Abstract
The Internet of Things (IoT) has a profound technological, physical and economic impact on day-to-day lives. In IoT networks, the interacting nodes are inherently resource-constrained; this would render those nodes to be a source of cyber-attack targets. In this aspect, substantial efforts have been made, mainly through conventional cryptographic methods, to tackle the security and privacy concerns in IoT networks. Yet, the distinctive features of IoT nodes make conventional solutions inadequate to address the IoT network security spectrum. To cope with these concerns in IoT, a novel Conglomerate Edict based Intrusion Detection System (IDS) is designed in this work. The proposed IDS amalgamates the functioning of several decision based machine learning classifiers to overwhelm the security threats. Detecting an unknown attack seems to be a reverie in IoT security; whereas, the hybrid ensemble discernment classifier in the proposed IDS effectively detects the known as well as unknown attacks with paramount detection rate. Overall, numerous high performance metrics are evaluated in this work to reveal the proposed efficacy in assuring scalable and secured IoT data transmission.
Similar content being viewed by others
References
Meng Z and Zhang W 2017 Internet of things technology and its development model. Industry 2: 216
Li D, Lianbing D, Minchang L and Haoxiang W 2019 IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning. Int. J. Inf. Manage. 49: 533–545
Ibrahim M 2016 Octopus: an edge-fog mutual authentication scheme. J. Netw. Secur. 18(6)
Alrawais A, Alhothaily A, Hu C and Cheng X 2017 Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput. 21(2): 34–42
Thing VLL. IEEE 802.11 Network anomaly detection and attack classification: a deep learning approach. In: 2017 IEEE Wireless Communications and Networking Conference (WCNC), San Francisco, CA 1–6
Karagiannis V, Periklis C, Francisco V-G and Jesus A-Z 2015 A survey on application layer protocols for the internet of things. Transaction on IoT and Cloud computing 3(1): 11–17
Slabicki M and Grochla K 2016 Performance evaluation of coap, snmp and netconf protocols in fog computing architecture. In: NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium 1315–1319
Granjal J, Monteiro E and Silva J S 2015 Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun. Surv. Tutorials 17(3): 1294–1312
Asghar M H and Mohammadzadeh N 2015 Design and simulation of energy efficiency in node based on mqtt protocol in internet of things. In: Green Computing and Internet of Things (ICGCIoT), 2015 International Conference, 1413–1417
Bendel S, Springer T, Schuster D, Schill A, Ackermann R and Ameling M 2013 A service infrastructure for the internet of things based on xmpp, in: Pervasive Computing and Communications Workshops (PERCOM Workshops). In: 2013 IEEE International Conference, 385–388
Grammatikis P I R, Sarigiannidis P G and Moscholios I D 2019 Securing the internet of things: challenges, threats and solutions. Internet of Things 5: 41–70
Harbi Y, Aliouat Z, Harous S, Bentaleb A and Refoufi A 2019 A review of security in internet of things. Wirel. Pers. Commun. 108(1): 325–344
Adat Vand Gupta B B 2018 Security in internet of things: issues, challenges, taxonomy, and architecture. Telecommun. Syst. 67(3): 423–441
Dawoud A, Shahristani S and Raun C 2018 Deep learning and software-defined networks: towards secure Iot architecture. Internet Things 3: 82–89
Arıs A, Oktug S F and Voigt T 2018 Security of internet of things for a reliable internet of services 337−370
Miloslavskaya N and Tolstoy A 2019 Internet of things: information security challenges and solutions. Cluster Comput. 2(1): 103–119
Hellaoui H, Koudil M and Bouabdallah A 2017 Energy-efficient mechanisms in security of the internet of things: a survey. Comput. Net. 127: 173–189
He D, Ye R, Chan S, Guizani M and Xu Y 2018 Privacy in the internet of things for smart healthcare. IEEE Commun. Mag. 56(4): 38–44
Zhang X and Wen F 2018 An novel anonymous user WSN authentication for Internet of Things. Soft Comput. 23(14): 5683–5691
Qian Y, Jiang Y and Chen J et al. 2018 Towards decentralized IoT security enhancement: a blockchain approach. Comput. Electr. Eng. 72: 266–273
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Vidyashree, L., Suresha Mitigation of cyber attacks assuring security with conglomerate edict based intrusion detection system in IoT. Sādhanā 47, 67 (2022). https://doi.org/10.1007/s12046-022-01818-1
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s12046-022-01818-1