Browse > Article
http://dx.doi.org/10.17662/ksdim.2017.13.1.049

A Study on Dual-IDS Technique for Improving Safety and Reliability in Internet of Things  

Yang, Hwanseok (중부대학교 정보보호학과)
Publication Information
Journal of Korea Society of Digital Industry and Information Management / v.13, no.1, 2017 , pp. 49-57 More about this Journal
Abstract
IoT can be connected through a single network not only objects which can be connected to existing internet but also objects which has communication capability. This IoT environment will be a huge change to the existing communication paradigm. However, the big security problem must be solved in order to develop further IoT. Security mechanisms reflecting these characteristics should be applied because devices participating in the IoT have low processing ability and low power. In addition, devices which perform abnormal behaviors between objects should be also detected. Therefore, in this paper, we proposed D-IDS technique for efficient detection of malicious attack nodes between devices participating in the IoT. The proposed technique performs the central detection and distribution detection to improve the performance of attack detection. The central detection monitors the entire network traffic at the boundary router using SVM technique and detects abnormal behavior. And the distribution detection combines RSSI value and reliability of node and detects Sybil attack node. The performance of attack detection against malicious nodes is improved through the attack detection process. The superiority of the proposed technique can be verified by experiments.
Keywords
Internet of Things; Intrusion Detection; Support Vector Machine; Sybil Attack;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Kashinahan, Prabhakaran, et al., "Denail-of-Service detection in 6LoWPAN based internet of things," Wireless and Mobile Computing, Networking and Communications (WiMob), 2013.
2 Le, Anhtuan, et al., "Specification-based IDS for securing RPL from topology attacks," Wirelees Days (WD), 2011 IFIP. IEEE, 2011.
3 Jun, Chen, and Chen Chi., "Design of Complex Event Processing IDS in Internet of Things," Measuring Technology and Mechanronics Automation (ICMYMA), 2014 Sixth International Conference on. IEEE, 2014.
4 Shancang Li, Li Da Xu, Shanshan Zhao, "The internet of things: a survey," Springer Information Systems Frontiers, Volume 17, Issue 2, 2015, pp. 243-259.   DOI
5 M. Hossain, M. Fotouhi and R. Hasan, "Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things," 2015 IEEE World Congress on Services, 2015.
6 Okan CAN, Ozgur Koray SAHINGOZ, "A Survey of Intrusion Detection Systems in Wireless Sensor Networks," 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO), 2015.
7 A. Anand, B. Patel, "An Overview on Intrusion Detection System and Types of Attacks It Can Detect Considering Different Protocols," International Journal of Advanced Re-search in Computer Science and Software Engineering, vol. 2, no. 8, 2012.
8 Kasinathan, Prabhakaran, et al. "Denial-of-Service detection in 6LoWPAN based internet of things." Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on. IEEE, 2013.
9 최희식, 조양현, "사물인터넷 보안 문제제기와 대안," 디지털산업정보학회지, 제11권, 제1호, 2015, pp. 69-78.
10 Chen Jun, Chen Chi, "Design of Complex Event-Processing IDS in Internet of Things," Sixth International Conference on Measuring Technology and Mechatronics Automation, IEEE DOI: 10.1109/ICMTMA.2014.57, 2014.   DOI
11 M. Hossain, V. Raghunathan, Aegis, "A lightweight rewall for wireless sensor networks," Distributed Computing in Sensor Systems, 2010, pp. 258-272.
12 M. Livani, M. Abadi, "A pca-based distributed approach for intrusion detection in wireless sensor networks," in: International Symposium on Computer Networks and Distributed Systems (CNDS), IEEE, 2011, pp. 55-60.
13 Raza, Shahid, Linus Wallgren, and Thiemo Voigt, "SVELTE: Real-time intrusion detection in the Internet of Things," Ad hoc networks Vol. 11, No. 8, 2013, pp. 2661-2674.   DOI
14 Q. M. Ashraf and M. H. Habaebi, "Autonomic schemes for threat mitigation in Internet of Things," Journal of Network and Computer Applications, Vol. 49, 2015, pp. 112-127.   DOI
15 J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions," Future Generation Computer Systems, Vol. 29, No. 7, 2013, pp. 1645-1660.   DOI