{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T13:03:01Z","timestamp":1724677381680},"reference-count":51,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1]]},"abstract":"The latest buzzword in internet technology nowadays is the Internet of Things. The Internet of Things (IoT) is an ever-growing network which will transform real-world objects into smart or intelligent virtual objects. IoT is a heterogeneous network in which devices with different protocols can connect with each other in order to exchange information. These days, human life depends upon the smart things and their activities. Therefore, implementing protected communications in the IoT network is a challenge. Since the IoT network is secured with authentication and encryption, but not secured against cyber-attacks, an Intrusion Detection System is needed. This research article focuses on IoT introduction, architecture, technologies, attacks and IDS. The main objective of this article is to provide a general idea of the Internet of Things, various intrusion detection techniques, and security attacks associated with IoT.<\/jats:p>","DOI":"10.4018\/ijisp.2019010107","type":"journal-article","created":{"date-parts":[[2018,11,23]],"date-time":"2018-11-23T10:52:15Z","timestamp":1542970335000},"page":"86-105","source":"Crossref","is-referenced-by-count":28,"title":["A Survey"],"prefix":"10.4018","volume":"13","author":[{"given":"Sarika","family":"Choudhary","sequence":"first","affiliation":[{"name":"Central University of Rajasthan, Ajmer, India"}]},{"given":"Nishtha","family":"Kesswani","sequence":"additional","affiliation":[{"name":"Central University of Rajasthan, Ajmer, India"}]}],"member":"2432","reference":[{"key":"IJISP.2019010107-0","article-title":"Intrusion detection systems in wireless sensor networks: A review.","author":"N. A.Alrajeh","year":"2013","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"IJISP.2019010107-1","doi-asserted-by":"crossref","unstructured":"Amaral, J. P., Oliveira, L. M., Rodrigues, J. J., Han, G., & Shu, L. (2014, June). Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks. In 2014 IEEE International Conference on Communications (ICC) (pp. 1796-1801). IEEE.","DOI":"10.1109\/ICC.2014.6883583"},{"key":"IJISP.2019010107-2","doi-asserted-by":"crossref","unstructured":"Amin, S. O., Siddiqui, M. S., Hong, C. S., & Choe, J. (2009, June). A novel coding scheme to implement signature based IDS in IP based Sensor Networks. In IFIP\/IEEE International Symposium on Integrated Network Management-Workshops IM'09 (pp. 269-274). IEEE.","DOI":"10.1109\/INMW.2009.5195973"},{"key":"IJISP.2019010107-3","first-page":"857","article-title":"Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things.","author":"R.An","year":"2016","journal-title":"International Conference on Broadband and Wireless Computing, Communication and Applications"},{"key":"IJISP.2019010107-4","doi-asserted-by":"crossref","unstructured":"Arrington, B., Barnett, L., Rufus, R., & Esterline, A. (2016, August). Behavioral Modeling Intrusion Detection System (BMIDS) Using Internet of Things (IoT) Behavior-Based Anomaly Detection via Immunity-Inspired Algorithms. In 2016 25th International Conference on Computer Communication and Networks (ICCCN) (pp. 1-6). IEEE.","DOI":"10.1109\/ICCCN.2016.7568495"},{"issue":"7","key":"IJISP.2019010107-5","first-page":"97","article-title":"That \u2018internet of things\u2019 thing.","volume":"22","author":"K.Ashton","year":"2009","journal-title":"RFiD Journal"},{"key":"IJISP.2019010107-6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.47"},{"key":"IJISP.2019010107-7","doi-asserted-by":"publisher","DOI":"10.3390\/s90604056"},{"key":"IJISP.2019010107-8","doi-asserted-by":"crossref","unstructured":"Castellani, A. P., Gheda, M., Bui, N., Rossi, M., & Zorzi, M. (2011, June). Web Services for the Internet of Things through CoAP and EXI. In 2011 IEEE International Conference on Communications Workshops (ICC) (pp. 1-6). IEEE.","DOI":"10.1109\/iccw.2011.5963563"},{"key":"IJISP.2019010107-9","doi-asserted-by":"crossref","unstructured":"Cervantes, C., Poplade, D., Nogueira, M., & Santos, A. (2015, May). Detection of sinkhole attacks for supporting secure routing on 6lowpan for internet of things. In 2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM) (pp. 606-611). IEEE.","DOI":"10.1109\/INM.2015.7140344"},{"key":"IJISP.2019010107-10","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMR.366.165"},{"key":"IJISP.2019010107-11","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/3095971"},{"key":"IJISP.2019010107-12","doi-asserted-by":"crossref","unstructured":"Chen, S., Xu, H., Liu, D., Hu, B., & Wang, H. (2014). A vision of IoT: Applications, challenges, and opportunities with china perspective. IEEE Internet of Things journal, 1(4), 349-359.","DOI":"10.1109\/JIOT.2014.2337336"},{"key":"IJISP.2019010107-13","first-page":"157","article-title":"Case study of a black hole attack on LoWPAN-RPL.","author":"K.Chugh","year":"2012","journal-title":"Proc. of the Sixth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE)"},{"key":"IJISP.2019010107-14","doi-asserted-by":"crossref","unstructured":"Dvir, A., & Buttyan, L. (2011, October). VeRA-version number and rank authentication in rpl. In 2011 IEEE 8th International Conference on Mobile Adhoc and Sensor Systems (MASS) (pp. 709-714). IEEE.","DOI":"10.1109\/MASS.2011.76"},{"key":"IJISP.2019010107-15","unstructured":"Fu, R., Zheng, K., Zhang, D., & Yang, Y. (2011). An intrusion detection scheme based on anomaly mining in Internet of Things."},{"key":"IJISP.2019010107-16","doi-asserted-by":"crossref","unstructured":"Gendreau, A. A., & Moorman, M. (2016, August). Survey of Intrusion Detection Systems towards an End to End Secure Internet of Things. In 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud) (pp. 84-90). IEEE.","DOI":"10.1109\/FiCloud.2016.20"},{"key":"IJISP.2019010107-17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2388550"},{"key":"IJISP.2019010107-18","doi-asserted-by":"crossref","unstructured":"Hodo, E., Bellekens, X., Hamilton, A., Dubouilh, P. L., Iorkyase, E., Tachtatzis, C., & Atkinson, R. (2016, May). Threat analysis of iot networks using artificial neural network intrusion detection system. In 2016 International Symposium on Networks, Computers and Communications (ISNCC) (pp. 1-6). IEEE.","DOI":"10.1109\/ISNCC.2016.7746067"},{"key":"IJISP.2019010107-19","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462107"},{"key":"IJISP.2019010107-20","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0761-7"},{"key":"IJISP.2019010107-21","doi-asserted-by":"crossref","unstructured":"Jun, C., & Chi, C. (2014, January). Design of complex event-processing IDS in internet of things. In 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA) (pp. 226-229). IEEE.","DOI":"10.1109\/ICMTMA.2014.57"},{"key":"IJISP.2019010107-22","first-page":"1337","article-title":"DEMO: An IDS framework for internet of things empowered by 6LoWPAN.","author":"P.Kasinathan","year":"2013","journal-title":"Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security"},{"key":"IJISP.2019010107-23","doi-asserted-by":"crossref","unstructured":"Kasinathan, P., Pastrone, C., Spirito, M. A., & Vinkovits, M. (2013, October). Denial-of-Service detection in 6LoWPAN based Internet of Things. In 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) (pp. 600-607). IEEE.","DOI":"10.1109\/WiMOB.2013.6673419"},{"key":"IJISP.2019010107-24","doi-asserted-by":"crossref","unstructured":"Khan, F. I., Shon, T., Lee, T., & Kim, K. (2013, July). Wormhole attack prevention mechanism for RPL based LLN network. In 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN) (pp. 149-154). IEEE.","DOI":"10.1109\/ICUFN.2013.6614801"},{"key":"IJISP.2019010107-25","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2009.143"},{"key":"IJISP.2019010107-26","doi-asserted-by":"publisher","DOI":"10.3390\/info7020025"},{"key":"IJISP.2019010107-27","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2356"},{"key":"IJISP.2019010107-28","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2266399"},{"key":"IJISP.2019010107-29","doi-asserted-by":"crossref","unstructured":"Le, A., Loo, J., Luo, Y., & Lasebae, A. (2011, October). Specification-based IDS for securing RPL from topology attacks. In 2011 IFIP Wireless Days (WD) (pp. 1-3). IEEE.","DOI":"10.1109\/WD.2011.6098218"},{"key":"IJISP.2019010107-30","doi-asserted-by":"crossref","unstructured":"Le, A., Loo, J., Luo, Y., & Lasebae, A. (2013, July). The impacts of internal threats towards Routing Protocol for Low power and lossy network performance. In 2013 IEEE Symposium on Computers and Communications (ISCC) (pp. 000789-000794). IEEE.","DOI":"10.1109\/ISCC.2013.6755045"},{"key":"IJISP.2019010107-31","doi-asserted-by":"crossref","unstructured":"Lee, J. Y., Lin, W. C., & Huang, Y. H. (2014, May). A lightweight authentication protocol for internet of things. In 2014 International Symposium on Next-Generation Electronics (ISNE) (pp. 1-2). IEEE.","DOI":"10.1109\/ISNE.2014.6839375"},{"key":"IJISP.2019010107-32","doi-asserted-by":"crossref","unstructured":"Liu, C., Yang, J., Zhang, Y., Chen, R., & Zeng, J. (2011, July). Research on immunity-based intrusion detection technology for the internet of things. In 2011 Seventh International Conference on Natural Computation (ICNC), (Vol. 1, pp. 212-216). IEEE.","DOI":"10.1109\/ICNC.2011.6022060"},{"issue":"6","key":"IJISP.2019010107-33","first-page":"1267","article-title":"A hierarchical access control scheme for perceptual layer of IoT, Jisuanji Yanjiu yu Fazhan [Comput.","volume":"50","author":"J.Ma","year":"2013","journal-title":"Research for Development]"},{"key":"IJISP.2019010107-34","doi-asserted-by":"crossref","unstructured":"Misra, S., Krishna, P. V., Agarwal, H., Saxena, A., & Obaidat, M. S. (2011, October). A learning automata based solution for preventing distributed denial of service in Internet of things. In Internet of Things (iThings\/CPSCom), 2011 International Conference on and 4th International Conference on Cyber, Physical and Social Computing (pp. 114-122). IEEE.","DOI":"10.1109\/iThings\/CPSCom.2011.84"},{"key":"IJISP.2019010107-35","doi-asserted-by":"crossref","unstructured":"Oliveira, L. M., Rodrigues, J. J., Neto, C., & de Sousa, A. F. (2013, July). Network admission control solution for 6LoWPAN networks. In 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) (pp. 472-477). IEEE.","DOI":"10.1109\/IMIS.2013.85"},{"key":"IJISP.2019010107-36","doi-asserted-by":"crossref","unstructured":"Perrey, H., Landsmann, M., Ugus, O., Schmidt, T. C., & W\u00e4hlisch, M. (2013). TRAIL: topology authentication in RPL. arXiv:1312.0984","DOI":"10.1109\/INFCOMW.2013.6970745"},{"issue":"9","key":"IJISP.2019010107-37","article-title":"Real time intrusion and wormhole attack detection in internet of things.","volume":"121","author":"P.Pongle","year":"2015","journal-title":"International Journal of Computers and Applications"},{"key":"IJISP.2019010107-38","doi-asserted-by":"crossref","unstructured":"Pongle, P., & Chavan, G. (2015, January). A survey: Attacks on RPL and 6LoWPAN in IoT. In 2015 International Conference on Pervasive Computing (ICPC) (pp. 1-6). IEEE.","DOI":"10.1109\/PERVASIVE.2015.7087034"},{"key":"IJISP.2019010107-39","doi-asserted-by":"crossref","unstructured":"Raza, S., Duquennoy, S., Chung, T., Yazar, D., Voigt, T., & Roedig, U. (2011, June). Securing communication in 6LoWPAN with compressed IPsec. In 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS) (pp. 1-8). IEEE.","DOI":"10.1109\/DCOSS.2011.5982177"},{"key":"IJISP.2019010107-40","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"key":"IJISP.2019010107-41","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"IJISP.2019010107-42","doi-asserted-by":"crossref","unstructured":"Ruan, N., & Hori, Y. (2012, July). DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things. In 2012 International Conference on Selected Topics inMobile and Wireless Networking (iCOST) (pp. 60-65). IEEE.","DOI":"10.1109\/iCOST.2012.6271291"},{"key":"IJISP.2019010107-43","first-page":"560","article-title":"Tolerance-Based Adaptive Online Outlier Detection for Internet of Things.","author":"Q.Shen","year":"2010","journal-title":"Proceedings of the 2010 IEEE\/ACM Int\u2019l Conference on Green Computing and Communications & Int\u2019l Conference on Cyber, Physical and Social Computing"},{"key":"IJISP.2019010107-44","doi-asserted-by":"publisher","DOI":"10.1145\/2602087.2602107"},{"key":"IJISP.2019010107-45","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2420"},{"key":"IJISP.2019010107-46","unstructured":"Thakur, M. R., & Sanyal, S. (2012). A multi-dimensional approach towards intrusion detection system. arXiv:1205.2340"},{"key":"IJISP.2019010107-47","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/794326"},{"key":"IJISP.2019010107-48","doi-asserted-by":"crossref","unstructured":"Weekly, K., & Pister, K. (2012, October). Evaluating sinkhole defense techniques in RPL networks. In 2012 20th IEEE International Conference on Network Protocols (ICNP) (pp. 1-6). IEEE.","DOI":"10.1109\/ICNP.2012.6459948"},{"key":"IJISP.2019010107-49","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1016.2011.01351"},{"key":"IJISP.2019010107-50","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2344013"}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=218848","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T11:56:45Z","timestamp":1651838205000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISP.2019010107"}},"subtitle":["Intrusion Detection Techniques for Internet of Things"],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":51,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.4018\/ijisp.2019010107","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"value":"1930-1650","type":"print"},{"value":"1930-1669","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1]]}}}