Abstract
The evolution of Internet of Things (IoT) has resulted in coexistence of multiple wireless communication networks made of resource-constrained devices over lossy communication links. This increased the density and complexity of existing computing and communication system, which in turn increased the vulnerabilities and privacy risk of low power IoT networks. The existing security mechanisms are not suitable for low power IoT containing resource-constrained devices which cannot implement computational intensive security algorithms. In this paper, a novel intrusion detection system with privacy preservation for 6LoWPAN, a low power IoT network is proposed. In the proposed system, intrusion detection was performed using agent mechanism and the privacy preservation is implemented using negative survey technique. The experimental results show that the proposed system is promising in terms of energy and privacy with low false alarm rate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Yang Y, Wu L, Yin G, Li L, Zhao H (2017) A survey on security and privacy issues in internet-of-things. IEEE Int Things J 4(5):1250–1258
Sun X, Wang C (2011) The research of security technology in the internet of things. In: Advances in computer science, intelligent system and environment. Springer Berlin Heidelberg, pp 113–119
Olsson J (2014) 6LoWPAN demystified. Texas Instrum 13
Le A, Loo J, Lasebae A, Aiash M, Luo Y (2012) 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach. Int J Commun Syst 25(9):1189–1212
Kůr J, Matyáš V, Stetsko A, Švenda P (2011) Attack detection versus privacy—how to find the link or how to hide it? In: Security protocols XIX. Springer Berlin Heidelberg, pp 189–199
Rghioui A, Khannous A, Bouhorma M (2015) Monitoring behavior-based intrusion detection system for 6loWPAN networks. Int J Innovation Appl Stud 11(4):894
Shelby Z, Bormann C (2011) 6LoWPAN: the wireless embedded internet, vol 43. Wiley
Dunkels A, Gronvall B, Voigt T (Nov 2004) Contiki-a lightweight and flexible operating system for tiny networked sensors. In: 29th annual IEEE international conference on local computer networks. IEEE, pp 455–462.
Winter T, Thubert P, Brandt A, Hui JW, Kelsey R, Levis P, Pister K, Struik R, Vasseur JP, Alexander RK (2012) RPL: IPv6 routing protocol for low-power and lossy networks. No. RFC 6550:1–157
Vasseur J-P, Kim M, Pister K, Dejean N, Barthel D (2012) Routing metrics used for path calculation in low-power and lossy networks. No. RFC 6551
Hennebert C, Dos Santos J (2014) Security protocols and privacy issues into 6lowpan stack: a synthesis. Int Things J, IEEE 1(5):384–398
Chanal PM, Kakkasageri MS (2020) Security and privacy in IOT: a survey. Wirel Pers Commun 115(2):1667–1693
Deep S, Zheng X, Jolfaei A, Yu D, Ostovari P, Kashif Bashir A (2020) A survey of security and privacy issues in the internet of things from the layered context. Trans Emerg Telecommun Technol e3935
Abdul-Ghani HA, Konstantas D (2019) A comprehensive study of security and privacy guidelines, threats, and countermeasures: an IoT perspective. J Sens Actuator Netw 8(2):22
Gopalakrishnan K (2020) Security vulnerabilities and issues of traditional wireless sensors networks in IoT. In: Principles of internet of things (IoT) ecosystem: insight paradigm. Springer, Cham, pp 519–549
Pongle P, Chavan G (Jan 2015) A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 International conference on pervasive computing (ICPC). IEEE, pp 1–6
Verma A, Ranga V (2020) Security of RPL based 6LoWPAN networks in the internet of things: a review. IEEE Sens J 20(11):5666–5690
Kasinathan P, Costamagna G, Khaleel H, Pastrone C, Spirito MA (Nov 2013) An IDS framework for internet of things empowered by 6LoWPAN. In: Proceedings of the 2013 ACM SIGSAC conference on computer and communications security, pp 1337–1340
Amin SO, Siddiqui MS, Hong CS, Lee S (2009) RIDES: robust intrusion detection system for IP-based ubiquitous sensor networks. Sensors 9(5):3447–3468
Raza S, Wallgren L, Voigt T (2013) SVELTE: real-time intrusion detection in the internet of things. Ad Hoc Netw 11(8):2661–2674
Kasinathan P, Pastrone C, Spirito M, Vinkovits M (2013) Denial-of-service detection in 6LoWPAN based internet of things. In: 2013 IEEE 9th international conference on wireless and mobile computing, networking and communications (WiMob). IEEE, pp 600–607
Pongle P, Chavan G (2015) Real time intrusion and wormhole attack detection in internet of things. Int J Comput Appl 121(9):1–9
Le A, Loo J, Luo Y, Lasebae A (2011) Specification-based IDS for securing RPL from topology attacks. In: Wireless days (WD), 2011 IFIP. IEEE, pp 1–3
Butun I, Morgera SD, Sankar R (2014) A survey of intrusion detection systems in wireless sensor networks. Commun Surv Tutorials, IEEE 16(1):266–282
Mehmood A, Khanan A, Umar MM, Abdullah S, Ariffin KAZ, Song H (2017) Secure knowledge and cluster-based intrusion detection mechanism for smart wireless sensor networks. IEEE Access 6:5688–5694
Sachan RS, Wazid M, Singh DP, Goudar RH (April 2013) A cluster based intrusion detection and prevention technique for misdirection attack inside WSN. In: 2013 international conference on communication and signal processing. IEEE, pp 795–801
Cervantes C, Poplade D, Nogueira M, Santos A (May 2015) Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for internet of things. In: 2015 IFIP/IEEE international symposium on integrated network management (IM). IEEE, pp 606–611
Glissa G, Rachedi A, Meddeb A (Dec 2016) A secure routing protocol based on RPL for internet of things. In: 2016 IEEE global communications conference (GLOBECOM). IEEE, pp 1–7
Hatzivasilis G, Papaefstathiou I, Manifavas C (2017) SCOTRES: secure routing for IoT and CPS. IEEE Int Things J 4(6):2129–2141
Kouachi AI, Bachir A (Oct 2020) Communication-flow privacy-preservation in 6lowpans-based iot networks. In: International symposium on modelling and implementation of complex systems. Springer, Cham, pp 33–47
Esponda F, Guerrero VM (2009) Surveys with negative questions for sensitive items. Statist Probab Lett 79(24):2456–2461
Liu R, Tang S (2015) Negative survey-based privacy protection of cloud data. In: Advances in swarm and computational intelligence. Springer International Publishing, pp 151–159
Horey J, Forrest S, Groat M (2012) Reconstructing spatial distributions from anonymized locations. In: 2012 IEEE 28th international conference on data engineering workshops (ICDEW). IEEE, pp 243–250
Zhao D, Luo W, Yue L (June 2016) Reconstructing positive surveys from negative surveys with background knowledge. In: International conference on data mining and big data. Springer, Cham, pp 86–99
Matyas V, Kur J (2013) Conflicts between intrusion detection and privacy mechanisms for wireless sensor networks. IEEE Secur Priv 5:73–76
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Prabavathy, S., Reddy, I.R.P. (2023). Privacy Preserving Intrusion Detection System for Low Power Internet of Things. In: Buyya, R., Hernandez, S.M., Kovvur, R.M.R., Sarma, T.H. (eds) Computational Intelligence and Data Analytics. Lecture Notes on Data Engineering and Communications Technologies, vol 142. Springer, Singapore. https://doi.org/10.1007/978-981-19-3391-2_44
Download citation
DOI: https://doi.org/10.1007/978-981-19-3391-2_44
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-3390-5
Online ISBN: 978-981-19-3391-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)