listening time can
be easily reduced by two-thirds when the listening strategy
is slightly changed. When our station wants to check if a
message sent by itself to another station is correctly forwarded
to rule a selective forwarding attack out, it only needs
to listen to the slots to itself and the one through which
the other node forwards the message of interest. us, the
additional listening cost can be eectively limited. Altogether,
thededicationofresearchincombiningenergy-ecient
networking with reputation-based IDSs seems a promising
eld of research.
8. Conclusion
We provided an overview about recent trends in using
Intrusion Detection Systems in the Internet of ings. In
particular, we presented a number of solutions directly devel-
oped for IoT systems as well as those for the adjacent network
typesWSNs,MANETs,andCPSs.Basedonthisoverview,
we could name a number of issues for the various IDS types
that reduce their applicability of the existing approaches.
is allowed us to nd out the schemes of IDSs that appear
promising to the IoT. Moreover, we identied two research
directions promising to alleviate the weaknesses of the IDSs
for being used with IoT networks. Altogether, we got the
impression that the majority of the existing IDSs are not
completely suited for the resource limitations of the IoT but
that the developments point into the right direction. Aer
conducting some eorts into research and development, we
see a high potential for adequate solutions that will protect
the IoT and its users eectively.
Conflicts of Interest
e authors declare that there are no conicts of interest
regarding the publication of this paper.
References
[] A. Nordrum, “What Is a Distributed Denial-of-Service Attack
and How Did It Break Twitter?” , https://spectrum.ieee.org/
tech-talk/telecom/security/what-is-a-distributed-denialofservice-
attack-and-how-did-it-break-twitter.
[] T. Anantvalee and J. Wu, “A survey on intrusion detection in
mobile ad hoc networks,” in Wireless Ne twork Security,chapter
,pp.,Springer-Verlag,.
 Security and Communication Networks
[] I. Butun, S. D. Morgera, and R. Sankar, “A survey of intrusion
detection systems in wireless sensor networks,IEEE Commu-
nications Surveys & Tutorials,vol.,no.,pp.,.
[] J.Granjal,E.Monteiro,andJ.S
´
a Silva, “Security for the internet
of things: a survey of existing protocols and open research
issues,IEEE Communications Surveys & Tutorials,vol.,no.
, pp. –, .
[] A. A. Gendreau and M. Moorman, “Survey of intrusion detec-
tion systems towards an end to end secure internet of things,” in
Proceedings of the 4th IEEE International Conference on Future
Internet of ings and Cloud (FiCloud ’16), pp. –, IEEE
Computer, Vienna, Austria, August .
[] E. Benkhelifa, T. Welsh, and W. Hamouda, “A critical review of
practices and challenges in intrusion detection systems for IoT:
towards universal and resilient systems,IEEE Communications
Surveys & Tutorials,vol.,no.,.
[] M.Ammar,G.Russello,andB.Crispo,“Internetofings:a
survey on the security of IoT frameworks,Journal of Informa-
tion Security and Applications,vol.,pp.,.
[] F. Restuccia, S. D’Oro, and T. Melodia, “Securing the internet
of things in the age of machine learning and soware-dened
networking,” IEEE Internet of ings Journal,vol.,no.,pp.
–, .
[] I. Ud Din, M. Guizani, B. Kim, S. Hassan, and M. Khurram
Khan, “Trust management techniques for the internet of things:
a survey,IEEE Access, vol. , pp. –, .
[] A. H. Ngu, M. Gutierrez, V. Metsis, S. Nepal, and Q. Z. Sheng,
“IoT middleware: a survey on issues and enabling technologies,
IEEE Internet of ings Journal,vol.,no.,pp.,.
[] T. Roosta, S. Shieh, and S. Sastry, “Taxonomy of security attacks
in sensor networks and countermeasures,” in Proceedings of
the 1st IEEE International Conference on System Integration and
Reliability Improvements, vol. , pp. –, .
[] E. Balandina, S. Balandin, Y. Koucheryavy, and D. Mouromtsev,
“IoT use cases in healthcare and tourism,” in Proceedings of the
17th IEEE Conference on Business Informatics (CBI ’15),vol.,
pp.,IEEEComputer,Lisbon,Portugal,July.
[] S. Mohammadi and H. Jadidoleslamy, “A comparison of phys-
ical attacks on wireless sensor networks,International Journal
of Peer to Peer Networks,vol.,no.,pp.,.
[] S. Khan and J. Loo, “Cross layer secure and resource-aware on-
demand routing protocol for hybridwireless mesh networks,
Wireless Personal Communications,vol.,no.,pp.,
.
[]A.M.Popescu,I.G.Tudorache,B.Peng,andA.H.Kemp,
“Surveying position based routing protocols for wireless sensor
and ad-hoc networks,International Journal of Communication
Networks and Information Security,vol.,no.,pp.,.
[] D. Djenouri, L. Khelladi, and N. Badache, “A survey of security
issues in mobile ad hoc and sensor networks,IEEE Communi-
cations Surveys & Tutorials,vol.,no.,pp.,.
[] A. Patcha and J.-M. Park, “An overview of anomaly detection
techniques: existing solutions and latest technological trends,
Computer Networks,vol.,no.,pp.,.
[] Y. Zhang, W. Lee, and Y.-A. Huang, “Intrusion detection
techniques for mobile wireless networks,Wireless Networks,
vol. , no. , pp. –, .
[] A. Fuchsberger, “Intrusion detection systems and intrusion
prevention systems,Information Security Technical Report,vol.
,no.,pp.,.
[] C. Karlof and D. Wagner, “Secure routing in wireless sensor
networks: attacks and countermeasures,Ad Hoc Networks,vol.
, no. -, pp. –, .
[] L. Wallgren, S. Raza, and T. Voigt, “Routing attacks and coun-
termeasures in the RPL-based internet of things,Inter national
Journal of Distributed Sensor Networks,vol.,no.,.
[] IETF, RfC  — RPL: IPv Routing Protocol for Low-Power
and Lossy Networks, , https://tools.ietf.org/html/rfc.
[] P. Michiardi and R. Molva, “Core: a collaborative reputation
mechanism to enforce node cooperation in mobile ad hoc net-
works,” in Advanced Communications and Multimedia Security,
vol.  of IFIP — e International Federation for Information
Processing,pp.,Springer,NewYork,NY,USA,.
[] A. Mayzaud, A. Sehgal, R. Badonnel, I. Chrisment, and J.
Sch¨
onw¨
alder, “A study of RPL DODAG version attacks,” in
Proceedings of the IFIP International Conference on Autonomous
Infrastructure, Management and Security,pp.,Springer-
Ve rl a g ,    .
[] I. Onat and A. Miri, “An intrusion detection system for wireless
sensor networks,” in Proceedings of the IEEE International
Conference on Wireless and Mobile Computing, Networking
and Communications (WiMob ’05),vol.,pp.,IEEE
Computer, Qu´
ebec, Canada, August .
[] D. E. Boubiche and A. Bilami, “Cross layer intrusion detection
system for wireless sensor network,International Journal of
Network Security & Its Applications,vol.,no.,p.,.
[] A. Abraham, C. Grosan, and C. Martin-Vide, “Evolutionary
design of intrusion detection programs,International Journal
of Network Security,vol.,no.,pp.,.
[]P.Albers,O.Camp,J.M.Percher,B.Jouga,L.Me,andR.
S. Puttini, “Security in ad hoc networks: a general intrusion
detection architecture enhancing trust based approaches,” in
Wireless Information Systems,pp.,.
[]S.Shamshirband,A.Patel,N.B.Anuar,M.L.M.Kiah,and
A. Abraham, “Cooperative game theoretic approach using
fuzzy Q-learning for detecting and preventing intrusions in
wireless sensor networks,” Engineering Applications of Articial
Intelligence,vol.,pp.,.
[] F. Bao, I. Chen, M. Chang, and J. Cho, “Hierarchical trust
managementforwirelesssensornetworksanditsapplicationsto
trust-based routing and intrusion detection,IEEE Transactions
on Network and Service Management,vol.,no.,pp.,
.
[] S. M. Sajjad, S. H. Bouk, and M. Yousaf, “Neighbor node trust
based intrusion detection system for WSN,Procedia Computer
Science, vol. , pp. –, .
[] A. Abraham, R. Jain, J. omas, and S. Y. Han, “D-SCIDS:
distributed so computing intrusion detection system,Journal
of Network and Computer Applications,vol.,no.,pp.,
.
[] C.-H. Tsang and S. Kwong, “Multi-agent intrusion detection
system in industrial network using ant colony clustering
approach and unsupervised feature extraction,” in Proceedings
of the IEEE International Conference on Industrial Technology
(ICIT ’05), pp. –, IEEE Computer, Hong Kong, December
.
[] R.-C. Chen, C.-F. Hsieh, and Y.-F. Huang, “A new method for
intrusion detection on hierarchical wireless sensor networks,
in Proceedings of the 3rd International Conference on Ubiquitous
Information Management and Communication (ICUIMC ’09),
pp.,ACM,Suwon,RepublicofKorea,January.
Security and Communication Networks 
[] A. P. R. Da Silva, M. H. Martins, B. P. Rocha, A. A. Loureiro, L.
B. Ruiz, and H. C. Wong, “Decentralized intrusion detection in
wireless se nsor networks,” in Proceedings of the 1st ACM Interna-
tional Workshop on Quality of Service & Security in Wireless and
Mobile Networks,pp.,ACM,Quebec,Canada,October
.
[] Y. Maleh, A. Ezzati, Y. Qasmaoui, and M. Mbida, “A global
hybrid intrusion detection system for wireless sensor networks,
Procedia Computer Science, vol. , pp. –, .
[] C. E. Loo, M. Y. Ng, C. Leckie, and M. Palaniswami, “Intrusion
detection for routing attacks in sensor networks,International
Journal of Distributed Sensor Networks,vol.,no.,pp.,
.
[] R. Mitchell and I.-R. Chen, “A hierarchical performance model
for intrusion detection in cyber-physical systems,” in Proceed-
ings of the IEEE Wireless Communications and Networking Con-
ference (WCNC ’11), pp. –, IEEE Computer, Mexico,
March .
[] R. Mitchell and I.-R. Chen, “On survivability of mobile cyber
physical systems with intrusion detection,Wireless Personal
Communications, vol. , no. , pp. –, .
[] S. Shin, T. Kwon, G.-Y. Jo, Y. Park, and H. Rhy, “An experimental
study of hierarchical intrusion detection for wireless industrial
sensor networks,IEEE Transactions on Industrial Informatics,
vol. , no. , pp. –, .
[] R. Khare and A. Riin, “Weaving a web of trust,Wor ld Wi de
Web J our n al,vol.,pp.,.
[] A. Jøsang, “A logic for uncertain probabilities,International
Journal of Uncertainty, Fuzziness and Knowledge-Based Systems,
vol. , no. , pp. –, .
[] Z. A. Khan and P. Herrmann, “A trust based distributed
intrusion detection mechanism for internet of things,” in Pro-
ceedings of the IEEE 31st International Conference on Advanced
Information Networking and Applications (AINA ’17),pp.
, IEEE Computer, Taipei, Taiwan, March .
[] I.-R. Chen, F. Bao, M. Chang, and J.-H. Cho, “Dynamic trust
management for delay tolerant networks and its application to
secure routing,IEEE Transactions on Parallel and Distributed
Systems,vol.,no.,pp.,.
[] A. B. Karuppiah, J. Dalah, K. Yuvashri, S. Rajaram, and A.-S. K.
Pathan, “A novel energy-ecient sybil node detection algorithm
for intrusion detection system in wireless sensor networks,” in
Proceedings of the 3rd International Conference on Eco-Friendly
Computing and Communication Systems (ICECCS ’14),pp.
, IEEE Computer, India, December .
[] R. Mitchell and I.-R. Chen, “Eect of intrusion detection
and response on reliability of cyber physical systems,IEEE
Transactions on Reliability,vol.,no.,pp.,.
[] P. Garc´
ıa-Teodoro, J. D´
ıaz-Verdejo, G. Maci´
a-Fern´
andez, and E.
V´
azquez, “Anomaly-based network intrusion detection: tech-
niques, systems and challenges,Computers & Security,vol.,
no. -, pp. –, .
[] R. B. Myerson, Game eory: Analysis of Conict,Harvard
University Press, .
[] R. Mitchell and I.-R. Chen, “A survey of intrusion detection in
wireless network applications,Computer Communications,vol.
,pp.,.
[]A.Agah,S.K.Das,K.Basu,andM.Asadi,“Intrusiondetec-
tion in sensor networks: a non-cooperative game approach,
in Proceedings of the 3rd IEEE International Symposium on
Network Computing and Applications (NCA ’04), pp. –,
IEEE Computer, Cambridge, Mass, USA, September .
[] A. Agah and S. K. Das, “Preventing DoS attacks in wireless sen-
sor networks: a repeated game theory approach,International
Journal of Network Security,vol.,no.,pp.,.
[] H. Deng, Q.-A. Zeng, and D. P. Agrawal, “SVM-based intrusion
detection system for wireless ad hoc networks,” in Proceedings of
the 2003 IEEE 58th Vehicular Technology Conference, VTC2003-
Fall,vol.,pp.,IEEEComputer,Orlando,Fla,USA,
October .
[] S. S. Doumit and D. P. Agrawal, “Self-organized criticality
& stochastic learning based intrusion detection system for
wireless sensor networks,” in Proceedings of the IEEE Military
Communications Conference (MILC OM ’03),vol.,pp.,
IEEEComputer,Boston,Mass,USA,October.
[] M. Guerroumi, A. Derhab, and K. Saleem, “Intrusion detection
system against sink hole attack in wireless sensor networks with
mobile sink,” in Proceedings of the 12th International Conference
on Information Technology: New Generations (ITNG ’15),pp.
–, IEEE Computer, USA, April .
[] K. Ioannis, T. Dimitriou, and F. C. Freiling, “Towards intrusion
detection in wireless sensor networks,” in Proceedings of the 13th
European Wireless Conference,pp.,.
[] H. Jadidoleslamy, “A hierarchical intrusion detection archi-
tecture for wireless sensor networks,International Journal of
Network Security & Its Applications,vol.,no.,p.,.
[] S. Khan an d K.-K. Loo, “Real-time cross -layer design for a large-
scale ood detection and attack trace-back mechanism in IEEE
. wireless mesh networks,Network Security,vol.,no.
, pp. –, .
[] I. Krontiris, Z. Benenson, T. Giannetsos, F. C. Freiling, and T.
Dimitriou, “Cooperative intrusion detection in wireless sensor
networks,” in Proceedings of the 6th European Conference on
Wireless Sensor Networks (EWSN ’09),vol.ofLecture Notes
in Computer Science, pp. –, Springer-Verlag.
[] M. S. I. Mamun and A. S. Kabir, “Hierarchical design based
intrusion detection system for wireless ad hoc sensor network,
International Journal of Network Security & Its Applications,vol.
, no. , pp. –, .
[] E. C. Ngai, J. Liu, and M. R. Lyu, “On the intruder detection
for sinkhole attack in wireless sensor networks,” in Proceedings
of the IEEE International Conference on Communications (ICC
’06),vol.,pp.,IEEEComputer,Istanbul,Turkey,
June .
[] I. Onat and A. Miri, “A real-time node-based trac anomaly
detection algorithm for wireless sensor networks,” in Proceed-
ings of the International Conference on Systems Communications,
pp.,IEEEComputer,Ockland,Calif,USA,August
.
[] S. Rajasegarar, C. Leckie, M. Palaniswami, and J. C. Bezdek,
“Distributed anomaly detection in wireless sensor networks,” in
Proceedings of the 10th IEEE Singapore International Conference
on Communications Systems (ICCS ’06), pp. –, IEEE Com-
puter, Singapore, November .
[] H.SedjelmaciandM.Feham,“Novelhybridintrusiondetection
system for clustered wireless sensor network,International
Journal of Network Security & Its Applications,vol.,no.,.
[] A. A. Strikos, “A Full Approach for Intrusion Detection in
Wireless Sensor Networks,” , http://citeseerx.ist.psu.edu/
viewdoc/summary?doi=.....
[] C. Wang, T. Feng, J. Kim, G. Wang, and W. Zhang, “Catching
packet droppers and modiers in wireless sensor networks,
in Proceedings of the 6th Annual IEEE Communications Society
 Security and Communication Networks
Conference on Sensor, Mesh and Ad Hoc Communications and
Networks (SECON ’09),pp.,IEEEComputer,Italy,June
.
[] S. Buchegger and J. Y. Le Boudec, “Performance analysis of the
CONFIDANT protocol,” in Proceedings of the 3rd ACM Interna-
tional Symposium on Mobile Ad Hoc Networking & Computing
(MobiHoc ’02), pp. –, ACM, Lausanne, Switzerland, June
.
[] Y.-A. Huang and W. Lee, “A cooperative intrusion detection
system for ad hoc networks,” in Proceedings of the 1st ACM
Workshop on Security of Ad Hoc and Sensor networks (in
association with 10th ACM Conference on Computer and Com-
munications Security), pp. –, ACM, USA, October .
[] O. Kachirski and R. Guha, “Eective intrusion detection using
multiple sensors in wireless ad hoc networks,” in Proceedings
ofthe36thAnnualHawaiiInternationalConferenceonSystem
Sciences (HICSS ’03),IEEEComputer,USA,January.
[] A. Patcha and J.-M. Park, “A game theoretic approach to
modeling intrusion detection in mobile ad hoc networks,” in
Proceedings of the 5th Annual IEEE System, Man and Cybernetics
Information Assurance Workshop (SMC ’04), pp. –, IEEE
Computer, USA, June .
[] R. Puttini, M. Hanashiro, F. Miziara, R. de Sousa, L. J. Garc´
ıa-
Villalba, and C. J. Barenco, “On the anomaly intrusion-detection
in mobile ad hoc network environments,” in Proceedings of the
11th IFIP International Conference on Personal Wireless Com-
munications (PWC ’06),vol.ofLecture Notes in Computer
Science, pp. –, Springer, Albacete, Spain, September .
[] R. Rao and G. Kesidis, “Detecting malicious packet dropping
using statistically regular trac patterns in multihop wireless
networks that are not bandwidth limited,” in Proceedings of the
IEEE Global Telecommunications C onference (GLOBECOM ’03),
vol. , pp. –, IEEE Computer, USA, December .
[] E. M. Shakshuki, N. Kang, and T. R. Sheltami, “EAACK
— a secure intrusion-detection system for MANETs,” IEEE
Transactions on Industrial Electronics,vol.,no.,pp.
, .
[]D.Sterne,P.Balasubramanyam,D.Carmanetal.,“Ageneral
cooperative intrusion detection architecture for MANETs,” in
Proceedings of the 3rd IEEE International Workshop on Informa-
tion Assurance (IWIA ’05), pp. –, IEEE Computer, College
Park, Md, USA, March .
[] B. Sun, K. Wu, and U. W. Pooch, “Zone-based intrusion
detection for mobile ad hoc networks,International Journal of
Ad Hoc and Sensor Wireless Networks,vol.,no.,.
[] Y. Zhang and W. Lee, “Intrusion detection in wireless ad-
hoc networks,” in Proceedings of the 6th Annual International
Conference on Mobile Computing and Networking (MobiCom
’00), pp. –, ACM, Boston, Mass, USA, August .
[] P. A. Porras and P. G. Neumann, “EMERALD: event moni-
toring enabling response to anomalous live disturbances,” in
Proceedings of the 20th National Information Systems Security
Conference (NISSC ’97), pp. –, .
[] A. Patcha and J.-M. Park, “A game theoretic formulation for
intrusion detection in mobile Ad hoc networks,International
Journal of Network Security,vol.,no.,pp.,.
[] E. Anthi, L. Williams, and P. Burnap, “Pulse: an adaptive
intrusion detection for the internet of things,” in Proceedings of
the Living in the Internet of ings: Cybersecurity of the IoT,pp.
–, London, UK, March .
[] B. Arrington, L. E. Barnett, R. Rufus, and A. Esterline, “Behav-
ioral modeling intrusion detection system (BMIDS) using
internet of things (IoT) behavior-based anomaly detection
via immunity-inspired algorithms,” in Proceedings of the 25th
International Conference on Computer Communications and
Networks (ICCCN ’16),pp.,IEEEComputer,Waikoloa,
Hawaii, USA, August .
[] J. Arshad, M. A. Azad, M. Mahmoud Abdellatif, M. H. Ur
Rehman, and K. Salah, “COLIDE: a collaborative intrusion
detection framework for Internet of ings,IET Networks,vol.
,no.,pp.,.
[] A. Azmoodeh, A. Dehghantanha, and K. R. Choo, “Robust mal-
ware detection for internet of (Battleeld) things devices using
deep eigenspace learning,IEEE Transactions on Sustainable
Computing,vol.,no.,pp.,.
[] C. Cervantes, D. Poplade, M. Nogueira, and A. Santos, “Detec-
tion of sinkhole attacks for supporting secure routing on LoW-
PAN for Internet of ings,” in Proceedings of the 14th IFIP/IEEE
International Symposium on Integrated Network Management
(IM ’15), pp. –, IEEE Computer, Canada, May .
[] R.Fu,K.Zheng,D.Zhang,andY.Yang,“Anintrusiondetection
scheme based on anomaly mining in internet of things,” in
Proceedings of the 4th IET International Conference on Wireless,
Mobile & Multimedia Networks (ICWMMN ’11),pp.,
IET, Beijing, China, November .
[] P. Kasinathan, C. Pastrone, M. A. Spirito, and M. Vinkovits,
“Denial-of-service detection in LoWPAN based internet of
things,” in Proceedings of the 2013 IEEE 9th International
Conference on Wireless and Mobile Computing, Networking and
Communications (WiMob ’13), pp. –, IEEE Computer,
Lyon, France, October .
[] Z.A.Khan,J.Ullrich,A.G.Voyiatzis,andP.Herrmann,“A
trust-based resilient routing mechanism for the internet of
things,” in Proceedings of the 12th International Conference on
Availability, Reliability, and Security (ARES ’17),pp.,ACM,
Reggio Calabria, Italy, August .
[]Q.D.La,T.Q.Quek,J.Lee,S.Jin,andH.Zhu,“Deceptive
attack and defense game in honeypot-enabled networks for the
internet of things,IEEE Internet of ings Journal,vol.,no.,
pp.,.
[] J. Li, Z. Zhao, R. Li, and H. Zhang, “AI-based two-stage
intrusion detection for soware dened IoT networks,IEEE
Internet of ings Journal,vol.,no.,pp.,.
[] C. Liu, J. Yang, R. Chen, Y. Zhang, and J. Zeng, “Research
on immunity-based intrusion detection technology for the
Internet of ings,” in Proceedings of the 7th International
Conference on Natural Computation (ICNC ’11),vol.,pp.
, IEEE Computer, China, July .
[] Y. Liu and Q. Wu, “A lightweight anomaly mining algorithm
in the Internet of ings,” in Proceedings of the 5th IEEE
International Conference on Soware Engineering and Service
Science (ICSESS ’14),pp.,IEEEComputer,China,June
.
[] L. Liu, B. Xu, X. Zhang, and X. Wu, “An intrusion detection
method for internet of things based on suppressed fuzzy
clustering,” EURASIP Journal on Wireless Communications and
Networking,vol.,no.,p.,.
[] S. Raza, L. Wallgren, and T. Voigt, “SVELTE: real-time intrusion
detection in the internet of things,Ad Hoc Networks, vol. , no.
, pp. –, .
[] H. Sedjelmaci, S. M. Senouci, and M. Al-Bahri, “A lightweight
anomaly detection technique for low-resource IoT devices:
a game-theoretic methodology,” in Proceedings of the IEEE
Security and Communication Networks 
International Conference on Communications (ICC ’16),pp.,
IEEE Computer, Kuala Lumpur, Malaysia, May .
[] D. H. Summerville, K. M. Zach, and Y. Chen, “Ultra-lightweight
deep packet anomaly detection for internet of things devices,
in Proceedings of the 34th IEEE International Performance
Computing and Communications Conference (IPCCC ’15),pp.
, IEEE Computer, Nanjing, China, December .
[] L.Xiao,X.Wan,X.Lu,Y.Zhang,andD.Wu,“IoTsecurity
techniques based on machine learning: how do IoT devices use
AI to enhance security?” IEEE Signal Processing Magazine,vol.
,no.,pp.,.
[] K.Yang,J.Ren,Y.Zhu,andW.Zhang,“Activelearningforwire-
less IoT intrusion detection,IEEE Wireless Communications
Magazine,vol.,no.,pp.,.
[] T. Matsunaga, K. Toyoda, and I. Sasase, “Low false alarm
rate RPL network monitoring system by considering timing
inconstancy between the rank measurements,” in Proceedings of
the 11th International Symposium on Wireless Communications
Systems (ISWCS ’14), pp. –, IEEE Computer, Spain,
August .
[] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing
and its role in the internet of things,” in Proceedings of the 1st
ACM Mobile Cloud Computing Workshop (MCC ’12),pp.,
ACM, Helsinki, Finland, August .
[] J. Bhar, “A mac protocol implementation for wireless sensor
network,Journal of Computer Networks and Communications,
vol. , no. , .
... IDS are designed to detect threats approaching border areas through various sensor technologies, such as motion sensors, surveillance cameras, and other detection devices. Reference [47] emphasizes the importance of the rapid response offered by IDS to enhance border security. On the other hand, PIDS monitors the perimeter using optical sensors, radar, and other remote sensing technologies. ...
Article
Full-text available
To strengthen the national defense system, advances in remote sensing technology are essential, especially to detect military threats that could threaten sovereignty. These threats can be physical or non-physical, such as cyber-attacks that can damage vital infrastructure. Therefore, effective border monitoring is critical to maintaining the security and stability of the country. Although remote sensing technology is developing rapidly, several issues hinder its implementation, such as inadequate infrastructure and lack of employee training. Previous research has not fully studied how various advanced technologies can be incorporated into Indonesia's border area defense system that is responsive and operates in real time. The purpose of this study is to see how well remote sensing systems detect military threats and evaluate the problems that arise when implementing them. In addition, this study aims to provide strategic suggestions that will help improve national defense. This research utilizes a literature review of relevant articles and analyzes information to gain a further understanding of advances in remote sensing technology and its applications in defense. Studies show that technologies such as radar, CCTV, and artificial intelligence (AI) can improve threat detection in border areas. AI-based radars enable faster identification and classification of threats, and cloud-based CCTV improves real-time monitoring. The findings from this study suggest that the development and utilization of advanced remote sensing technologies can improve Indonesia's defense system. By addressing infrastructure and personnel training issues, the country can more effectively safeguard its sovereignty and stability by improving responses to military and non-military threats.
... IDS are designed to detect threats approaching border areas through various sensor technologies, such as motion sensors, surveillance cameras, and other detection devices. Reference [47] emphasizes the importance of the rapid response offered by IDS to enhance border security. On the other hand, PIDS monitors the perimeter using optical sensors, radar, and other remote sensing technologies. ...
Article
Full-text available
To strengthen the national defense system, advances in remote sensing technology are essential, especially to detect military threats that could threaten sovereignty. These threats can be physical or non-physical, such as cyber-attacks that can damage vital infrastructure. Therefore, effective border monitoring is critical to maintaining the security and stability of the country. Although remote sensing technology is developing rapidly, several issues hinder its implementation, such as inadequate infrastructure and lack of employee training. Previous research has not fully studied how various advanced technologies can be incorporated into Indonesia's border area defense system that is responsive and operates in real time. The purpose of this study is to see how well remote sensing systems detect military threats and evaluate the problems that arise when implementing them. In addition, this study aims to provide strategic suggestions that will help improve national defense. This research utilizes a literature review of relevant articles and analyzes information to gain a further understanding of advances in remote sensing technology and its applications in defense. Studies show that technologies such as radar, CCTV, and artificial intelligence (AI) can improve threat detection in border areas. AI-based radars enable faster identification and classification of threats, and cloud-based CCTV improves real-time monitoring. The findings from this study suggest that the development and utilization of advanced remote sensing technologies can improve Indonesia's defense system. By addressing infrastructure and personnel training issues, the country can more effectively safeguard its sovereignty and stability by improving responses to military and non-military threats.
... To address these limitations, the concept of cross-layer intrusion detection has emerged, attracting significant attention from researchers and practitioners alike. A Cross-Layer IDS (CLIDS) is an advanced security mechanism that integrates the information from multiple layers of the network stack to detect malicious activities, enabling the detection of complex, multi-layer attacks [42]. For instance, a DDoS attack can target both the network and transport layers, and a CLIDS may intercommunicate between these two layers to detect all DDoS attacks effectively. ...
Article
The transition from fifth-generation (5G) to sixth-generation (6G) mobile networks necessitates network automation to meet the escalating demands for high data rates, ultra-low latency, and integrated technology. Recently, Zero-Touch Networks (ZTNs), driven by Artificial Intelligence (AI) and Machine Learning (ML), are designed to automate the entire lifecycle of network operations with minimal human intervention, presenting a promising solution for enhancing automation in 5G/6G networks. However, the implementation of ZTNs brings forth the need for autonomous and robust cybersecurity solutions, as ZTNs rely heavily on automation. AI/ML algorithms are widely used to develop cybersecurity mechanisms, but require substantial specialized expertise and encounter model drift issues, posing significant challenges in developing autonomous cybersecurity measures. Therefore, this paper proposes an automated security framework targeting Physical Layer Authentication (PLA) and Cross-Layer Intrusion Detection Systems (CLIDS) to address security concerns at multiple Internet protocol layers. The proposed framework employs drift-adaptive online learning techniques and a novel enhanced Successive Halving (SH)-based Automated ML (AutoML) method to automatically generate optimized ML models for dynamic networking environments. Experimental results illustrate that the proposed framework achieves high performance on the public Radio Frequency (RF) fingerprinting and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017) datasets, showcasing its effectiveness in addressing PLA and CLIDS tasks within dynamic and complex networking environments. Furthermore, the paper explores open challenges and research directions in the 5G/6G cybersecurity domain. This framework represents a significant advancement towards fully autonomous and secure 6G networks, paving the way for future innovations in network automation and cybersecurity.
Preprint
Full-text available
Cyber-Physical Systems (CPS) have become increasingly essential in critical infrastructure, yet they remain highly vulnerable to sophisticated cyber threats. Traditional intrusion detection techniques—particularly signature-based and anomaly-based systems—often fail to detect emerging attacks and tend to suffer from high false positive rates. In this study, we propose a novel intrusion detection method that integrates Principal Component Analysis (PCA) for dimensionality reduction with a decision tree classifier. This hybrid model enhances detection accuracy while reducing computational overhead. Using the KDD-99 dataset, the proposed approach achieved a detection accuracy of 95.06%, outperforming conventional methods such as ID3 and UCSm. The method also demonstrated superior performance in terms of reduced processing time and lower resource consumption. These results suggest that the proposed system is highly effective for resource-constrained CPS environments where fast and reliable threat detection is crucial.
Article
Full-text available
Wireless sensor network (WSN) cluster‐based architecture is a system designed to control and monitor specific events or phenomena remotely, and one of the important concerns that need quick attention is security risks such as an intrusion in WSN traffic. At the same time, a high‐level security method may refer to an intrusion detection system|intrusion detection systems (IDS), which may be employed effectively to achieve a higher level of security in detecting an intruder attack or any attack initiated within a WSN system. The significance of the detection of network intrusions on heterogeneous cluster‐based sensor networks with wireless connections, as well as the approaches to machine learning utilised in IDS model development, were discussed. In addition, this research conducted several comparative studies of feature selection techniques and machine learning methodologies in the development of intrusion detection systems. The authors used a bibliometric indicator to identify the leading trends when it comes to IDS, and the VOS viewer was used to create a spatial mapping of co‐authorship, co‐occurrence, and citation types of analysis with their respective units of study. The purpose of this research paper is to generate relevant findings and a research problem formulation that can lead to a research gap in the research topic's domain area.
Article
Full-text available
The Internet of Things (IoT) is becoming truly ubiquitous in our everyday lives, but it also faces unique security challenges. Intrusion detection is critical for the security and safety of a wireless IoT network. This article discusses the human-in-theloop active learning approach for wireless intrusion detection. We first present the fundamental challenges against the design of a successful intrusion detection system for a wireless IoT network. We then briefly review the rudimentary concepts of active learning and propose its employment in the diverse applications of wireless intrusion detection. An experimental example is also presented to show the significant performance improvement of the active learning method over the traditional supervised learning approach. While machine learning (ML) techniques have been widely employed for intrusion detection, the application of human-in-the-loop ML that leverages both machine and human intelligence to intrusion detection of IoT is still in its infancy. We hope this article can assist readers in understanding the key concepts of active learning and spur further research in this area.
Article
Full-text available
A vision of the future Internet is introduced in such a fashion that various computing devices are connected together to form a network called Internet of Things (IoT). This network will generate massive data that may be leveraged for entertainment, security, and most importantly user trust. Yet, trust is an imperative obstruction that may hinder the IoT growth and even delay the substantial squeeze of a number of applications. In this survey, an extensive analysis of trust management techniques along with their pros and cons is presented in a different context. In comparison with other surveys, the goal is to provide a systematic description of the most relevant trust management techniques to help researchers understand that how various systems fit together to bring preferred functionalities without examining different standards. Besides, the lessons learned are presented and the views are argued regarding the primary goal trust is likely to play in the future Internet.
Article
Full-text available
Internet of Things (IoT) represent a network of resource-constrained sensor devices connected through the open Internet, susceptible to misuse by intruders. Traditional standalone intrusion detection systems (IDS) are tasked with monitoring device behaviours to identify malicious activities. These systems not only require extensive network and system resources but also cause delays in detecting a malicious actor due to unavailability of a comprehensive view of the intruder's activities. Collaboration among IoT devices enables considering knowledge from a collection of host and network devices to achieve improved detection accuracy in a timely manner. However, collaboration introduces the challenge of energy efficiency and event processing which is particularly significant for resource-constrained devices. In this paper, we present a collaborative intrusion detection framework (COLIDE) for IoT leveraging collaboration among resource-constrained sensor and border nodes for effective and timely detection of intruders. The paper presents a detailed formal description of the proposed framework along with analysis to assess its effectiveness for a typical IoT system. We implemented the COLIDE framework with Contiki OS and conducted thorough experimentation to evaluate its performance. The evaluation demonstrates efficiency of COLIDE framework with respect to energy and processing overheads achieving effectiveness within an IoT system.
Article
Full-text available
The Internet of Things (IoT) realizes a vision where billions of interconnected devices are deployed just about everywhere, from inside our bodies to the most remote areas of the globe. As the IoT will soon pervade every aspect of our lives and will be accessible from anywhere, addressing critical IoT security threats is now more important than ever. Traditional approaches where security is applied as an afterthought and as a “patch” against known attacks are insufficient. Indeed, next-generation IoT challenges will require a new secure-by-design vision, where threats are addressed proactively and IoT devices learn to dynamically adapt to different threats. To this end, machine learning and software-defined networking will be key to provide both reconfigurability and intelligence to the IoT devices. In this paper, we first provide a taxonomy and survey the state of the art in IoT security research, and offer a roadmap of concrete research challenges related to the application of machine learning and software-defined networking to address existing and next-generation IoT security threats.
Article
Full-text available
In order to improve the effectiveness of intrusion detection, an intrusion detection method of the Internet of Things (IoT) is proposed by suppressed fuzzy clustering (SFC) algorithm and principal component analysis (PCA) algorithm. In this method, the data are classified into high-risk data and low-risk data at first, which are detected by high frequency and low frequency, respectively. At the same time, the self-adjustment of the detection frequency is carried out according to the suppressed fuzzy clustering algorithm and the principal component analysis algorithm. Finally, the key factors influencing the algorithm are analyzed deeply by simulation experiment. The results shows that, compared to traditional method, this method has better adaptability.
Conference Paper
Full-text available
The number of diverse interconnected Internet of Things (IoT) devices keeps increasing exponentially, introducing new security and privacy challenges. These devices tend to become more pervasive than mobile phones and already have access to very sensitive personal information such as usernames, passwords , etc., making them a target for cyber-attacks. Given that smart devices are vulnerable to a variety of attacks, they can be considered to be the weakest link for breaking into a secure infrastructure. For instance, IoT devices have recently been employed as part of botnets, such as Mirai, and have launched several of the largest Distributed Denial of Service (DDoS) and spam attacks in history. As a result, there is a need to develop an Intrusion Detection System (IDS) dedicated to monitor IoT ecosystems, which will be able to adapt to this heterogeneous environment and detect malicious activity on the network. In this paper, we describe the initial stages of developing Pulse; a novel IDS for the IoT, which employs Machine Learning (ML) methodologies and is capable of successfully identifying network scanning probing and simple forms of Denial of Service (DoS) attacks.
Article
Full-text available
The Internet of Things (IoT) realizes a vision where billions of interconnected devices are deployed just about everywhere, from inside our bodies to the most remote areas of the globe. As the IoT will soon pervade every aspect of our lives and will be accessible from anywhere, addressing critical IoT security threats is now more important than ever. Traditional approaches where security is applied as an afterthought and as a "patch" against known attacks are insufficient. IoT challenges require a new secure-by-design vision, where threats are addressed proactively and IoT devices learn to dynamically adapt to different threats. In this paper, we first provide a taxonomy and survey the state of the art in IoT security research, and offer a roadmap of concrete research challenges to address existing and next-generation IoT security threats.
Article
Software Defined Internet of Things (SD-IoT) Networks profit from centralized management and interactive resource sharing, which enhances the efficiency and scalability of IoT applications. But with the rapid growth in services and applications, they are vulnerable to possible attacks and face severe security challenges. Intrusion detection has been widely used to ensure network security, but classical detection methods are usually signature-based or explicit-behavior-based and fail to detect unknown attacks intelligently, which makes it hard to satisfy the requirements of SD-IoT Networks. In this paper, we propose an AI-based two-stage intrusion detection empowered by software defined technology. It flexibly captures network flows with a global view and detects attacks intelligently. We firstly leverage Bat Algorithm with Swarm Division and Binary Differential Mutation to select typical features. Then, we exploit Random Forest through adaptively altering the weights of samples using the weighted voting mechanism to classify flows. Evaluation results prove that the modified intelligent algorithms select more important features and achieve superior performance in flow classification. It is also verified that our solution shows better accuracy with lower overhead compared with existing solutions.
Article
The Internet of things (IoT), which integrates a variety of devices into networks to provide advanced and intelligent services, has to protect user privacy and address attacks such as spoofing attacks, denial of service (DoS) attacks, jamming, and eavesdropping. We investigate the attack model for IoT systems and review the IoT security solutions based on machine-learning (ML) techniques including supervised learning, unsupervised learning, and reinforcement learning (RL). ML-based IoT authentication, access control, secure offloading, and malware detection schemes to protect data privacy are the focus of this article. We also discuss the challenges that need to be addressed to implement these ML-based security schemes in practical IoT systems.
Article
The Internet-of-Things (IoT) is rapidly becoming ubiquitous. However the heterogeneous nature of devices and protocols in use, the sensitivity of the data contained within, as well as the legal and privacy issues, make security for the IoT a growing research priority and industry concern. With many security practices being unsuitable due to their resource intensive nature, it is deemed important to include second line defences into IoT networks. These systems will also need to be assessed for their efficacy in a variety of different network types and protocols. To shed light on these issues, this paper is concerned with advancements in intrusion detection practices in IoT. It provides a comprehensive review of current Intrusion Detection Systems (IDS) for IoT technologies, focusing on architecture types. A proposal for future directions in IoT based IDS are then presented and evaluated. We show how traditional practices are unsuitable due to their inherent features providing poor coverage of the IoT domain. In order to develop a secure, robust and optimised solution for these networks, the current research for intrusion detection in IoT will need to move in a different direction. An example of which is proposed in order to illustrate how malicious nodes might be passively detected.