Open Access iconOpen Access

ARTICLE

crossmark

Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks

Vasaki Ponnusamy1,*, Mamoona Humayun2, N. Z. Jhanjhi3, Aun Yichiet1, Maram Fahhad Almufareh2

1 Faculty of Information and Communication Technology, Universiti Tunku Abdul Rahman, Kampar, Malaysia
2 Department of Information Systems, College of Computer and Information Sciences, Jouf University, Al-Jouf, Saudi Arabia
3 School of Computer Science and Engineering (SCE), Taylor’s University, Selangor, Malaysia

* Corresponding Author: Vasaki Ponnusamy. Email: email

Computer Systems Science and Engineering 2022, 40(3), 1199-1215. https://doi.org/10.32604/csse.2022.018518

Abstract

Internet of Things (IoT) devices work mainly in wireless mediums; requiring different Intrusion Detection System (IDS) kind of solutions to leverage 802.11 header information for intrusion detection. Wireless-specific traffic features with high information gain are primarily found in data link layers rather than application layers in wired networks. This survey investigates some of the complexities and challenges in deploying wireless IDS in terms of data collection methods, IDS techniques, IDS placement strategies, and traffic data analysis techniques. This paper’s main finding highlights the lack of available network traces for training modern machine-learning models against IoT specific intrusions. Specifically, the Knowledge Discovery in Databases (KDD) Cup dataset is reviewed to highlight the design challenges of wireless intrusion detection based on current data attributes and proposed several guidelines to future-proof following traffic capture methods in the wireless network (WN). The paper starts with a review of various intrusion detection techniques, data collection methods and placement methods. The main goal of this paper is to study the design challenges of deploying intrusion detection system in a wireless environment. Intrusion detection system deployment in a wireless environment is not as straightforward as in the wired network environment due to the architectural complexities. So this paper reviews the traditional wired intrusion detection deployment methods and discusses how these techniques could be adopted into the wireless environment and also highlights the design challenges in the wireless environment. The main wireless environments to look into would be Wireless Sensor Networks (WSN), Mobile Ad Hoc Networks (MANET) and IoT as this are the future trends and a lot of attacks have been targeted into these networks. So it is very crucial to design an IDS specifically to target on the wireless networks.

Keywords


Cite This Article

V. Ponnusamy, M. Humayun, N. Z. Jhanjhi, A. Yichiet and M. Fahhad Almufareh, "Intrusion detection systems in internet of things and mobile ad-hoc networks," Computer Systems Science and Engineering, vol. 40, no.3, pp. 1199–1215, 2022. https://doi.org/10.32604/csse.2022.018518

Citations




cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1961

    View

  • 1095

    Download

  • 1

    Like

Share Link