2017
DOI: 10.1007/s10586-017-1105-z
|View full text |Cite
|
Sign up to set email alerts
|

A distributed IDS architecture model for Smart Home systems

Abstract: The common use of smart devices encourages potential attackers to violate privacy. Sometimes taking control of one device allows the attacker to obtain secret data (such as password for home WiFi network) or tools to carry out DoS attack, and this, despite the limited resources of such devices. One of the solutions for gaining users' confidence is to assign responsibility for detecting attacks to the service provider, particularly Internet Service Provider (ISP). It is possible, since ISP often provides also t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 45 publications
(30 citation statements)
references
References 22 publications
0
21
0
Order By: Relevance
“…Implementation of security solutions is particularly difficult in smart home applications due to the considerably limited computing power of nodes, as well as the fact that most HAN networks are heterogonous [50]. That is why in many implementations of HAN networks there are a very large number of errors that allow to carry out the attacks mentioned in previous chapter.…”
Section: Counteractionmentioning
confidence: 99%
“…Implementation of security solutions is particularly difficult in smart home applications due to the considerably limited computing power of nodes, as well as the fact that most HAN networks are heterogonous [50]. That is why in many implementations of HAN networks there are a very large number of errors that allow to carry out the attacks mentioned in previous chapter.…”
Section: Counteractionmentioning
confidence: 99%
“…Common network security mechanisms such as virtual private networks (VPNs) should be implemented for providing an encrypted link to the ISP. A distributed intrusion detection system (IDS) for IoT networks has to be deployed [ 61 ]. Furthermore, traffic collection and monitoring using commodity hardware and software can be deployed to build an early-warning system for detecting any abnormal behavior in the network traffic [ 33 , 34 ].…”
Section: Resultsmentioning
confidence: 99%
“…The second approach is where the sensor nodes detect intrusions alongside their normal operations. This approach involves the process of continuous self and neighbor inspection, and is discussed in [72], [84], [93], [127], [131], [137], [145]- [147]. In [135], the network is composed of an hierarchical structure, where the nodes are classified as free, leader, and member or associated nodes.…”
Section: ) On the Basis Of Placement Methodologymentioning
confidence: 99%
“…The advantage of this scheme is that to implement it, expensive equipment or technical knowledge is not required. • Hybrid -We find various works [46], [138]- [145] combining the signature and anomaly-based detection approaches, with the aim of reducing the memory overhead required to store signatures, together with the computational overhead required by anomaly-based techniques. To enhance accuracy, the final verification and decision on anomaly is taken manually.…”
Section: ) On the Basis Of Detection Techniquementioning
confidence: 99%