Exploring Intrusion Detection Systems (IDS) in IoT Environments

Authors

  • Amit Kumar Dinkar Department of Computer Science, Veer Kunwar Singh University, Ara- 802301, India Author
  • Ajay Kumar Choudhary Department of Physics, G. B. College, Ramgarh Author

DOI:

https://doi.org/10.56294/mw2024552

Keywords:

IoT, Intrusion Detection System, Cybercrime

Abstract

Introduction; The Internet of Things (IoT) has revolutionized numerous sectors, such as home automation, healthcare, and industrial operations, by enabling interconnected devices to facilitate automation, real-time data analysis, and intelligent decision-making. Despite its transformative potential, the rapid proliferation of IoT has introduced critical cybersecurity challenges due to the heterogeneous and fragmented nature of IoT environments. 
Objective; IoT networks consist of diverse devices with varying capabilities and protocols, making the implementation of standardized security measures complex. 
Method; Traditional approaches, including encryption, authentication, and access control, often fall short in addressing evolving cyber threats. Intrusion Detection Systems (IDS) tailored to IoT offer a promising solution, enabling real-time monitoring, anomaly detection, and attack prevention. 
Result: However, the resource constraints of IoT devices and diverse architectures pose significant design challenges for IDS. Future advancements should focus on lightweight, adaptive IDS models leveraging machine learning, artificial intelligence, and blockchain technologies to enhance security frameworks. Collaboration among researchers, industry, and policymakers is essential to develop scalable solutions, ensuring IoT ecosystems remain secure and efficient in combating cyber threats. 
Conclusions; This paper reviews IoT security fundamentals, evaluates IDS solutions, and highlights key challenges, offering directions for future research to improve IoT cybersecurity through innovative strategies.

References

1. Vaigandla K, Azmi N, Karne R. Investigation on intrusion detection systems (IDSs) in IoT. Int J Emerg Trends Eng Res. 2022;10(3).

2. Md Alimul Haque, Shameemul Haque KK and NKS. Digital Transformation and Challenges to Data Security and Privacy [Internet]. Anunciação PF, Pessoa CRM, Jamil GL, editors. Digital Transformation and Challenges to Data Security and Privacy. IGI Global; 2021. (Advances in Information Security, Privacy, and Ethics). Available from: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-4201-9

3. Almrezeq N, Haque MA, Haque S, El-Aziz AAA. Device Access Control and Key Exchange (DACK) Protocol for Internet of Things. Int J Cloud Appl Comput [Internet]. 2022 Jan;12(1):1–14. Available from: https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJCAC.297103

4. Hossain MA, Haque MA, Ahmad S, Abdeljaber HAM, Eljialy AEM, Alanazi A, et al. AI-enabled approach for enhancing obfuscated malware detection: a hybrid ensemble learning with combined feature selection techniques. Int J Syst Assur Eng Manag [Internet]. 2024; Available from: https://doi.org/10.1007/s13198-024-02294-y

5. Rahman MM, Shakil S Al, Mustakim MR. A survey on intrusion detection system in IoT networks. Cyber Secur Appl [Internet]. 2025;3:100082. Available from: https://www.sciencedirect.com/science/article/pii/S2772918424000481

6. Elrawy MF, Awad AI, Hamed HFA. Intrusion detection systems for IoT-based smart environments: a survey. J Cloud Comput. 2018;7(1):1–20.

7. Al-Hawawreh M, Moustafa N, Garg S, Hossain MS. Deep learning-enabled threat intelligence scheme in the internet of things networks. IEEE Trans Netw Sci Eng. 2020;8(4):2968–81.

8. Sahu AK, Sharma S, Tanveer M, Raja R. Internet of Things attack detection using hybrid Deep Learning Model. Comput Commun. 2021;176:146–54.

9. Li F, Shinde A, Shi Y, Ye J, Li XY, Song W. System statistics learning-based IoT security: Feasibility and suitability. IEEE Internet Things J. 2019;6(4):6396–403.

10. Sahu NK, Mukherjee I. Machine learning based anomaly detection for IoT network:(Anomaly detection in IoT network). In: 2020 4th international conference on trends in electronics and informatics (ICOEI)(48184). IEEE; 2020. p. 787–94.

11. Agrawal S, Sarkar S, Aouedi O, Yenduri G, Piamrat K, Alazab M, et al. Federated learning for intrusion detection system: Concepts, challenges and future directions. Comput Commun. 2022;195:346–61.

12. Kaur S, Singh M. Hybrid intrusion detection and signature generation using deep recurrent neural networks. Neural Comput Appl. 2020;32(12):7859–77.

13. Ahmad W, Rasool A, Javed AR, Baker T, Jalil Z. Cyber security in iot-based cloud computing: A comprehensive survey. Electronics. 2021;11(1):16.

14. Gill KS, Saxena S, Sharma A. Gta-ids: game theoretic approach to enhance ids detection in cloud environment. Comput Informatics. 2022;41(3):665–88.

15. Kocher G, Kumar G. Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges. Soft Comput. 2021;25(15):9731–63.

16. Zhang Y, Zhang X, Sun J, Lin H, Huang Y, Lv D, et al. Fault-tolerant quantum algorithms for quantum molecular systems: A survey. arXiv Prepr arXiv250202139. 2025;

17. Haque S, Zeba S, Alimul Haque M, Kumar K, Ali Basha MP. An IoT model for securing examinations from malpractices. Mater Today Proc. 2021 Apr;

18. Santos L, Rabadao C, Gonçalves R. Intrusion detection systems in Internet of Things: A literature review. In: 2018 13th Iberian conference on information systems and technologies (CISTI). IEEE; 2018. p. 1–7.

19. Md. Alimul Haque, Anil Kumar Sinha MUB and NKS. Comparative study on Wireless threats and their Classification. In 2017. Available from: http://bvicam.in/INDIACom/news/INDIACom 2017 Proceedings/Main/papers/2511.pdf

20. iot intrusion [Internet]. Available from: https://www.kaggle.com/datasets/subhajournal/iotintrusion.

Downloads

Published

2024-12-30

How to Cite

1.
Dinkar AK, Choudhary AK. Exploring Intrusion Detection Systems (IDS) in IoT Environments. Seminars in Medical Writing and Education [Internet]. 2024 Dec. 30 [cited 2025 Jul. 5];3:552. Available from: https://mw.ageditor.ar/index.php/mw/article/view/552