TY - JOUR
T1 - An Automata Based Intrusion Detection Method for Internet of Things
AU - Fu, Yulong
AU - Yan, Zheng
AU - Cao, Jin
AU - Koné, Ousmane
AU - Cao, Xuefei
PY - 2017
Y1 - 2017
N2 - Internet of Things (IoT) transforms network communication to Machine-to-Machine (M2M) basis and provides open access and new services to citizens and companies. It extends the border of Internet and will be developed as one part of the future 5G networks. However, as the resources of IoT's front devices are constrained, many security mechanisms are hard to be implemented to protect the IoT networks. Intrusion detection system (IDS) is an efficient technique that can be used to detect the attackers when cryptography is broken, and it can be used to enforce the security of IoT networks. In this article, we analyzed the intrusion detection requirements of IoT networks and then proposed a uniform intrusion detection method for the vast heterogeneous IoT networks based on an automata model. The proposed method can detect and report the possible IoT attacks with three types: Jam-attack, false-attack, and reply-attack automatically. We also design an experiment to verify the proposed IDS method and examine the attack of RADIUS application.
AB - Internet of Things (IoT) transforms network communication to Machine-to-Machine (M2M) basis and provides open access and new services to citizens and companies. It extends the border of Internet and will be developed as one part of the future 5G networks. However, as the resources of IoT's front devices are constrained, many security mechanisms are hard to be implemented to protect the IoT networks. Intrusion detection system (IDS) is an efficient technique that can be used to detect the attackers when cryptography is broken, and it can be used to enforce the security of IoT networks. In this article, we analyzed the intrusion detection requirements of IoT networks and then proposed a uniform intrusion detection method for the vast heterogeneous IoT networks based on an automata model. The proposed method can detect and report the possible IoT attacks with three types: Jam-attack, false-attack, and reply-attack automatically. We also design an experiment to verify the proposed IDS method and examine the attack of RADIUS application.
UR - http://www.scopus.com/inward/record.url?scp=85019638485&partnerID=8YFLogxK
U2 - 10.1155/2017/1750637
DO - 10.1155/2017/1750637
M3 - Article
AN - SCOPUS:85019638485
VL - 2017
JO - MOBILE INFORMATION SYSTEMS
JF - MOBILE INFORMATION SYSTEMS
SN - 1574-017X
M1 - 1750637
ER -