13Intrusion Detection Systems for IoT

Hyunwoo Lee, Anand Mudgerikar, Ninghui Li, and Elisa Bertino

Department of Computer Science, Purdue University, West Lafayette, IN, USA

Abstract

This chapter focuses on techniques to detect attacks on IoT devices. The chapter first motivates the use of intrusion detection systems (IDS) for IoT environments and in which aspects IDS for IoT differ from IDS for conventional computer systems. Then the chapter covers the design dimensions for IDS for IoT and approaches/systems that have been proposed, especially focusing on their research challenges. Finally, the chapter discusses research directions in the design, deployment, and management of IDS with concluding remarks.

13.1 Introduction

The internet of things (IoT) are the network of physical objects or “things” including embedding electronics, software, and network communication capabilities, which enable these objects to collect and exchange data. IoT also allows objects to be controlled remotely across network infrastructures, creating opportunities for direct integration between the physical world and computer‐based systems.

However, IoT devices raise security concerns as they are at higher risk than conventional computer systems [1]. Managing the security of IoT networks can be challenging as some of those networks may contain thousands of IoT devices. As an example, it is difficult to patch such a large number of devices to remove vulnerabilities [2, 3]. Furthermore, some IoT devices ...

Get IoT for Defense and National Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.