A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT
AI-generated Key Points
⚠The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.
- The Internet of Things (IoT) is a disruptive technology with applications in various domains
- Attacks on IoT infrastructures have increased, highlighting the need for effective protection mechanisms like intrusion detection
- Intrusion detection systems for IoT and Internet of Vehicles (IoV) have unique challenges due to limited battery power, bandwidth constraints, processor overheads, and network dynamics
- A comprehensive study was conducted on existing intrusion detection systems for IoT and IoV, analyzing them from perspectives of computational overhead, energy consumption, and privacy implications
- Open challenges were identified in designing an effective and collaborative intrusion detection system for resource-constrained IoT systems and their applications like IoV
- The efforts made in this study aim to provide insights into state-of-the-art intrusion detection techniques for IoT while highlighting specific challenges that require further attention
- Authors of the review paper are Junaid Arshad, Muhammad Ajmal Azad, Khaled Salah, Wei Jie Razi Iqbal, and Mamoun Alazab.
Authors: Junaid Arshad, Muhammad Ajmal Azad, Khaled Salah, Wei Jie, Razi Iqbal, Mamoun Alazab
Abstract: Internet of Things (IoT) is a disruptive technology with applications across diverse domains such as transportation and logistics systems, smart grids, smart homes, connected vehicles, and smart cities. Alongside the growth of these infrastructures, the volume and variety of attacks on these infrastructures has increased highlighting the significance of distinct protection mechanisms. Intrusion detection is one of the distinguished protection mechanisms with notable recent efforts made to establish effective intrusion detection for IoT and IoV. However, unique characteristics of such infrastructures including battery power, bandwidth and processors overheads, and the network dynamics can influence the operation of an intrusion detection system. This paper presents a comprehensive study of existing intrusion detection systems for IoT systems including emerging systems such as Internet of Vehicles (IoV). The paper analyzes existing systems in three aspects: computational overhead, energy consumption and privacy implications. Based on a rigorous analysis of the existing intrusion detection approaches, the paper also identifies open challenges for an effective and collaborative design of intrusion detection system for resource-constrained IoT system in general and its applications such as IoV. These efforts are envisaged to highlight state of the art with respect to intrusion detection for IoT and open challenges requiring specific efforts to achieve efficient intrusion detection within these systems.
Ask questions about this paper to our AI assistant
You can also chat with multiple papers at once here.
⚠The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.
Assess the quality of the AI-generated content by voting
Score: 0
Why do we need votes?
Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.
The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.
⚠The license of this specific paper does not allow us to build upon its content and the summarizing tools will be run using the paper metadata rather than the full article. However, it still does a good job, and you can also try our tools on papers with more open licenses.
Similar papers summarized with our AI tools
Navigate through even more similar papers through a
tree representationLook for similar papers (in beta version)
By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.
Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.