Abstract
The Internet of Things (IoT) has inexorably awakened advanced humans’ existence. Aside from the advantages that this innovative technology provides to the IoT device users, there are also cyber security concerns. Traditional cyber security approaches would not work on low-power IoT devices. As a result, numerous threat detection approaches and methods that are considerate the constraints of the Internet of Things have recently been created. To detect abnormalities in network traffic time series, this research offers a threat detection strategy that combines statistical and machine learning approaches. Furthermore, this novel architecture provides a light solution for cyber security because the logic of computing is a component of the edge layer. The technique performed nicely in spans of recall, precision, accuracy, and F-measure, according to the findings of the test bed testing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Gelenbe E et al (2013) Nemesys: enhanced network security for seam-less service provisioning in the smart mobile ecosystem. In: Information sciences and systems. Springer, pp 369–378
Toupas P et al (2019) An intrusion detection system for multi-class classification based on deep neural networks. In: 18th IEEE international conference on machine learning and applications (ICMLA). IEEE, pp 1253–1258
Shi W et al (2016) Edge computing: vision and challenges. IEEE Internet Things J 3
Spanos G et al (2019) Combining statistical and machine learning techniques in IoT anomaly detection for smart homes. In: IEEE 24th international workshop on computer aided modeling and design of communication links and networks (CAMAD). IEEE, pp 1–6
Collen A et al (2018) Ghost—safe-guarding home IoT environments with personalized real-time risk control. In: Security in computer and information sciences. Springer International Publishing, pp 68–78
Augusto-Gonzalez J et al (2019) From internet of threats to internet of things: a cyber security architecture for smart homes. In: IEEE 24th international workshop on computer aided modeling and design of communication links and networks (CAMAD), pp 1–6
Hajiheidari S et al (2019) Intrusion detection systems in the internet of things: a comprehensive investigation. Comput Netw
Raza S, Wallgren L et al (2013) Svelte: real-time intrusion detection in the internet of things. Ad Hoc Networks 11(8):2661–2674
Sekar R et al (2002) Specification-based anomaly detection: a new approach for detecting network intrusions. In: Proceedings of the 9th ACM conference on computer and communications security
Chen P-Y et al (2014) Information fusion to defend intentional attack in internet of things. IEEE Internet Things J 1(4):337–348
Rajasegarar S, Gluhak A et al (2014) Ellipsoidal neighborhood outlier factor for distributed anomaly detection in resource constrained networks. Pattern Recogn 47(9):2867–2879
Hodo E, Bellekens X et al (2016) Threat analysis of IoT networks using artificial neural network intrusion detection system. In: International symposium on networks, computers and communications (ISNCC). IEEE
Khan ZA et al (2017) A trust based distributed intrusion detection mechanism for internet of things. In: IEEE 31st international conference on advanced information networking and applications (AINA). IEEE, pp 1169–1176
Li J et al (2018) Ai-based two-stage intrusion detection for software defined IoT networks. IEEE Internet Things J 6(2):2093–2102
Diro AA et al (2018) Distributed attack detection scheme using deep learning approach for internet of things. Future Gener Comput Syst 82:761–768
Amin SO et al (2009) A novel coding scheme to implement signature-based IDS in IP based sensor networks. In: International symposium on integrated network management-workshops. IEEE
Oh D et al (2014) A malicious pattern detection engine for embedded security systems in the internet of things. Sensors 14(12):24188–24211
Sun H et al (2017) Cloudeyes: cloud-based malware detection with reversible sketch for resource-constrained internet of things (IOT) devices. Softw Pract Exper 47:421–441
La QD et al (2016) Deceptive attack and defense game in honeypot-enabled networks for the internet of things. IEEE Internet Things J 3(6):1025–1035
Surendar M et al (2016) Indres: an intrusion detection and response system for internet of things with 6lowpan. In: International conference on wireless communications, signal processing and networking (WiSPNET). IEEE, pp 1903–1908
Gara F et al (2017) An intrusion detection system for selective forwarding attack in IPv6-based mobile WSNs. In: 13th international wireless communications and mobile computing conference (IWCMC). IEEE, pp 276–281
Sedjelmaci H et al (2017) An accurate security game for low-resource IoT devices. IEEE Trans Veh Technol 66(10):9381–9393
Shreenivas D et al (2017) Intrusion detection in the RPL-connected 6LoWPAN networks. In: Proceedings of the 3rd ACM international workshop on IoT privacy, trust, and security, pp 31–38
Hyndman RJ et al (2018) Forecasting: principles and practice. OTexts
Fawcett T (2006) An introduction to ROC analysis. Pattern Recogn Lett 27(8):861–874
Suthaharan S (2016) Big data analytics. In: Machine learning models and algorithms for big data classification. Springer, pp 31–75
Jolliffe IT (2002) Principal component analysis, 2nd edn. Springer, New York, NY
Kriegel H-P et al (2011) Density-based clustering. Wiley Interdisc Rev: Data Min Knowl Disc 1(3):231–240
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jha, C.K., Biswas, S.S., Nafis, M.T. (2023). A Comprehensive System for Smart Homes with a Minimalist Information Security Framework. In: Kaiser, M.S., Xie, J., Rathore, V.S. (eds) Information and Communication Technology for Competitive Strategies (ICTCS 2021). Lecture Notes in Networks and Systems, vol 401. Springer, Singapore. https://doi.org/10.1007/978-981-19-0098-3_39
Download citation
DOI: https://doi.org/10.1007/978-981-19-0098-3_39
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-0097-6
Online ISBN: 978-981-19-0098-3
eBook Packages: EngineeringEngineering (R0)