Skip to main content

Privacy Preserving Intrusion Detection System for Low Power Internet of Things

  • Conference paper
  • First Online:
Computational Intelligence and Data Analytics

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 142))

  • 438 Accesses

Abstract

The evolution of Internet of Things (IoT) has resulted in coexistence of multiple wireless communication networks made of resource-constrained devices over lossy communication links. This increased the density and complexity of existing computing and communication system, which in turn increased the vulnerabilities and privacy risk of low power IoT networks. The existing security mechanisms are not suitable for low power IoT containing resource-constrained devices which cannot implement computational intensive security algorithms. In this paper, a novel intrusion detection system with privacy preservation for 6LoWPAN, a low power IoT network is proposed. In the proposed system, intrusion detection was performed using agent mechanism and the privacy preservation is implemented using negative survey technique. The experimental results show that the proposed system is promising in terms of energy and privacy with low false alarm rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Yang Y, Wu L, Yin G, Li L, Zhao H (2017) A survey on security and privacy issues in internet-of-things. IEEE Int Things J 4(5):1250–1258

    Article  Google Scholar 

  2. Sun X, Wang C (2011) The research of security technology in the internet of things. In: Advances in computer science, intelligent system and environment. Springer Berlin Heidelberg, pp 113–119

    Google Scholar 

  3. Olsson J (2014) 6LoWPAN demystified. Texas Instrum 13

    Google Scholar 

  4. Le A, Loo J, Lasebae A, Aiash M, Luo Y (2012) 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach. Int J Commun Syst 25(9):1189–1212

    Article  Google Scholar 

  5. Kůr J, Matyáš V, Stetsko A, Švenda P (2011) Attack detection versus privacy—how to find the link or how to hide it? In: Security protocols XIX. Springer Berlin Heidelberg, pp 189–199

    Google Scholar 

  6. Rghioui A, Khannous A, Bouhorma M (2015) Monitoring behavior-based intrusion detection system for 6loWPAN networks. Int J Innovation Appl Stud 11(4):894

    Google Scholar 

  7. Shelby Z, Bormann C (2011) 6LoWPAN: the wireless embedded internet, vol 43. Wiley

    Google Scholar 

  8. Dunkels A, Gronvall B, Voigt T (Nov 2004) Contiki-a lightweight and flexible operating system for tiny networked sensors. In: 29th annual IEEE international conference on local computer networks. IEEE, pp 455–462.

    Google Scholar 

  9. Winter T, Thubert P, Brandt A, Hui JW, Kelsey R, Levis P, Pister K, Struik R, Vasseur JP, Alexander RK (2012) RPL: IPv6 routing protocol for low-power and lossy networks. No. RFC 6550:1–157

    Google Scholar 

  10. Vasseur J-P, Kim M, Pister K, Dejean N, Barthel D (2012) Routing metrics used for path calculation in low-power and lossy networks. No. RFC 6551

    Google Scholar 

  11. Hennebert C, Dos Santos J (2014) Security protocols and privacy issues into 6lowpan stack: a synthesis. Int Things J, IEEE 1(5):384–398

    Article  Google Scholar 

  12. Chanal PM, Kakkasageri MS (2020) Security and privacy in IOT: a survey. Wirel Pers Commun 115(2):1667–1693

    Article  Google Scholar 

  13. Deep S, Zheng X, Jolfaei A, Yu D, Ostovari P, Kashif Bashir A (2020) A survey of security and privacy issues in the internet of things from the layered context. Trans Emerg Telecommun Technol e3935

    Google Scholar 

  14. Abdul-Ghani HA, Konstantas D (2019) A comprehensive study of security and privacy guidelines, threats, and countermeasures: an IoT perspective. J Sens Actuator Netw 8(2):22

    Article  Google Scholar 

  15. Gopalakrishnan K (2020) Security vulnerabilities and issues of traditional wireless sensors networks in IoT. In: Principles of internet of things (IoT) ecosystem: insight paradigm. Springer, Cham, pp 519–549

    Google Scholar 

  16. Pongle P, Chavan G (Jan 2015) A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 International conference on pervasive computing (ICPC). IEEE, pp 1–6

    Google Scholar 

  17. Verma A, Ranga V (2020) Security of RPL based 6LoWPAN networks in the internet of things: a review. IEEE Sens J 20(11):5666–5690

    Article  Google Scholar 

  18. Kasinathan P, Costamagna G, Khaleel H, Pastrone C, Spirito MA (Nov 2013) An IDS framework for internet of things empowered by 6LoWPAN. In: Proceedings of the 2013 ACM SIGSAC conference on computer and communications security, pp 1337–1340

    Google Scholar 

  19. Amin SO, Siddiqui MS, Hong CS, Lee S (2009) RIDES: robust intrusion detection system for IP-based ubiquitous sensor networks. Sensors 9(5):3447–3468

    Google Scholar 

  20. Raza S, Wallgren L, Voigt T (2013) SVELTE: real-time intrusion detection in the internet of things. Ad Hoc Netw 11(8):2661–2674

    Article  Google Scholar 

  21. Kasinathan P, Pastrone C, Spirito M, Vinkovits M (2013) Denial-of-service detection in 6LoWPAN based internet of things. In: 2013 IEEE 9th international conference on wireless and mobile computing, networking and communications (WiMob). IEEE, pp 600–607

    Google Scholar 

  22. Pongle P, Chavan G (2015) Real time intrusion and wormhole attack detection in internet of things. Int J Comput Appl 121(9):1–9

    Google Scholar 

  23. Le A, Loo J, Luo Y, Lasebae A (2011) Specification-based IDS for securing RPL from topology attacks. In: Wireless days (WD), 2011 IFIP. IEEE, pp 1–3

    Google Scholar 

  24. Butun I, Morgera SD, Sankar R (2014) A survey of intrusion detection systems in wireless sensor networks. Commun Surv Tutorials, IEEE 16(1):266–282

    Article  Google Scholar 

  25. Mehmood A, Khanan A, Umar MM, Abdullah S, Ariffin KAZ, Song H (2017) Secure knowledge and cluster-based intrusion detection mechanism for smart wireless sensor networks. IEEE Access 6:5688–5694

    Article  Google Scholar 

  26. Sachan RS, Wazid M, Singh DP, Goudar RH (April 2013) A cluster based intrusion detection and prevention technique for misdirection attack inside WSN. In: 2013 international conference on communication and signal processing. IEEE, pp 795–801

    Google Scholar 

  27. Cervantes C, Poplade D, Nogueira M, Santos A (May 2015) Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for internet of things. In: 2015 IFIP/IEEE international symposium on integrated network management (IM). IEEE, pp 606–611

    Google Scholar 

  28. Glissa G, Rachedi A, Meddeb A (Dec 2016) A secure routing protocol based on RPL for internet of things. In: 2016 IEEE global communications conference (GLOBECOM). IEEE, pp 1–7

    Google Scholar 

  29. Hatzivasilis G, Papaefstathiou I, Manifavas C (2017) SCOTRES: secure routing for IoT and CPS. IEEE Int Things J 4(6):2129–2141

    Article  Google Scholar 

  30. Kouachi AI, Bachir A (Oct 2020) Communication-flow privacy-preservation in 6lowpans-based iot networks. In: International symposium on modelling and implementation of complex systems. Springer, Cham, pp 33–47

    Google Scholar 

  31. Esponda F, Guerrero VM (2009) Surveys with negative questions for sensitive items. Statist Probab Lett 79(24):2456–2461

    Article  MathSciNet  Google Scholar 

  32. Liu R, Tang S (2015) Negative survey-based privacy protection of cloud data. In: Advances in swarm and computational intelligence. Springer International Publishing, pp 151–159

    Google Scholar 

  33. Horey J, Forrest S, Groat M (2012) Reconstructing spatial distributions from anonymized locations. In: 2012 IEEE 28th international conference on data engineering workshops (ICDEW). IEEE, pp 243–250

    Google Scholar 

  34. Zhao D, Luo W, Yue L (June 2016) Reconstructing positive surveys from negative surveys with background knowledge. In: International conference on data mining and big data. Springer, Cham, pp 86–99

    Google Scholar 

  35. Matyas V, Kur J (2013) Conflicts between intrusion detection and privacy mechanisms for wireless sensor networks. IEEE Secur Priv 5:73–76

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Prabavathy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Prabavathy, S., Reddy, I.R.P. (2023). Privacy Preserving Intrusion Detection System for Low Power Internet of Things. In: Buyya, R., Hernandez, S.M., Kovvur, R.M.R., Sarma, T.H. (eds) Computational Intelligence and Data Analytics. Lecture Notes on Data Engineering and Communications Technologies, vol 142. Springer, Singapore. https://doi.org/10.1007/978-981-19-3391-2_44

Download citation

Publish with us

Policies and ethics