Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Security intrusion monitoring model for Internet of Things (IoT) using sniffing tools on wireless sensor networks

View through CrossRef
The Internet of Things (IoT) has revolutionized the way devices interact and share data over wireless sensor networks (WSN), enabling seamless connectivity and automation. However, the proliferation of IoT devices has raised serious security and privacy risks concerns due to their inherent vulnerabilities. This paper proposes a model for security intrusion monitoring by analyzing the existing literature and providing insights into the design, implementation, and effective deployment of the proposed model to detect intrusion in IoT using sniffing tools for network traffic analysis in real-time within WSN. The model passively monitors network traffic and identifies anomalous patterns, unauthorized access attempts, and abnormal device behavior. The review findings highlight the significance of the proposed model in enhancing the security of IoT systems. By detecting anomalous behavior and potential security breaches. The model enables timely response and mitigation actions to ensure the confidentiality, integrity and availability (CIA) of IoT devices data. The model includes consideration of network architecture, deployment of intrusion detection algorithms, and establishment of response mechanisms. It identifies various types of security threats, such as unauthorized access attempts, Denial-of-service, Distributed DoS, Brute-force, Heartbleed, Botnet, Inside Infiltration and device tampering, thereby providing response mechanisms that include generating alerts, isolating compromised devices, or blocking suspicious network traffic. The model incorporates a feedback loop to continuously update the detection mechanisms and adapt to evolving security threats in real-time. Series of experiments and simulations to be conducted using various IoT devices and network scenarios to evaluate model effectiveness. The model to comprise of wireless Router, MatLab for Deep Neural Network (DNN) training, Raspberry Pi, Wireshark setup and an array of Internet of Things (IoT) devices. The researcher to use dataset by extracting intrinsic, host-based and time-based attributes from Wireshark Sniffing tool. The datasets generated shall be piped by tshark to an output text file saved as a csv. Under-sampling technique to be used to address class imbalance of datasets. The model shall then be trained using the dataset to be able to detect intrusion in IoTs. The results is expected to demonstrate the model's ability to detect a wide range of security intrusions with high accuracy and minimal false positives. In conclusion, the model offers a proactive approach to safeguard IoT deployment. By leveraging sniffing tools and advanced analysis techniques, the model enhances the detection and response capabilities, enabling efficient protection against emerging threats in IoT. However, challenges associated with the model are identified, including the complexity of network monitoring and potential privacy concerns.
Title: Security intrusion monitoring model for Internet of Things (IoT) using sniffing tools on wireless sensor networks
Description:
The Internet of Things (IoT) has revolutionized the way devices interact and share data over wireless sensor networks (WSN), enabling seamless connectivity and automation.
However, the proliferation of IoT devices has raised serious security and privacy risks concerns due to their inherent vulnerabilities.
This paper proposes a model for security intrusion monitoring by analyzing the existing literature and providing insights into the design, implementation, and effective deployment of the proposed model to detect intrusion in IoT using sniffing tools for network traffic analysis in real-time within WSN.
The model passively monitors network traffic and identifies anomalous patterns, unauthorized access attempts, and abnormal device behavior.
The review findings highlight the significance of the proposed model in enhancing the security of IoT systems.
By detecting anomalous behavior and potential security breaches.
The model enables timely response and mitigation actions to ensure the confidentiality, integrity and availability (CIA) of IoT devices data.
The model includes consideration of network architecture, deployment of intrusion detection algorithms, and establishment of response mechanisms.
It identifies various types of security threats, such as unauthorized access attempts, Denial-of-service, Distributed DoS, Brute-force, Heartbleed, Botnet, Inside Infiltration and device tampering, thereby providing response mechanisms that include generating alerts, isolating compromised devices, or blocking suspicious network traffic.
The model incorporates a feedback loop to continuously update the detection mechanisms and adapt to evolving security threats in real-time.
Series of experiments and simulations to be conducted using various IoT devices and network scenarios to evaluate model effectiveness.
The model to comprise of wireless Router, MatLab for Deep Neural Network (DNN) training, Raspberry Pi, Wireshark setup and an array of Internet of Things (IoT) devices.
The researcher to use dataset by extracting intrinsic, host-based and time-based attributes from Wireshark Sniffing tool.
The datasets generated shall be piped by tshark to an output text file saved as a csv.
Under-sampling technique to be used to address class imbalance of datasets.
The model shall then be trained using the dataset to be able to detect intrusion in IoTs.
The results is expected to demonstrate the model's ability to detect a wide range of security intrusions with high accuracy and minimal false positives.
In conclusion, the model offers a proactive approach to safeguard IoT deployment.
By leveraging sniffing tools and advanced analysis techniques, the model enhances the detection and response capabilities, enabling efficient protection against emerging threats in IoT.
However, challenges associated with the model are identified, including the complexity of network monitoring and potential privacy concerns.

Related Results

Dynamic stochastic modeling for inertial sensors
Dynamic stochastic modeling for inertial sensors
Es ampliamente conocido que los modelos de error para sensores inerciales tienen dos componentes: El primero es un componente determinista que normalmente es calibrado por el fabri...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Pelatihan Internet of Things (IoT) dalam peningkatan kompetensi siswa multimedia di SMK Perguruan Buddhi
Pelatihan Internet of Things (IoT) dalam peningkatan kompetensi siswa multimedia di SMK Perguruan Buddhi
Pelatihan Internet of Things (IoT) menjadi bagian penting dalam pengembangan kompetensi siswa jurusan multimedia di SMK Perguruan Buddhi. Era digital menuntut adanya pemahaman mend...
A Survey Non-Terrestrial Networks in 6G/ 7G Smart Network for 2035+ and Beyond
A Survey Non-Terrestrial Networks in 6G/ 7G Smart Network for 2035+ and Beyond
3GPP TR 38.821, “Solutions for NR to support non-terrestrial networks (NTN),” Release 16, Jan. 2020. [Online]. Available: https://www.3gpp.org/. P. K. Chowdhury, M. Atiquzzaman, W....
Cross-layer security solution for secure communication of sensorsin Wireless Sensor Networks
Cross-layer security solution for secure communication of sensorsin Wireless Sensor Networks
Safe path-finding is extremely necessary for multihop wireless systems such as Wireless Sensor  Networks. Multihop wireless systems are more  unprotected to safety outbreaks as ass...
Towards the Integration of Blockchain and IoT for Security Challenges in IoT
Towards the Integration of Blockchain and IoT for Security Challenges in IoT
Internet of things (IoT) technology plays a vital role in the current technologies because IoT develops a network by integrating different kinds of objects and sensors to create th...
Routing Security in Wireless Sensor Networks
Routing Security in Wireless Sensor Networks
Since routing is a fundamental operation in all types of networks, ensuring routing security is a necessary requirement to guarantee the success of routing operation. Securing rout...
Design of multi-energy-space-based energy-efficient algorithm in novel software-defined wireless sensor networks
Design of multi-energy-space-based energy-efficient algorithm in novel software-defined wireless sensor networks
Energy efficiency has always been a hot issue in wireless sensor networks. A lot of energy-efficient algorithms have been proposed to reduce energy consumption in traditional wirel...

Back to Top