DOI QR코드

DOI QR Code

A Study on Dual-IDS Technique for Improving Safety and Reliability in Internet of Things

사물인터넷 환경에서 안전성과 신뢰성 향상을 위한 Dual-IDS 기법에 관한 연구

  • 양환석 (중부대학교 정보보호학과)
  • Received : 2017.01.24
  • Accepted : 2017.02.27
  • Published : 2017.03.30

Abstract

IoT can be connected through a single network not only objects which can be connected to existing internet but also objects which has communication capability. This IoT environment will be a huge change to the existing communication paradigm. However, the big security problem must be solved in order to develop further IoT. Security mechanisms reflecting these characteristics should be applied because devices participating in the IoT have low processing ability and low power. In addition, devices which perform abnormal behaviors between objects should be also detected. Therefore, in this paper, we proposed D-IDS technique for efficient detection of malicious attack nodes between devices participating in the IoT. The proposed technique performs the central detection and distribution detection to improve the performance of attack detection. The central detection monitors the entire network traffic at the boundary router using SVM technique and detects abnormal behavior. And the distribution detection combines RSSI value and reliability of node and detects Sybil attack node. The performance of attack detection against malicious nodes is improved through the attack detection process. The superiority of the proposed technique can be verified by experiments.

Keywords

References

  1. Shancang Li, Li Da Xu, Shanshan Zhao, "The internet of things: a survey," Springer Information Systems Frontiers, Volume 17, Issue 2, 2015, pp. 243-259. https://doi.org/10.1007/s10796-014-9492-7
  2. M. Hossain, M. Fotouhi and R. Hasan, "Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things," 2015 IEEE World Congress on Services, 2015.
  3. Okan CAN, Ozgur Koray SAHINGOZ, "A Survey of Intrusion Detection Systems in Wireless Sensor Networks," 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO), 2015.
  4. Kasinathan, Prabhakaran, et al. "Denial-of-Service detection in 6LoWPAN based internet of things." Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on. IEEE, 2013.
  5. 최희식, 조양현, "사물인터넷 보안 문제제기와 대안," 디지털산업정보학회지, 제11권, 제1호, 2015, pp. 69-78.
  6. Chen Jun, Chen Chi, "Design of Complex Event-Processing IDS in Internet of Things," Sixth International Conference on Measuring Technology and Mechatronics Automation, IEEE DOI: 10.1109/ICMTMA.2014.57, 2014.
  7. A. Anand, B. Patel, "An Overview on Intrusion Detection System and Types of Attacks It Can Detect Considering Different Protocols," International Journal of Advanced Re-search in Computer Science and Software Engineering, vol. 2, no. 8, 2012.
  8. M. Hossain, V. Raghunathan, Aegis, "A lightweight rewall for wireless sensor networks," Distributed Computing in Sensor Systems, 2010, pp. 258-272.
  9. M. Livani, M. Abadi, "A pca-based distributed approach for intrusion detection in wireless sensor networks," in: International Symposium on Computer Networks and Distributed Systems (CNDS), IEEE, 2011, pp. 55-60.
  10. Raza, Shahid, Linus Wallgren, and Thiemo Voigt, "SVELTE: Real-time intrusion detection in the Internet of Things," Ad hoc networks Vol. 11, No. 8, 2013, pp. 2661-2674. https://doi.org/10.1016/j.adhoc.2013.04.014
  11. Q. M. Ashraf and M. H. Habaebi, "Autonomic schemes for threat mitigation in Internet of Things," Journal of Network and Computer Applications, Vol. 49, 2015, pp. 112-127. https://doi.org/10.1016/j.jnca.2014.11.011
  12. J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions," Future Generation Computer Systems, Vol. 29, No. 7, 2013, pp. 1645-1660. https://doi.org/10.1016/j.future.2013.01.010
  13. Kashinahan, Prabhakaran, et al., "Denail-of-Service detection in 6LoWPAN based internet of things," Wireless and Mobile Computing, Networking and Communications (WiMob), 2013.
  14. Le, Anhtuan, et al., "Specification-based IDS for securing RPL from topology attacks," Wirelees Days (WD), 2011 IFIP. IEEE, 2011.
  15. Jun, Chen, and Chen Chi., "Design of Complex Event Processing IDS in Internet of Things," Measuring Technology and Mechanronics Automation (ICMYMA), 2014 Sixth International Conference on. IEEE, 2014.

Cited by

  1. 오픈소스 IDS/IPS Suricata를 적용한 Windows7과 Ubuntu 성능 비교 분석 vol.13, pp.4, 2017, https://doi.org/10.17662/ksdim.2017.13.4.141