Essay Example on Internet of Things IoT is a new Standard

Subcategory:

Category:

Words:

444

Pages:

2

Views:

34

Internet of Things IoT is a new standard that assimilates the Internet and physical objects fitting to different domains such as home automation industrial progression human wellbeing and environmental monitoring Internet of Things IoT is an ever growing network of smart entities that feature an IP address for internet connectivity and the communication that occurs between these objects and other Internet enabled devices and systems It develops the presence of Internet connected devices in our day to day activities and helps to face challenges related to security issues For more than two eras Intrusion Detection Systems IDS have been an important instrument for the securitization of networks and information systems However relating traditional IDS techniques to IoT is difficult due to its particular features such as constrained resource devices specific protocol stacks and standards It presents several services and human s monotonous life depends on its obtainable and reliable events Therefore the task of implementing secure message passing in the IoT network must be addressed The IoT network is protected with encryption and substantiation but it cannot be protected from cyber attacks Henceforth the Intrusion Detection System IDS is obligatory We deliberate several intrusion detection methods to mitigate the attacks and we also suggested a new Lightweight Intrusion Detection System to detect Selective Forwarding Attack and Sybil Attack in IoT network 



FUTURE SCOPE AND LITERATURE SURVEY Research efforts in IDS for IoT are still incipient After classifying the papers in this area we observed that the proposed solutions do not investigate the strong and weak points of each possible detection method and placement strategy deeply The authors also have focused on few attack types and IoT technologies Finally validation strategies are very simple complicating the comparison and reproduction of the proposed approaches Next we provide a detailed view of some issues and concerns in IDS research for IoT also highlighting possible future research directions Investigating pros and cons of detection methods and placement strategies Detection method and placement strategy are important characteristics of IDSs Regarding detection methods only Krimmling and Peter 2014 conducted tests to compare different approaches They concluded that hybrid detection would be the best option However despite their importance these results are not definitive Summerville et al 2015 argue that zero day threats and the lack of resources for a potentially large database of known attacks make the use of signature based detection approaches unsuitable in an IoT environment According to them small resource constrained devices execute fewer and potentially less complex network protocols than general purpose computing platforms making it easier to use anomaly based detection methods to identify deviations from normal behavior However the computational requirements for running such methods in resource constrained systems could be high In fact only one anomaly based approach Pongle and Chavan 2015 evaluated the impact of IDS on the nodes energy consumption Researchers should conduct more experiments to investigate the strong and weak points of each detection method in several situations and IoT applications 



These experiments should show for example how different detection methods affect IDS properties such as attack detection accuracy attack detection and reporting speed energy consumption of network nodes and performance overhead For the discussion about IDS placement strategies there is a starting point the IDS should be able to monitor the traffic that physical objects exchange within the physical domain and the traffic that flows between physical objects and hosts on the Internet Nodes in the physical domain of IoT systems may operate in a mesh topology assuming other networking functions e g routing Consequently monitoring these nodes is essential to detect for example routing attacks Physical objects also deliver services to users on the Internet which is a particularity of IoT Detecting attacks in the traffic that flows through the boundary between the Internet and the physical domain is also very important Based on these assumptions researchers should propose more experiments to evaluate the pros and cons of each IDS placement strategy for different IoT applications PLANS 2ND REVIEW We are planning to do a Study on existing Lightweight Intrusion Detecting systems to detect Selective Forwarding Attack and Sybil Attack in IoT network We also want to work on Optimisation of existing systems using different methodologies We will also compare and contrast different Intrusion Detection systems and their performance and drawbacks Proposing more experiments to evaluate the pros and cons of each IDS placement strategy for different IoT applications PLANS 3RD REVIEW We provide a detailed classification of different methods proposed in this are through a detailed investigation 



We provide a detailed view of some issues and concerns in IDS research for IoT also highlighting possible future research directions We are going to Propose a new methodology for Light weight Intrusion Detecting system and a complete research paper on the study of different Intrusion Detection systems REFERENCES 1 A survey of intrusion detection in Internet of Things Bruno Bogaz Zarpelãoa Rodrigo Sanches Mianib Cláudio Toshio Kawakania Sean Carlisto de Alvarenga 2 Real Time Intrusion and Wormhole Attack Detection in Internet of Things Pavan Pongle Gurunath Chavan 3 A survey intrusion detection system for internet of things tariqahmad sherasiya1 hardik upadhyay2 hiren b patel3 4 A review of security attacks and intrusion detection schemes in wireless sensor network Yassine MALEH1 and Abdellah Ezzati2 5 Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System Elike Hodo Xavier Bellekens Andrew Hamilton Pierre Louis Dubouilh Ephraim Iorkyase Christos Tachtatzis and Robert Atkinson


Write and Proofread Your Essay
With Noplag Writing Assistance App

Plagiarism Checker

Spell Checker

Virtual Writing Assistant

Grammar Checker

Citation Assistance

Smart Online Editor

Start Writing Now

Start Writing like a PRO

Start