Reference Hub7
A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources

A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources

Chao Wu, Yuan'an Liu, Fan Wu, Feng Liu, Hui Lu, Wenhao Fan, Bihua Tang
Copyright: © 2020 |Volume: 12 |Issue: 1 |Pages: 22
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781799805793|DOI: 10.4018/IJDCF.2020010106
Cite Article Cite Article

MLA

Wu, Chao, et al. "A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources." IJDCF vol.12, no.1 2020: pp.109-130. http://doi.org/10.4018/IJDCF.2020010106

APA

Wu, C., Liu, Y., Wu, F., Liu, F., Lu, H., Fan, W., & Tang, B. (2020). A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources. International Journal of Digital Crime and Forensics (IJDCF), 12(1), 109-130. http://doi.org/10.4018/IJDCF.2020010106

Chicago

Wu, Chao, et al. "A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources," International Journal of Digital Crime and Forensics (IJDCF) 12, no.1: 109-130. http://doi.org/10.4018/IJDCF.2020010106

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Network security and network forensics technologies for the Internet of Things (IoT) need special consideration due to resource-constraints. Cybercrimes conducted in IoT focus on network information and energy sources. Graph theory is adopted to analyze the IoT network and a hybrid Intrusion Detection System (IDS) is proposed. The hybrid IDS consists of Centralized and Active Malicious Node Detection (CAMD) and Distributed and Passive EEA (Energy Exhaustion Attack) Resistance (DPER). CAMD is integrated in the genetic algorithm-based data gathering scheme. CAMD detects malicious nodes manipulated by cyber criminals and provides digital evidence for forensics. DPER is implemented in a set of communication protocols to alleviate the impact of EEA attacks. Simulation experiments conducted on NS-3 platform showed the hybrid IDS proposed detected and traced malicious nodes precisely without compromising energy efficiency. Besides, the impact of EEA attacks conducted by cyber criminals was effectively alleviated.