Abstract
One of the most basic characteristic features of every smart device in a network based on the Internet of Things (IoT) is to gather a larger set of data that has been created and then transfer the gathered data to the destination/receiver server through the internet. Thus, IoT-based networks are most vulnerable to simple or complex attacks that need to be identified in the early stage of data transmission for saving the network from these malicious attacks. The chief goal of the proposed work is to design and form the intelligent intrusion detection system (I-IDS) using the machine learning models such that the attacks can be identified in the IoT network. The model is built considering the normal and malicious attacks on the data that are generated in IoT smart environment. To simulate such a model, a testbed is built where a wireless router, a DHT11 sensor, and a node MCU are being used during the design phase. An attacker or adversarial system is built to perform poisoning and sniffing attacks using a laptop system. The node captures the sensor values and transmits the data to the ThinkSpeak platform, during the normal phase via the wireless gateway, and in the attack phase, the malicious attacker interprets the data, modifies it while transmitting from node to the ThinkSpeak server. Thus, the attack called Man-In-The-Middle (MITM) is performed and classified as abnormal data. Various machine learning algorithms are performed on the data, and finally, the results obtained using a probabilistic model called as Markov model have a high performance evaluated based on the I-IDS IoT network. The results obtained during the experimental analysis show that the Markov model has obtained a 100% detection rate and 19% of false alarm rate (FAR) with high precision and low error rate. The algorithms such as naïve Bayes classifier, support vector machine (SVM), decision tree, and Adaboost are considered in comparison with the Markov model. The optimal solution is obtained concerning other evaluation metrics like sensitivity, F1, and true-positive rate (TPR). Therefore, the integrated network of IoT-WSN with its performance metrics is tabulated to show the potentials of securing a network system. Additionally, the proposed work gives a high level of security for IoT smart environment as compared with the other machine learning algorithms using the novel technique of intelligent IDS.











Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Change history
28 October 2024
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s00500-024-10275-3
References
Alaparthy VT, Morgera SD (2018) A multi_level intrusion detection system for wireless sensor networks based on immune theory. IEEE Access 6:47364–47373
Ammar M, Russello G, Crispo B (2018) Internet of Things: a survey on the security of IoT frameworks. J Inf Secure Appl 38:8–27
Arshad J, Azad MA, Abdeltaif MM, Salah K (2020) An intrusion detection framework for energy-constrained IoT devices. Mech Syst Signal Process 136:106436
Breitenbacher D, Homoliak I, Aung YL, Tippenhauer NO, Elovici Y (2019) HADES-IoT: a practical host-based anomaly detection system for IoT devices. In: Proc. ACM Asia Conf. Comput. Commun. Secur., Auckland, New Zealand, p. 479484
Chaabouni N, Mosbah M, Zemmari A, Sauvignac C, Faruki P (2019) Network intrusion detection for IoT security based on learning techniques. IEEE Commun. Surv. Tutor. 21:2671–2701
Challa S, Wazid M, Das AK, Kumar N, Reddy AG, Yoon E-J, Yoo K-Y (2017) Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access 5:3028–3043
Challa S, Wazid M, Das AK, Khan MK (2018) Authentication protocols for implantable medical devices: taxonomy, analysis, and future directions. IEEE Consum Electron Mag 7(1):57–65
Chowdhury R (2019) Top 20 Best Internet of Things Projects (IoT Projects) that you can make right now. Accessed: Oct. 2019. [Online]. Available: https://www.ubuntupit.com/best-internet-of-things%20projects-%20iot-projects-that-you-can-make-right-now
Das AK, Zeadally S, He D (2018) Taxonomy and analysis of security protocols for the Internet of Things. Future Gener Comput Syst 89:110–125
Diechmann J, Heineke K, Reinbacher T, Wee D (2015) The Internet of Things: How to capture the value of IoT. Technical Report, pp. 1–124. Available online: https://www.mckinsey.com/featured-insights/internet-of-things/our-insights/the-internet-of-things-how-to-capture-the-value-of-iot# (Accessed on 13 July 2020)
Elrawy MF, Awad AI, Hamed HFA (2018) Intrusion detection systems for IoT-based smart environments: a survey. J Cloud Comput 7(1):21
Fan X, Susan F, Long W, Li S (2017) Security analysis of Zigbee. Available online: https://courses.csail.mit.edu/6.857/2017/project/17.pdf (accessed on 13 July 2020)
Faria ER, Gonçalves IJCR, de Carvalho ACPLF, Gama J (2016) Novelty detection in data streams. Artif Intell Rev 45(2):235–269
Fremantle P (2015) A reference architecture for the Internet of Things. WSO2 White Paper. 2015. Available online: https://docs.huihoo.com/wso2/wso2-whitepaper-a-reference-architecture-for-the-internet-of-things.pdf (accessed on 13 July 2020)
Jan SU, Ahmed S, Shakhov V, Koo I (2019) Toward a lightweight intrusion detection system for the Internet of Things. IEEE Access 7:42450–42471
Kiwanuka FN, Akhtar IA (2019) Improving event monitoring in IoT network using an integrated blockchain-distributed pattern recognition scheme. In: Blockchain and applications: international congress, vol. 1010. Springer
Košt’ál, K.; Helebrandt, P.; Belluš, M.; Ries, M.; Kotuliak, I. Management and Monitoring of IoT Devices Using Blockchain. Sensors 2019, 19, 856.
Lawal MA, Shaikh RA, Hassan SR (2020) Security analysis of network anomalies mitigation schemes in IoT networks. IEEE Access 8:43355–43374
Li W, Tug S, Meng W, Wang Y (2019) Designing collaborative block chained signature-based intrusion detection in IoT environments. Future Gener Comput Syst 96:481489
Moustafa N, Choo KKR, Radwan I, Camtepe S (2019) Outlier dirichlet mixture mechanism: adversarial statistical learning for anomaly detection in the fog. IEEE Trans Inf Forensics Secur 14:1975–1987
Mudgerikar A, Sharma P, Bertino E (2019) E-spion: a system-level intrusion detection system for IoT devices. In: Proc. ACM Asia Conf. Comput. Commun. Secur., Auckland, New Zealand, p. 493500
Nesterenko N, Bou-Harb E, Crichigno J, Kaddoum G, Ghani N (2019) Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations. IEEE Commun Surv Tutor 21:2702–2733
Pajouh HH, Javidan R, Khayami R, Dehghantanha A, Choo K-K-R (2019) A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans Emerg Topics Comput 7(2):314323
Raoof A, Matrawy A, Lung C-H (2019) Routing attacks and mitigation methods for RPLbased Internet of Things. IEEE Commun Surv Tuts 21(2):1582–1606
Selvakumar K, Karuppiah M, Sairamesh L, Islam SH, Hassan MM, Fortino G, Choo K-K-R (2019) Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs. Inf Sci 497:77–90
Sharma V, You I, Yim K, Chen I-R, Cho J-H (2019) BRIoT: behavior rule specification_based misbehavior detection for IoT_embedded cyber_physical systems. IEEE Access 7:118556–118580
Sivasakthiselvan S, Nagarajan V (2017) Energy-efficient data gathering by using optimum pattern recognition with relocalization in mobile wireless sensor networks. J ICT Stand 5(2):129–148
Sun T, Yu W (2020) A formal verification framework for security issues of blockchain smart contracts. Electronics 9:255
Sun Z, Xu Y, Liang G, Zhou Z (2018) An intrusion-detection model for wireless sensor networks with an improved V_detector algorithm. IEEE Sensors J 18(5):1971–1984
Wazid M (2017) Design and analysis of intrusion detection protocols for hierarchical wireless sensor networks. Ph.D. dissertation, Centre Secure., Theory Algorithmic Res., Int. Inst. Inf. Technol., Hyderabad, India
Wazid M (2017) Design and analysis of intrusion detection protocols for hierarchical wireless sensor networks. Ph.D. dissertation, Center Secur., Theory Algorithmic Res., Int. Inst. Inf. Technol., Hyderabad, India
Wazid M, Das AK (2017) A secure group_based blackhole node detection scheme for hierarchical wireless sensor networks. Wirel Pers Commun 94(3):1165–1191
Wazid M, Bagga P, Das AK, Shetty S, Rodrigues JJPC, Park Y (2019a) AKM_IoV: authenticated key management protocol in fog computing-based internet of vehicles deployment. IEEE Internet Things J 6(5):8804–8817. https://doi.org/10.1109/jiot.2019.2923611
Wazid M, Reshma Dsouza P, Das AK, Bhat V, Rodrigues JJPC (2019b) RAD_EI: a routing attack detection scheme for edge-based internet of things environment. Int J Commun Syst 32(15):e4024. https://doi.org/10.1002/dac.4024
Wheelus C, Zhu X (2020) IoT network security: threats, risks, and a data-driven defense framework. IoT 1(2):259–285
Funding
This research has no funding by any organization or individual.
Author information
Authors and Affiliations
Contributions
GK proposed the main idea, checked and discussed the results and the whole manuscript. Dr. GS contributed to the discussion of this study. All authors have read and agreed to the published version of the manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s00500-024-10275-3"
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Kalnoor, G., Gowrishankar, S. RETRACTED ARTICLE: IoT-based smart environment using intelligent intrusion detection system. Soft Comput 25, 11573–11588 (2021). https://doi.org/10.1007/s00500-021-06028-1
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-021-06028-1