A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT

Junaid Arshad, Muhammad Ajmal Azad, Roohi Amad, Khaled Salah, Mamoun Alazab, Razi Iqbal

    Research output: Contribution to journalArticlepeer-review

    59 Citations (Scopus)
    81 Downloads (Pure)

    Abstract

    Internet of Things (IoT) forms the foundation of next generation infrastructures, enabling development of future cities that are inherently sustainable. Intrusion detection for such paradigms is a non-trivial challenge which has attracted further significance due to extraordinary growth in the volume and variety of security threats for such systems. However, due to unique characteristics of such systems i.e., battery power, bandwidth and processor overheads and network dynamics, intrusion detection for IoT is a challenge, which requires taking into account the trade-off between detection accuracy and performance overheads. In this context, we are focused at highlighting this trade-off and its significance to achieve effective intrusion detection for IoT. Specifically, this paper presents a comprehensive study of existing intrusion detection systems for IoT systems in three aspects: computational overhead, energy consumption and privacy implications. Through extensive study of existing intrusion detection approaches, we have identified open challenges to achieve effective intrusion detection for IoT infrastructures. These include resource constraints, attack complexity, experimentation rigor and unavailability of relevant security data. Further, this paper is envisaged to highlight contributions and limitations of the state-of-the-art within intrusion detection for IoT, and aid the research community to advance it by identifying significant research directions.
    Original languageEnglish
    Article number629
    Pages (from-to)1-24
    Number of pages24
    JournalElectronics
    Volume9
    Issue number4
    DOIs
    Publication statusPublished - Apr 2020

    Fingerprint

    Dive into the research topics of 'A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT'. Together they form a unique fingerprint.

    Cite this