A ZigBee Intrusion Detection System for IoT using Secure and Efficient Data Collection

The market for Internet of Things (IoT) products and services has grown rapidly. It has been predicted that the deployment of these IoT applications will grow exponentially in the near future. However, the rapid growth of the IoT brings new security risks and potentially opens systems and networks t...

Full description

Saved in:
Bibliographic Details
Published in:Internet of things (Amsterdam. Online) Vol. 12; p. 100306
Main Authors: Sadikin, Fal, Deursen, Ton van, Kumar, Sandeep
Format: Journal Article
Language:English
Published: Elsevier B.V 01.12.2020
Subjects:
ISSN:2542-6605, 2542-6605
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The market for Internet of Things (IoT) products and services has grown rapidly. It has been predicted that the deployment of these IoT applications will grow exponentially in the near future. However, the rapid growth of the IoT brings new security risks and potentially opens systems and networks to new attacks. This paper outlines various techniques to detect known attacks and new types of attacks particularly on ZigBee-based IoT systems. We introduce a novel hybrid Intrusion Detection System (IDS) by merging rule-based intrusion detection and machine learning-based anomaly detection. The rule-based attack detection technique is used to provide an accurate detection method for known attacks. However, specifying accurate and precise detection rules require significant human effort. It is tedious and error prone and may lead to false alarms if done incorrectly. Hence, to mitigate this potential problem, the system is enhanced by combining it with machine learning-based anomaly detection. This paper discusses our IDS implementation that covers various types of detection techniques both to detect known attacks, as well as potential new types of attack in ZigBee-based IoT systems. Furthermore, this paper introduces a secure and efficient method for large-scale IDS data collection. Thus, it provides a trusted reporting mechanism that can operate under the strict resource requirements imposed by current IoT systems.
ISSN:2542-6605
2542-6605
DOI:10.1016/j.iot.2020.100306