IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources

A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources
View Sample PDF
Author(s): Chao Wu (Chongqing Vehicle Test & Research Institute Co. Ltd., Chongqing, China), Yuan'an Liu (School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China), Fan Wu (School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China), Feng Liu (SKLOIS, IIE & SCS UCAS, CAS, Beijing, China), Hui Lu (Institute of Microelectronics of the Chinese Academy of Sciences, Beijing, China), Wenhao Fan (School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China)and Bihua Tang (School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China)
Copyright: 2020
Volume: 12
Issue: 1
Pages: 22
Source title: International Journal of Digital Crime and Forensics (IJDCF)
Editor(s)-in-Chief: Feng Liu (Chinese Academy of Sciences, China)
DOI: 10.4018/IJDCF.2020010106

Purchase

View A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources on the publisher's website for pricing and purchasing information.

Abstract

Network security and network forensics technologies for the Internet of Things (IoT) need special consideration due to resource-constraints. Cybercrimes conducted in IoT focus on network information and energy sources. Graph theory is adopted to analyze the IoT network and a hybrid Intrusion Detection System (IDS) is proposed. The hybrid IDS consists of Centralized and Active Malicious Node Detection (CAMD) and Distributed and Passive EEA (Energy Exhaustion Attack) Resistance (DPER). CAMD is integrated in the genetic algorithm-based data gathering scheme. CAMD detects malicious nodes manipulated by cyber criminals and provides digital evidence for forensics. DPER is implemented in a set of communication protocols to alleviate the impact of EEA attacks. Simulation experiments conducted on NS-3 platform showed the hybrid IDS proposed detected and traced malicious nodes precisely without compromising energy efficiency. Besides, the impact of EEA attacks conducted by cyber criminals was effectively alleviated.

Related Content

Dawei Zhang. © 2024. 16 pages.
Fuhai Jia, Yanru Jia, Jing Li, Zhenghui Liu. © 2024. 13 pages.
Shakir A. Mehdiyev, Tahmasib Kh. Fataliyev. © 2024. 17 pages.
Dawei Zhang. © 2023. 14 pages.
Wenjun Yao, Ying Jiang, Yang Yang. © 2023. 20 pages.
Yuwen Zhu, Lei Yu. © 2023. 16 pages.
Vijay Kumar, Sahil Sharma, Chandan Kumar, Aditya Kumar Sahu. © 2023. 14 pages.
Body Bottom