Skip to main content
Log in

Mitigation of cyber attacks assuring security with conglomerate edict based intrusion detection system in IoT

  • Published:
Sādhanā Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) has a profound technological, physical and economic impact on day-to-day lives. In IoT networks, the interacting nodes are inherently resource-constrained; this would render those nodes to be a source of cyber-attack targets. In this aspect, substantial efforts have been made, mainly through conventional cryptographic methods, to tackle the security and privacy concerns in IoT networks. Yet, the distinctive features of IoT nodes make conventional solutions inadequate to address the IoT network security spectrum. To cope with these concerns in IoT, a novel Conglomerate Edict based Intrusion Detection System (IDS) is designed in this work. The proposed IDS amalgamates the functioning of several decision based machine learning classifiers to overwhelm the security threats. Detecting an unknown attack seems to be a reverie in IoT security; whereas, the hybrid ensemble discernment classifier in the proposed IDS effectively detects the known as well as unknown attacks with paramount detection rate. Overall, numerous high performance metrics are evaluated in this work to reveal the proposed efficacy in assuring scalable and secured IoT data transmission.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9
Figure 10
Figure 11
Figure 12

Similar content being viewed by others

References

  1. Meng Z and Zhang W 2017 Internet of things technology and its development model. Industry 2: 216

    Google Scholar 

  2. Li D, Lianbing D, Minchang L and Haoxiang W 2019 IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning. Int. J. Inf. Manage. 49: 533–545

    Article  Google Scholar 

  3. Ibrahim M 2016 Octopus: an edge-fog mutual authentication scheme. J. Netw. Secur. 18(6)

  4. Alrawais A, Alhothaily A, Hu C and Cheng X 2017 Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput. 21(2): 34–42

  5. Thing VLL. IEEE 802.11 Network anomaly detection and attack classification: a deep learning approach. In: 2017 IEEE Wireless Communications and Networking Conference (WCNC), San Francisco, CA 1–6

  6. Karagiannis V, Periklis C, Francisco V-G and Jesus A-Z 2015 A survey on application layer protocols for the internet of things. Transaction on IoT and Cloud computing 3(1): 11–17

    Google Scholar 

  7. Slabicki M and Grochla K 2016 Performance evaluation of coap, snmp and netconf protocols in fog computing architecture. In: NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium 1315–1319

  8. Granjal J, Monteiro E and Silva J S 2015 Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun. Surv. Tutorials 17(3): 1294–1312

    Article  Google Scholar 

  9. Asghar M H and Mohammadzadeh N 2015 Design and simulation of energy efficiency in node based on mqtt protocol in internet of things. In: Green Computing and Internet of Things (ICGCIoT), 2015 International Conference, 1413–1417

  10. Bendel S, Springer T, Schuster D, Schill A, Ackermann R and Ameling M 2013 A service infrastructure for the internet of things based on xmpp, in: Pervasive Computing and Communications Workshops (PERCOM Workshops). In: 2013 IEEE International Conference, 385–388

  11. Grammatikis P I R, Sarigiannidis P G and Moscholios I D 2019 Securing the internet of things: challenges, threats and solutions. Internet of Things 5: 41–70

    Article  Google Scholar 

  12. Harbi Y, Aliouat Z, Harous S, Bentaleb A and Refoufi A 2019 A review of security in internet of things. Wirel. Pers. Commun. 108(1): 325–344

    Article  Google Scholar 

  13. Adat Vand Gupta B B 2018 Security in internet of things: issues, challenges, taxonomy, and architecture. Telecommun. Syst. 67(3): 423–441

    Article  Google Scholar 

  14. Dawoud A, Shahristani S and Raun C 2018 Deep learning and software-defined networks: towards secure Iot architecture. Internet Things 3: 82–89

    Article  Google Scholar 

  15. Arıs A, Oktug S F and Voigt T 2018 Security of internet of things for a reliable internet of services 337−370

  16. Miloslavskaya N and Tolstoy A 2019 Internet of things: information security challenges and solutions. Cluster Comput. 2(1): 103–119

    Article  Google Scholar 

  17. Hellaoui H, Koudil M and Bouabdallah A 2017 Energy-efficient mechanisms in security of the internet of things: a survey. Comput. Net. 127: 173–189

    Article  Google Scholar 

  18. He D, Ye R, Chan S, Guizani M and Xu Y 2018 Privacy in the internet of things for smart healthcare. IEEE Commun. Mag. 56(4): 38–44

    Article  Google Scholar 

  19. Zhang X and Wen F 2018 An novel anonymous user WSN authentication for Internet of Things. Soft Comput. 23(14): 5683–5691

    Article  Google Scholar 

  20. Qian Y, Jiang Y and Chen J et al. 2018 Towards decentralized IoT security enhancement: a blockchain approach. Comput. Electr. Eng. 72: 266–273

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to L Vidyashree.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vidyashree, L., Suresha Mitigation of cyber attacks assuring security with conglomerate edict based intrusion detection system in IoT. Sādhanā 47, 67 (2022). https://doi.org/10.1007/s12046-022-01818-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12046-022-01818-1

Keywords

Navigation