IIoT edge network security: Addressing spectrum scarcity through intrusion detection systems – a critical review

  • Md Alimul Haque
  • , Deepa Sonal
  • , Shipra Shivkumar Yadav
  • , Shameemul Haque
  • , Anil Kumar Sinha
  • , Sultan Ahmad

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

1 Scopus citations

Abstract

IoT (Internet of Things) devices have become increasingly popular over the years, providing users with convenience, automation, and control over various aspects of their lives. However, their growing popularity has also made them a target for cybercriminals who seek to exploit their vulnerabilities. The article also highlights the advantages and limitations of each technique and provides examples of their practical applications. The authors emphasize the importance of considering factors, such as resource constraints, network topology, and attack surface, when deploying intrusion detection systems (IDS) in IoT environments. They also discuss various deployment models, such as centralized, distributed, and hybrid models, and the advantages and limitations of each approach. The authors highlight the importance of using realistic and diverse datasets to validate IDS and provide examples of publicly available datasets that can be used for this purpose. The article also covers the various cyber-attacks that can target IoT systems and the challenges associated with detecting and mitigating these attacks using IDS. The authors discuss the need for IDS to detect both known and unknown attacks and the challenges associated with achieving this goal. Overall, this article provides a comprehensive overview of IDS in the context of IoT, covering techniques, attacks, public datasets, and challenges.

Original languageEnglish
Title of host publicationQuality Assessment and Security in Industrial Internet of Things
PublisherCRC Press
Pages124-148
Number of pages25
ISBN (Electronic)9781040147993
ISBN (Print)9781032538730
DOIs
StatePublished - 1 Jan 2024
Externally publishedYes

Fingerprint

Dive into the research topics of 'IIoT edge network security: Addressing spectrum scarcity through intrusion detection systems – a critical review'. Together they form a unique fingerprint.

Cite this