COLIDE: A collaborative intrusion detection framework for internet of things

Arshad, Junaid, Azad, Muhammad Ajmal, Abdellatif, Mohammad Mahmoud, Rehman, Muhammad Habib Ur and Salah, Khaled (2018) COLIDE: A collaborative intrusion detection framework for internet of things. IET Networks.

[img]
Preview
PDF
final version - submission.pdf - Accepted Version

Download (1MB) | Preview

Abstract

Internet of Things (IoT) represent a network of resource-constrained sensor devices connected through the open Internet which are susceptible to misuse by intruders. Proliferation of IoT across diverse application domains renders their security critical to ensure normal service delivery by such infrastructures. Traditional standalone intrusion detection systems are tasked with monitoring device behaviours to identify malicious activities. These systems not only require extensive network and system
resources but also cause delays in detecting a malicious actor due to unavailability of a comprehensive view of the intruder’s activities. Collaboration among IoT devices enables considering knowledge from a collection of host and network devices to achieve improved detection accuracy in a timely manner. However, collaboration introduces the challenge of energy efficiency and event processing which is particularly significant for resource-constrained devices. In this paper, we present an intrusion detection framework for IoT (COLIDE) that leverages collaboration among resource-constrained sensor devices and border nodes for effective and timely detection of intruders. The paper presents a detailed description of the proposed framework along with its formal description and analysis to assess its effectiveness for a typical IoT system. We implemented the COLIDE framework with Contiki OS and conducted thorough experimentation to evaluate its performance. This evaluation demonstrates efficiency of COLIDE framework
with respect to energy and processing overheads achieving effectiveness within an IoT system.

Item Type: Article
Additional Information: "This paper is a postprint of a paper submitted to and accepted for publication in IET Networks and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at the IET Digital Library"
Subjects: Computing > Information security
Computing
Depositing User: Junaid Arshad
Date Deposited: 11 Sep 2018 11:18
Last Modified: 14 Sep 2018 11:45
URI: http://repository.uwl.ac.uk/id/eprint/5378

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item

Menu