Abstract
1- Introduction
2- Related work
3- Backgrounds
4- Systematic literature review
5- Intrusion detection systems
6- Discussion
7- Open issues and future trends
8- Limitation
9- Summary and conclusion
References
Abstract
Recently, a new dimension of intelligent objects has been provided by reducing the power consumption of electrical appliances. Daily physical objects have been upgraded by electronic devices over the Internet to create local intelligence and make communication with cyberspace. Internet of things (IoT) as a new term in this domain is used for realizing these intelligent objects. Since the objects in the IoT are directly connected to the unsafe Internet, the resource constraint devices are easily accessible by the attacker. Such public access to the Internet causes things to become vulnerable to the intrusions. The purpose is to categorize the attacks that do not explicitly damage the network, but by infecting the internal nodes, they are ready to carry out the attacks on the network, which are named as internal attacks. Therefore, the significance of Intrusion Detection Systems (IDSs) in the IoT is undeniable. However, despite the importance of this topic, there is not any comprehensive and systematic review about discussing and analyzing its significant mechanisms. Therefore, in the current paper, a Systematic Literature Review (SLR) of the IDSs in the IoT environment has been presented. Then detailed categorizations of the IDSs in the IoT (anomaly-based, signature-based, specification-based, and hybrid), (centralized, distributed, hybrid), (simulation, theoretical), (denial of service attack, Sybil attack, replay attack, selective forwarding attack, wormhole attack, black hole attack, sinkhole attack, jamming attack, false data attack) have also been provided using common features. Then the advantages and disadvantages of the selected mechanisms are discussed. Finally, the examination of the open issues and directions for future trends are also provided.
Introduction
Connectivity of physical things to the Internet makes it possible to control and manage them from a distance [1]. These devices sense and record client activities, forecast their future actions and give him/her the useful services [2]. It is anticipated that, in the next decade, the Internet will be a seamless fabrication of common networks and related objects [3]. The IoT [4] as a new term in data and information age was originally introduced by the MIT Auto-ID Center in 1998 [5]. It represents a vision where objects are exclusively identified and available over the Internet [4,6,7]. Also, the real world can be more available through personal computers and networked devices over the IoT and Internet [8,9]. US National Intelligence Council (NIC) believes that IoT has a potential effect on US national power. So, they have decided to put it on the list of six disruptive civil technologies [10,11].