Intrusion Detection System (IDS) in Internet of Things (IoT) Devices for Smart Home

Authors

  • M.D. Shakhawat Shafaet Romeo Asia Pacific University of Technology & Innovation Technology Park Malaysia, Bukit Jalil, Kuala Lumpur. Author
  • Nor Azlina Abd Rahman Asia Pacific University of Technology & Innovation Technology Park Malaysia, Bukit Jalil, Kuala Lumpur. Author
  • Yusnita Yusof Asia Pacific University of Technology & Innovation Technology Park Malaysia, Bukit Jalil, Kuala Lumpur. Author

DOI:

https://doi.org/10.61841/qrkw8085

Keywords:

Internet of Thing (IoT), Intrusion Detection System (IDS), IoT Devices, Smart Home, HIDS, NIDS.

Abstract

 The Internet of Things (IoT) is an emerging technology where smart devices are flawlessly connected to the world using the internet to provide common goals and objectives such as aiding home automation service. Research on the usage of IoT devices being done and based on statistics showed that this technology is demanding nowadays and it shows increasing trends over the years. Influence factors towards IoT usage are also being discussed in terms of available infrastructure such as network connectivity, IoT devices and security technology to protect the environment. Other influence factors such as ease of use, social impact and trust are also being considered. Several Intrusion Detection systems such as Snort, Suricata, Bro and security Onion are being analyzed to identify the best services to be implemented for the proposed system. A survey is taken for the purpose of this research in order to obtain the public’s concern and opinions on IoT security that critically examined with supporting evidences. The outcome of this paper is by proposing a framework of Intrusion Detection System for IoT Devices in Smart Home based on research and survey conducted 

Downloads

Download data is not yet available.

References

[1] Intelligence, M (2018). Mordor Intelligence. Retrieved March 12, 2019,

from https://www.mordorintelligence.com/industry-reports/global-smart-homes-marketindustry?gclid=CIjd6MXjydYCFYYDKgod4ZQFaw

[2] Gartnet, (2019). gartner. Retrieved March 12, 2019, from

https://www.gartner.com/en/newsroom

[3] Richter, F., (2018). Internet of Things to Hit the Mainstream by 2020. Statistica.

[4] Statista, (2018). Statista. Retrieved March 15, 2019, from

https://www.statista.com/statistics/510780/iot-installed-base-asia-pacific/

[5] Heetae Yang, W. L. H. L. (2018). IoT Smart Home Adoption: The Importance of Proper Level Automation.

Journal of Sensors. Doi: https://doi.org/10.1155/2018/6464036

[6] Gao, L. & Ba, X. (2014). A unified perspective on the factors influencingconsumer acceptance ofinternet of

things technology. Asia Pacific Journal of Marketing and Logistics, 26(2), pp. 211-231.

[7] Alolayan, B., 2014. Do I Really Have to Accept Smart Fridges?. The Seventh International Conference on

Advances in Computer-Human Interactions, pp. 186-191.

[8] Al-Momani, A. M., Mahmoud, M. A. & SharifuddinAhmad, M., 2016. Modeling the adoption of internet of

things services: A conceptual framework. International Journal of Applied Research, 2(5), pp. 361-367

[9] Rouse, M. (2018). Snort. Search Midmarket Security.

[10] NetGate, (2019). NetGate Documentations. Retrieved March 15, 2019,

from at: https://docs.netgate.com/pfsense/en/latest/ids-ips/snort-alerts.html

[11] Inliniac (2014). Suricata Flow Logging. Inliniac everything inline.

[12] Cooper, S. (2018). 7 best intrusion prevention systems (IPSs). comparitech

[13] Onion, S. (2019). Security Onion. Retrieved March 20, 2019, from

https://securityonion.net/

[14] Philokypros, I. (2018). A Signature-based Intrusion Detection System. Univeristy of York.

[15] Service, A. S. (2018). A Security Rating Model for the Internet of Things (IoT). Internet of Things.

[16] Peters, M. (2016). IoT Security: Medical Devices Are the Next Target for Hackers. Proactive Cyber Security.

[17] P. Mary Jeyanthi, Santosh Shrivastava Kumar “The Determinant Parameters of Knowledge Transfer among

Academicians in Colleges of Chennai Region”, Theoretical Economics Letters, 2019, 9, 752-760,

[18] P. Mary Jeyanthi, “An Empirical Study of Fraudulent and Bankruptcy in Indian Banking Sectors”, The

Empirical Economics Letters, Vol.18; No. 3, March 2019, ISSN: 1681-8997.

[19] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Hybrid Metaheuristic techniques”, International

Journal of Business Intelligence Research, - Volume 5, Issue 1, April-2014.

[20] P. Mary Jeyanthi, “INDUSTRY 4.O: The combination of the Internet of Things (IoT)and the Internet of People

(IoP)”, Journal of Contemporary Research in Management, Vol.13; No. 4 Oct-Dec, 2018, ISSN: 0973-9785.

[21] P. Mary Jeyanthi, "The transformation of Social media information systems leads to Global business: An

Empirical Survey", International Journal of Technology and Science (IJTS), issue 3, volume 5.

[22] P. Mary Jeyanthi,” An Empirical Study of Fraud Control Techniques using Business Intelligence in Financial

Institutions”, Vivekananda Journal of Researc, Vol. 7, Special Issue 1, May 2018, Page no: 159-164.

[23] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Artificial bear

Optimization Approach”, International Journal of Scientific & Engineering Research, Volume 4,

Issue 8, August-2013.

[24] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Optimization techniques for Decision Making”,

International Journal of Engineering Research and Technology, Volume 2, Issue 8, August-2013.

[25] Mary Jeyanthi, S and Karnan, M.: “A New Implementation of Mathematical Models with metaheuristic

Algorithms for Business Intelligence”, International Journal of Advanced Research in Computer and

Communication Engineering, Volume 3, Issue 3, March-2014.

[26] Dr. Mary Jeyanthi: “Partial Image Retrieval Systems in Luminance and Color Invariants: An Empirical Study”,

International Journal of Web Technology (ISSN: 2278-2389) – Volume-4, Issue-2.

[27] Dr. Mary Jeyanthi: “CipherText Policy attribute-based Encryption for Patients Health Information in Cloud

Platform”, Journal of Information Science and Engineering (ISSN: 1016-2364)

[28] Mary Jeyanthi, P, Adarsh Sharma, Purva Verma: “Sustainability of the business and employment generation in

the field of UPVC widows” (ICSMS2019).

[29] Mary Jeyanthi, P: “An Empirical Survey of Sustainability in Social Media and Information Systems across

emerging countries”, International Conference on Sustainability Management and Strategy” (ICSMS2018).

[30] Mary Jeyanthi, P: “Agile Analytics in Business Decision Making: An Empirical Study”, International

Conference on Business Management and Information Systems” (ICBMIS2015).

[31] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence – soft computing Techniques”, International

Conference on Mathematics in Engineering & Business Management (ICMEB 2012).

[32] Mary Jeyanthi, S and Karnan, M.: “A Comparative Study of Genetic algorithm and Artificial Bear

Optimization algorithm in Business Intelligence”, International Conference on Mathematics in Engineering &

Business Management (ICMEB 2012).

[33] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Data Mining and Optimization for Decision Making

”, 2011 IEEE International Conference on Computational Intelligence and Computing Research (2011 IEEE

ICCIC).

[34] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Data Mining and Decision making to overcome the

Financial Risk”, 2011 IEEE International Conference on Computational Intelligence and Computing Research

(2011 IEEE ICCIC).

[35] Dr. Mary Jeyanthi, S: “Pervasive Computing in Business Intelligence”, State level seminar on Computing and

Communication Technologies. (SCCT-2015)

[36] Dr.P.Mary Jeyanthi, “Artificial Bear Optimization (ABO) – A new approach of Metaheuristic algorithm for

Business Intelligence”, ISBN no: 978-93-87862-65-4, Bonfring Publication. Issue Date: 01-Apr-2019

[37] Dr.P.Mary Jeyanthi , “Customer Value Management (CVM) – Thinking Inside the box” – ISBN : 978-93-

87862-94-4, Bonfring Publication, Issue Date: 16-Oct-2019.

[38] Jeyanthi, P. M., & Shrivastava, S. K. (2019). The Determinant Parameters of Knowledge Transfer among

Academicians in Colleges of Chennai Region. Theoretical Economics Letters, 9(4), 752-760

Downloads

Published

31.10.2019

How to Cite

Shakhawat Shafaet Romeo, M., Abd Rahman, N. A., & Yusof, Y. (2019). Intrusion Detection System (IDS) in Internet of Things (IoT) Devices for Smart Home. International Journal of Psychosocial Rehabilitation, 23(4), 1217-1227. https://doi.org/10.61841/qrkw8085