Article, 2024

Designing energy-aware collaborative intrusion detection in IoT networks

Journal of Information Security and Applications, ISSN 2214-2126, 2214-2134, Volume 81, Page 103713, 10.1016/j.jisa.2024.103713

Contributors

Li, Wenjuan 0000-0003-3745-5669 (Corresponding author) [1] Rosenberg, Philip [2] Glisby, Mads [2] Han, Michael [3]

Affiliations

  1. [1] Education University of Hong Kong
  2. [NORA names: China; Asia, East];
  3. [2] Aalborg University
  4. [NORA names: AAU Aalborg University; University; Denmark; Europe, EU; Nordic; OECD];
  5. [3] KOTO Research Center, Macao SAR, China
  6. [NORA names: China; Asia, East]

Abstract

The Internet of Things (IoT) with its evolution brings many benefits to people’s routine life, while at the same time posing various security challenges, due to the lack of software updates and access control policies. For protection, collaborative/distributed detection networks are one essential security solution, which can enhance the detection capability of a separate detection node by governing a set of eligible detection nodes to share information. However, internal intruders/attacks are the main threat source to the distributed structure including both IoT and CIDNs. In the literature, the CIDNs with challenge-based trust mechanism is found to be secure under many common external threats, but would be ineffective to advanced insider threats. Motivated by this issue, this work considers the factor of energy consumption and develops an enhanced challenge-based CIDN, called EnergyCIDN. The main idea relies on the observation that advanced attacks should consume more energy than a benign node. Under the evaluation on our EnergyCIDN, we conduct a set of experiments and tests in many scenarios, including simulated network, practical IoT network, and medical network. In comparison with the existing similar approaches, our EnergyCIDN showcases better detection capability regarding both common and advanced insider attacks.

Keywords

CIDNs, Internet, IoT, IoT networks, access control policies, advanced attacks, approach, attacks, benefits, benign nodes, capability, challenge-based trust mechanisms, challenges, collaborative intrusion detection, comparison, consumption, control policies, detection, detection capability, detection network, detection nodes, distribution structure, energy, energy consumption, evaluation, evolution, experiments, external threats, factors, factors of energy consumption, information, insider attacks, insider threats, intrusion detection, issues, lack, life, literature, mechanism, medical network, network, nodes, observations, people, people’s routine life, policy, protection, routine life, scenarios, security, security challenges, security solutions, simulated network, software update, solution, source, structure, test, threat, threat sources, time, trust mechanism, update

Data Provider: Digital Science