Skip to main content
Log in

IoT-based smart environment using intelligent intrusion detection system

  • Data analytics and machine learning
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

One of the most basic characteristic features of every smart device in a network based on the Internet of Things (IoT) is to gather a larger set of data that has been created and then transfer the gathered data to the destination/receiver server through the internet. Thus, IoT-based networks are most vulnerable to simple or complex attacks that need to be identified in the early stage of data transmission for saving the network from these malicious attacks. The chief goal of the proposed work is to design and form the intelligent intrusion detection system (I-IDS) using the machine learning models such that the attacks can be identified in the IoT network. The model is built considering the normal and malicious attacks on the data that are generated in IoT smart environment. To simulate such a model, a testbed is built where a wireless router, a DHT11 sensor, and a node MCU are being used during the design phase. An attacker or adversarial system is built to perform poisoning and sniffing attacks using a laptop system. The node captures the sensor values and transmits the data to the ThinkSpeak platform, during the normal phase via the wireless gateway, and in the attack phase, the malicious attacker interprets the data, modifies it while transmitting from node to the ThinkSpeak server. Thus, the attack called Man-In-The-Middle (MITM) is performed and classified as abnormal data. Various machine learning algorithms are performed on the data, and finally, the results obtained using a probabilistic model called as Markov model have a high performance evaluated based on the I-IDS IoT network. The results obtained during the experimental analysis show that the Markov model has obtained a 100% detection rate and 19% of false alarm rate (FAR) with high precision and low error rate. The algorithms such as naïve Bayes classifier, support vector machine (SVM), decision tree, and Adaboost are considered in comparison with the Markov model. The optimal solution is obtained concerning other evaluation metrics like sensitivity, F1, and true-positive rate (TPR). Therefore, the integrated network of IoT-WSN with its performance metrics is tabulated to show the potentials of securing a network system. Additionally, the proposed work gives a high level of security for IoT smart environment as compared with the other machine learning algorithms using the novel technique of intelligent IDS.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  • Alaparthy VT, Morgera SD (2018) A multi_level intrusion detection system for wireless sensor networks based on immune theory. IEEE Access 6:47364–47373

    Article  Google Scholar 

  • Ammar M, Russello G, Crispo B (2018) Internet of Things: a survey on the security of IoT frameworks. J Inf Secure Appl 38:8–27

    Google Scholar 

  • Arshad J, Azad MA, Abdeltaif MM, Salah K (2020) An intrusion detection framework for energy-constrained IoT devices. Mech Syst Signal Process 136:106436

    Article  Google Scholar 

  • Breitenbacher D, Homoliak I, Aung YL, Tippenhauer NO, Elovici Y (2019) HADES-IoT: a practical host-based anomaly detection system for IoT devices. In: Proc. ACM Asia Conf. Comput. Commun. Secur., Auckland, New Zealand, p. 479484

  • Chaabouni N, Mosbah M, Zemmari A, Sauvignac C, Faruki P (2019) Network intrusion detection for IoT security based on learning techniques. IEEE Commun. Surv. Tutor. 21:2671–2701

    Article  Google Scholar 

  • Challa S, Wazid M, Das AK, Kumar N, Reddy AG, Yoon E-J, Yoo K-Y (2017) Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access 5:3028–3043

    Article  Google Scholar 

  • Challa S, Wazid M, Das AK, Khan MK (2018) Authentication protocols for implantable medical devices: taxonomy, analysis, and future directions. IEEE Consum Electron Mag 7(1):57–65

    Article  Google Scholar 

  • Chowdhury R (2019) Top 20 Best Internet of Things Projects (IoT Projects) that you can make right now. Accessed: Oct. 2019. [Online]. Available: https://www.ubuntupit.com/best-internet-of-things%20projects-%20iot-projects-that-you-can-make-right-now

  • Das AK, Zeadally S, He D (2018) Taxonomy and analysis of security protocols for the Internet of Things. Future Gener Comput Syst 89:110–125

    Article  Google Scholar 

  • Diechmann J, Heineke K, Reinbacher T, Wee D (2015) The Internet of Things: How to capture the value of IoT. Technical Report, pp. 1–124. Available online: https://www.mckinsey.com/featured-insights/internet-of-things/our-insights/the-internet-of-things-how-to-capture-the-value-of-iot# (Accessed on 13 July 2020)

  • Elrawy MF, Awad AI, Hamed HFA (2018) Intrusion detection systems for IoT-based smart environments: a survey. J Cloud Comput 7(1):21

    Article  Google Scholar 

  • Fan X, Susan F, Long W, Li S (2017) Security analysis of Zigbee. Available online: https://courses.csail.mit.edu/6.857/2017/project/17.pdf (accessed on 13 July 2020)

  • Faria ER, Gonçalves IJCR, de Carvalho ACPLF, Gama J (2016) Novelty detection in data streams. Artif Intell Rev 45(2):235–269

    Article  Google Scholar 

  • Fremantle P (2015) A reference architecture for the Internet of Things. WSO2 White Paper. 2015. Available online: https://docs.huihoo.com/wso2/wso2-whitepaper-a-reference-architecture-for-the-internet-of-things.pdf (accessed on 13 July 2020)

  • Jan SU, Ahmed S, Shakhov V, Koo I (2019) Toward a lightweight intrusion detection system for the Internet of Things. IEEE Access 7:42450–42471

    Article  Google Scholar 

  • Kiwanuka FN, Akhtar IA (2019) Improving event monitoring in IoT network using an integrated blockchain-distributed pattern recognition scheme. In: Blockchain and applications: international congress, vol. 1010. Springer

  • Košt’ál, K.; Helebrandt, P.; Belluš, M.; Ries, M.; Kotuliak, I. Management and Monitoring of IoT Devices Using Blockchain. Sensors 2019, 19, 856.

  • Lawal MA, Shaikh RA, Hassan SR (2020) Security analysis of network anomalies mitigation schemes in IoT networks. IEEE Access 8:43355–43374

    Article  Google Scholar 

  • Li W, Tug S, Meng W, Wang Y (2019) Designing collaborative block chained signature-based intrusion detection in IoT environments. Future Gener Comput Syst 96:481489

    Google Scholar 

  • Moustafa N, Choo KKR, Radwan I, Camtepe S (2019) Outlier dirichlet mixture mechanism: adversarial statistical learning for anomaly detection in the fog. IEEE Trans Inf Forensics Secur 14:1975–1987

    Article  Google Scholar 

  • Mudgerikar A, Sharma P, Bertino E (2019) E-spion: a system-level intrusion detection system for IoT devices. In: Proc. ACM Asia Conf. Comput. Commun. Secur., Auckland, New Zealand, p. 493500

  • Nesterenko N, Bou-Harb E, Crichigno J, Kaddoum G, Ghani N (2019) Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations. IEEE Commun Surv Tutor 21:2702–2733

    Article  Google Scholar 

  • Pajouh HH, Javidan R, Khayami R, Dehghantanha A, Choo K-K-R (2019) A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans Emerg Topics Comput 7(2):314323

    Article  Google Scholar 

  • Raoof A, Matrawy A, Lung C-H (2019) Routing attacks and mitigation methods for RPLbased Internet of Things. IEEE Commun Surv Tuts 21(2):1582–1606

    Article  Google Scholar 

  • Selvakumar K, Karuppiah M, Sairamesh L, Islam SH, Hassan MM, Fortino G, Choo K-K-R (2019) Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs. Inf Sci 497:77–90

    Article  Google Scholar 

  • Sharma V, You I, Yim K, Chen I-R, Cho J-H (2019) BRIoT: behavior rule specification_based misbehavior detection for IoT_embedded cyber_physical systems. IEEE Access 7:118556–118580

    Article  Google Scholar 

  • Sivasakthiselvan S, Nagarajan V (2017) Energy-efficient data gathering by using optimum pattern recognition with relocalization in mobile wireless sensor networks. J ICT Stand 5(2):129–148

    Google Scholar 

  • Sun T, Yu W (2020) A formal verification framework for security issues of blockchain smart contracts. Electronics 9:255

    Article  Google Scholar 

  • Sun Z, Xu Y, Liang G, Zhou Z (2018) An intrusion-detection model for wireless sensor networks with an improved V_detector algorithm. IEEE Sensors J 18(5):1971–1984

    Article  Google Scholar 

  • Wazid M (2017) Design and analysis of intrusion detection protocols for hierarchical wireless sensor networks. Ph.D. dissertation, Centre Secure., Theory Algorithmic Res., Int. Inst. Inf. Technol., Hyderabad, India

  • Wazid M (2017) Design and analysis of intrusion detection protocols for hierarchical wireless sensor networks. Ph.D. dissertation, Center Secur., Theory Algorithmic Res., Int. Inst. Inf. Technol., Hyderabad, India

  • Wazid M, Das AK (2017) A secure group_based blackhole node detection scheme for hierarchical wireless sensor networks. Wirel Pers Commun 94(3):1165–1191

    Article  Google Scholar 

  • Wazid M, Bagga P, Das AK, Shetty S, Rodrigues JJPC, Park Y (2019a) AKM_IoV: authenticated key management protocol in fog computing-based internet of vehicles deployment. IEEE Internet Things J 6(5):8804–8817. https://doi.org/10.1109/jiot.2019.2923611

    Article  Google Scholar 

  • Wazid M, Reshma Dsouza P, Das AK, Bhat V, Rodrigues JJPC (2019b) RAD_EI: a routing attack detection scheme for edge-based internet of things environment. Int J Commun Syst 32(15):e4024. https://doi.org/10.1002/dac.4024

    Article  Google Scholar 

  • Wheelus C, Zhu X (2020) IoT network security: threats, risks, and a data-driven defense framework. IoT 1(2):259–285

    Article  Google Scholar 

Download references

Funding

This research has no funding by any organization or individual.

Author information

Authors and Affiliations

Authors

Contributions

GK proposed the main idea, checked and discussed the results and the whole manuscript. Dr. GS contributed to the discussion of this study. All authors have read and agreed to the published version of the manuscript.

Corresponding author

Correspondence to Gauri Kalnoor.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kalnoor, G., Gowrishankar, S. IoT-based smart environment using intelligent intrusion detection system. Soft Comput 25, 11573–11588 (2021). https://doi.org/10.1007/s00500-021-06028-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-021-06028-1

Keywords

Navigation