An Intrusion Detection System for Fog Computing and IoT based Logistic Systems using a Smart Data Approach

Abstract
The Internet of Things (IoT) is widely used in advanced logistic systems. Safety and security of such systems are utmost important to guarantee the quality of their services. However, such systems are vulnerable to cyber-attacks. Development of lightweight anomaly based intrusion detection systems (IDS) is one of the key measures to tackle this problem. In this paper, we present a new distributed and lightweight IDS based on an Artificial Immune System (AIS). The IDS is distributed in a three-layered IoT structure including the cloud, fog and edge layers. In the cloud layer, the IDS clusters primary network traffic and trains its detectors. In the fog layer, we take advantage of a smart data concept to analyze the intrusion alerts. In the edge layer, we deploy our detectors in edge devices. Smart data is a very promising approach for enabling lightweight and efficient intrusion detection, providing a path for detection of silent attacks such as botnet attacks in IoT-based systems.
Main Authors
Format
Articles Research article
Published
2016
Series
Subjects
Publication in research information system
Publisher
Advanced Institute of Convergence IT
Original source
http://www.globalcis.org/jdcta/ppl/JDCTA3775PPL.pdf
The permanent address of the publication
https://urn.fi/URN:NBN:fi:jyu-201701191189Use this for linking
Review status
Peer reviewed
ISSN
1975-9339
Language
English
Published in
International Journal of Digital Content Technology and its Applications
Citation
  • Hosseinpour, F., Vahdani Amoli, P., Plosila, J., Hämäläinen, T., & Tenhunen, H. (2016). An Intrusion Detection System for Fog Computing and IoT based Logistic Systems using a Smart Data Approach. International Journal of Digital Content Technology and its Applications, 10(5), 34-46. http://www.globalcis.org/jdcta/ppl/JDCTA3775PPL.pdf
License
Open Access
Copyright© the Authors & Advanced Institute of Convergence IT, 2016. This is an open access article published by Convergence Information Society.

Share