05 - Chapter 1
05 - Chapter 1
CHAPTER 1
INTRODUCTION
1.1 OVERVIEW
The Internet of Things (IoT) breaks down the barrier between the
digital and physical world. Despite this, its inevitable expansion in the global
5
The right IDS can protect data from illegal access, alteration, and
distribution. Clients should be informed when their software and technologies
are about to expire and they need to be updated, so they are aware of the need
to secure IoT devices and systems. Periodic password resets may be used to
prevent users from using the same password for a long period of time.
The system will be safe from physical and encryption attacks if only critical
functions can be accessed remotely. Intrusion Detection System (IDS)
appliances are used for IoT network monitoring and defense against
intruders/attackers as represented in Figure 1.3.
regression and decision tree algorithms may be used to identify attack and
non-attack data.
In the case of Hassan et al. (2020), the assault was detected using a
Multilayer Perceptron (MLP) type of Artificial Neural Network (ANN).
Many layers of perceptrons (with activation thresholds) are often referred to
as MLPs, however the word is used ambiguously to describe any feed-
forward ANN with multiple layers of perceptron’s (particularly in a single
hidden layer). Linear activation and non-linear activation may be
distinguished in MLP. Non-linear data that can be accurately characterized
but that cannot be separated.
predicting is the most popular and efficient method. In a decision tree, each
internal node, branch, and leaf node shows a test result for an attribute, along
with a class mark (the terminal nodes). By sorting the tree from the root to
any leaf node, decision trees may classify an instance.
people do not believe that their connected devices such as smart TVs and
phones and other home appliances with their information are reasonably
secure from misuse or harm the resulting erosion of trust will cause reluctance
to accept IoT globally. As a result of the interconnected nature of IoT devices
and the inherent distributed and heterogeneous nature of IoT objects, a
security breach could occur due to interception, eavesdropping, and the
modification of confidential information by malicious individuals who gain
access to the interconnected IoT devices. Most of study outlines a security
model based on a cryptographic strategy for dealing with the problem of data
confidentiality loss in the Internet of Things. Confidential information and
data is protected from hackers by using the skill of encrypting it. However,
cryptography is the science of creating ciphers to encode communications and
information in such a manner that only the intended recipients can decode and
understand it. All IoT devices are referred to as sensors because they collect
data from their surroundings and communicate it to a central server at home.
The aforementioned security model may be broken down into the two
sections listed below; IoT devices have inherent hardware constraints, such as
limited memory, battery power restrictions, and low computational abilities,
and thus are inefficient to process computationally intensive and complex
encryption algorithms during the data transmission phase between the sensor
node and the authentication/home server.
textual format (ciphers) may entice wrong doers to decode it, if they have
adequate time or processing power. This is the reason for this
recommendation. The inability of cryptography to hide private data from
malevolent users or attackers is so abundantly clear. To ensure safe and
secure data transport in the IoT, an attack detection mechanism may be added
to the cryptography technology.
use of resources like water and electricity, as well as waste disposal, all rely
on IoT and associated cyber-physical systems for long-term sustainability.
Sophisticated cyberattacks need more powerful security measures than those
already in place. In addition, the attackers are well-versed in current security
measures and are always looking for new methods to hack the target.
Zdn et al. (2017) reported that numerous electrical items still work
with out of date firmware. Risks associated with the deployment of these
devices cause the attacker to discover a wide range of attack surfaces, attacks
and vulnerabilities. Hackers are always seeking new methods to get into and
abuse electronics in today's modern world. Using drones in recent assaults
poses a serious concern since they are able to avoid physical restrictions and
enter the target's area undetected to carry out an attack with great accuracy.
1.8 MOTIVATION
smart environments, and further study into IoT information security is needed
to solve these challenges.
Smart Cities are a primary focus of the research work, which aims
to identify intrusions on Internet of Things (IoT) devices quickly.
Accordingly, studies focusing on the development of an intrusion detection
system based on techniques such as the Crow Search Optimization and Deep
Learning Modified Neural Network (DLMNN) are encouraged in order to
uncover new attack types in SCs and pave the way for future research into
attack types that may be possible in SCs. Finally, both CSO-MANFIS
and DLMNN use IRSA and KH-AES to securely communicate their data.
Precision improves as a consequence, resulting in increased system
efficiency.
1.9 OBJECTIVE
The goal of this study is to increase the rate of security and attack
detection as soon as possible. The primary challenges in the existing
techniques are the accuracy of the attack detection rate and security. To
address these shortcomings, this research work presents an Intrusion
Detection System (IDS) for detecting IoT assault in a city based on the
DLMNN classification. The sensor values from a smart city are first delivered
to the IDS system (training phase), which is then used to test the values. After
that, the preprocessing step is completed, followed by feature selection using
the Entropy-HOA approach.
16
Chapter 6 summarizes the work and also suggests the scope for
further work that could be carried out in the continuation of this research.