Skip to main content

A Comprehensive System for Smart Homes with a Minimalist Information Security Framework

  • Conference paper
  • First Online:
Information and Communication Technology for Competitive Strategies (ICTCS 2021)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 401))

  • 513 Accesses

Abstract

The Internet of Things (IoT) has inexorably awakened advanced humans’ existence. Aside from the advantages that this innovative technology provides to the IoT device users, there are also cyber security concerns. Traditional cyber security approaches would not work on low-power IoT devices. As a result, numerous threat detection approaches and methods that are considerate the constraints of the Internet of Things have recently been created. To detect abnormalities in network traffic time series, this research offers a threat detection strategy that combines statistical and machine learning approaches. Furthermore, this novel architecture provides a light solution for cyber security because the logic of computing is a component of the edge layer. The technique performed nicely in spans of recall, precision, accuracy, and F-measure, according to the findings of the test bed testing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Gelenbe E et al (2013) Nemesys: enhanced network security for seam-less service provisioning in the smart mobile ecosystem. In: Information sciences and systems. Springer, pp 369–378

    Google Scholar 

  2. Toupas P et al (2019) An intrusion detection system for multi-class classification based on deep neural networks. In: 18th IEEE international conference on machine learning and applications (ICMLA). IEEE, pp 1253–1258

    Google Scholar 

  3. Shi W et al (2016) Edge computing: vision and challenges. IEEE Internet Things J 3

    Google Scholar 

  4. Spanos G et al (2019) Combining statistical and machine learning techniques in IoT anomaly detection for smart homes. In: IEEE 24th international workshop on computer aided modeling and design of communication links and networks (CAMAD). IEEE, pp 1–6

    Google Scholar 

  5. Collen A et al (2018) Ghost—safe-guarding home IoT environments with personalized real-time risk control. In: Security in computer and information sciences. Springer International Publishing, pp 68–78

    Google Scholar 

  6. Augusto-Gonzalez J et al (2019) From internet of threats to internet of things: a cyber security architecture for smart homes. In: IEEE 24th international workshop on computer aided modeling and design of communication links and networks (CAMAD), pp 1–6

    Google Scholar 

  7. Hajiheidari S et al (2019) Intrusion detection systems in the internet of things: a comprehensive investigation. Comput Netw

    Google Scholar 

  8. Raza S, Wallgren L et al (2013) Svelte: real-time intrusion detection in the internet of things. Ad Hoc Networks 11(8):2661–2674

    Google Scholar 

  9. Sekar R et al (2002) Specification-based anomaly detection: a new approach for detecting network intrusions. In: Proceedings of the 9th ACM conference on computer and communications security

    Google Scholar 

  10. Chen P-Y et al (2014) Information fusion to defend intentional attack in internet of things. IEEE Internet Things J 1(4):337–348

    Article  Google Scholar 

  11. Rajasegarar S, Gluhak A et al (2014) Ellipsoidal neighborhood outlier factor for distributed anomaly detection in resource constrained networks. Pattern Recogn 47(9):2867–2879

    Article  Google Scholar 

  12. Hodo E, Bellekens X et al (2016) Threat analysis of IoT networks using artificial neural network intrusion detection system. In: International symposium on networks, computers and communications (ISNCC). IEEE

    Google Scholar 

  13. Khan ZA et al (2017) A trust based distributed intrusion detection mechanism for internet of things. In: IEEE 31st international conference on advanced information networking and applications (AINA). IEEE, pp 1169–1176

    Google Scholar 

  14. Li J et al (2018) Ai-based two-stage intrusion detection for software defined IoT networks. IEEE Internet Things J 6(2):2093–2102

    Article  Google Scholar 

  15. Diro AA et al (2018) Distributed attack detection scheme using deep learning approach for internet of things. Future Gener Comput Syst 82:761–768

    Google Scholar 

  16. Amin SO et al (2009) A novel coding scheme to implement signature-based IDS in IP based sensor networks. In: International symposium on integrated network management-workshops. IEEE

    Google Scholar 

  17. Oh D et al (2014) A malicious pattern detection engine for embedded security systems in the internet of things. Sensors 14(12):24188–24211

    Google Scholar 

  18. Sun H et al (2017) Cloudeyes: cloud-based malware detection with reversible sketch for resource-constrained internet of things (IOT) devices. Softw Pract Exper 47:421–441

    Google Scholar 

  19. La QD et al (2016) Deceptive attack and defense game in honeypot-enabled networks for the internet of things. IEEE Internet Things J 3(6):1025–1035

    Article  Google Scholar 

  20. Surendar M et al (2016) Indres: an intrusion detection and response system for internet of things with 6lowpan. In: International conference on wireless communications, signal processing and networking (WiSPNET). IEEE, pp 1903–1908

    Google Scholar 

  21. Gara F et al (2017) An intrusion detection system for selective forwarding attack in IPv6-based mobile WSNs. In: 13th international wireless communications and mobile computing conference (IWCMC). IEEE, pp 276–281

    Google Scholar 

  22. Sedjelmaci H et al (2017) An accurate security game for low-resource IoT devices. IEEE Trans Veh Technol 66(10):9381–9393

    Article  Google Scholar 

  23. Shreenivas D et al (2017) Intrusion detection in the RPL-connected 6LoWPAN networks. In: Proceedings of the 3rd ACM international workshop on IoT privacy, trust, and security, pp 31–38

    Google Scholar 

  24. Hyndman RJ et al (2018) Forecasting: principles and practice. OTexts

    Google Scholar 

  25. Fawcett T (2006) An introduction to ROC analysis. Pattern Recogn Lett 27(8):861–874

    Article  MathSciNet  Google Scholar 

  26. Suthaharan S (2016) Big data analytics. In: Machine learning models and algorithms for big data classification. Springer, pp 31–75

    Google Scholar 

  27. Jolliffe IT (2002) Principal component analysis, 2nd edn. Springer, New York, NY

    MATH  Google Scholar 

  28. Kriegel H-P et al (2011) Density-based clustering. Wiley Interdisc Rev: Data Min Knowl Disc 1(3):231–240

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chandan Kumar Jha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jha, C.K., Biswas, S.S., Nafis, M.T. (2023). A Comprehensive System for Smart Homes with a Minimalist Information Security Framework. In: Kaiser, M.S., Xie, J., Rathore, V.S. (eds) Information and Communication Technology for Competitive Strategies (ICTCS 2021). Lecture Notes in Networks and Systems, vol 401. Springer, Singapore. https://doi.org/10.1007/978-981-19-0098-3_39

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-0098-3_39

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-0097-6

  • Online ISBN: 978-981-19-0098-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics