Skip to main content

Implementation and Evaluation of an Intrusion Detection System for IoT: Against Routing Attacks

  • Conference paper
  • First Online:
Advanced Intelligent Systems for Sustainable Development (AI2SD’2019) (AI2SD 2019)

Abstract

The intensive growth of technology and devices connected to the Internet has made the Internet of Things (IoT) an essential element in all sectors of activity. It can be found in our watches, houses, cars, refrigerators, industrial machines, etc. Simply put, The Internet of Things is the future of technology that makes it easier to collect, analyze and distribute data that some person can implement them to achieve information or knowledge. Despite these advantages, this evolution suffers from a major security problem. This is due in particular to their heterogeneous nature, as well as the constraints of these objects (Memory, Processing Capabilities and limited energy…) are the main vulnerabilities of the IoT that are the origin of various attacks. Thus, many solutions have been developed to secure the IoT, but this remains insufficient because of the limitations of these mechanisms. This document is dedicated to the implementation and evaluation of an intrusion detection system (IDS) against attacks targeting the routing protocol in the IoT environment. The evaluation of the IDS is carried out with an emphasis on energy consumption, and detection rate. To achieve this, we have selected Cooja software as the simulator.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Atzori, L., Iera, A., Morabito, G.: Understanding the Internet of Things: definition, potentials, and societal role of a fast evolving paradigm. Ad Hoc Netw. 56, 122–140 (2017). https://doi.org/10.1016/j.adhoc.2016.12.004

    Article  Google Scholar 

  2. Li, S., Tryfonas, T., Li, H.: The Internet of Things: a security point of view. Internet Res. 26, 337–359 (2016). https://doi.org/10.1108/IntR-07-2014-0173

    Article  Google Scholar 

  3. Khan, M.M., Lodhi, M.A., Rehman, A., Khan, A., Hussain, F.B.: Sink-to-sink coordination framework using RPL: routing protocol for low power and lossy networks. J. Sens. 2016, 1–11 (2016). https://doi.org/10.1155/2016/2635429

    Article  Google Scholar 

  4. Ghosal, A., Halder, S.: A survey on energy efficient intrusion detection in wireless sensor networks. J. Ambient Intell. Smart Environ. 9, 239–261 (2017). https://doi.org/10.3233/AIS-170426

    Article  Google Scholar 

  5. Wallgren, L., Raza, S., Voigt, T.: Routing attacks and countermeasures in the RPL-based Internet of Things. Int. J. Distrib. Sens. Netw. 9, 794326 (2013). https://doi.org/10.1155/2013/794326

    Article  Google Scholar 

  6. Stephen, R.: Deist: dynamic detection of Sinkhole attack for Internet of Things. Int. J. Eng. Comput. Sci. 5(12), 19358–19362 (2016). https://doi.org/10.18535/ijecs/v5i12.16. Research scholar Department of Computer Science St. Joseph’s College (Autonomous) Tiruchirappalli-620002

    Article  MathSciNet  Google Scholar 

  7. Colom, J.F., Gil, D., Mora, H., Volckaert, B., Jimeno, A.M.: Scheduling framework for distributed intrusion detection systems over heterogeneous network architectures. J. Netw. Comput. Appl. 108, 76–86 (2018). https://doi.org/10.1016/j.jnca.2018.02.004

    Article  Google Scholar 

  8. Clausen, T., Herberg, U., Philipp, M.: A critical evaluation of the IPv6 routing protocol for low power and lossy networks (RPL). In: 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 365–372. IEEE, Shanghai (2011)

    Google Scholar 

  9. Vucinic, M., Romaniello, G., Guelorget, L., Tourancheau, B., Rousseau, F., Alphand, O., Duda, A., Damon, L.: Topology construction in RPL networks over Beacon-enabled 802.15.4. ArXiv arXiv:1404.7803 Cs (2014)

  10. Pu, C., Song, T.: Hatchetman attack: a denial of service attack against routing in low power and lossy networks. In: 2018 5th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2018 4th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), pp. 12–17. IEEE, Shanghai (2018)

    Google Scholar 

  11. Mayzaud, A., Badonnel, R., Chrisment, I.: A taxonomy of attacks in RPL-based Internet of Things. vol. 16 (2016)

    Google Scholar 

  12. Sundararajan, R.K., Arumugam, U.: Intrusion detection algorithm for mitigating sinkhole attack on LEACH protocol in wireless sensor networks. J. Sens. 2015, 1–12 (2015). https://doi.org/10.1155/2015/203814

    Article  Google Scholar 

  13. Ioulianou, P., Vasilakis, V., Moscholios, I., Logothetis, M.: A signature-based intrusion detection system for the Internet of Things. 7 (2018)

    Google Scholar 

  14. Nygaard, F.: Intrusion detection system in IoT. 125 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Khardioui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Khardioui, M., Bamou, A., El Ouadghiri, M.D., Aghoutane, B. (2020). Implementation and Evaluation of an Intrusion Detection System for IoT: Against Routing Attacks. In: Ezziyyani, M. (eds) Advanced Intelligent Systems for Sustainable Development (AI2SD’2019). AI2SD 2019. Lecture Notes in Networks and Systems, vol 92. Springer, Cham. https://doi.org/10.1007/978-3-030-33103-0_16

Download citation

Publish with us

Policies and ethics