Towards a Secure Internet of Things: A Comprehensive Study of Second Line Defense Mechanisms

35Citations
Citations of this article
116Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The Internet of Things (IoT) exemplifies a large network of sensing and actuating devices that have penetrated into the physical world enabling new applications like smart homes, intelligent transportation, smart healthcare and smart cities. Through IoT, these applications have consolidated in the modern world to generate, share, aggregate and analyze large amount of security-critical and privacy sensitive data. As this consolidation gets stronger, the need for security in IoT increases. With first line of defense strategies like cryptography being unsuited due to the resource constrained nature, second line of defense mechanisms are crucial to ensure security in IoT networks. This paper presents a comprehensive study of existing second line of defense mechanisms for standardized protocols in IoT networks. The paper analyzes existing mechanisms in three aspects: Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) and Intrusion Response Systems (IRS). We begin by providing an overview of standardized protocol stack, its layers and defensive security systems in IoT. From there, we build our narrative by presenting an extended taxonomy of IDS, IPS and IRS classifying them on their techniques, deployment, attacks, datasets, evaluation metrics and data pre-processing methods. We then thoroughly review, compare and analyze the research proposals in this context, considering the unique characteristics involved in these systems. Based on the extensive analysis of the existing defensive security systems, the paper also identifies open research challenges and directions for effective design of such systems for IoT networks, which could guide future research in the area.

References Powered by Scopus

LIBSVM: A Library for support vector machines

28077Citations
N/AReaders
Get full text

Anomaly detection: A survey

8886Citations
N/AReaders
Get full text

Toward generating a new intrusion detection dataset and intrusion traffic characterization

3035Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Internet of Things intrusion detection systems: a comprehensive review and future directions

118Citations
N/AReaders
Get full text

A Survey on IoT Intrusion Detection: Federated Learning, Game Theory, Social Psychology, and Explainable AI as Future Directions

98Citations
N/AReaders
Get full text

Machine Learning and Deep Learning Methods for Intrusion Detection Systems in IoMT: A survey

66Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Kamaldeep, Dutta, M., & Granjal, J. (2020). Towards a Secure Internet of Things: A Comprehensive Study of Second Line Defense Mechanisms. IEEE Access, 8, 127272–127312. https://doi.org/10.1109/ACCESS.2020.3005643

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 32

70%

Lecturer / Post doc 8

17%

Researcher 4

9%

Professor / Associate Prof. 2

4%

Readers' Discipline

Tooltip

Computer Science 29

58%

Engineering 15

30%

Business, Management and Accounting 4

8%

Sports and Recreations 2

4%

Save time finding and organizing research with Mendeley

Sign up for free