V.CONCLUSIONS AND FUTURE TRENDS
A. Conclusions
With affordable and easily constructed programmable embedded devices, DIYs and a spirit of young entrepreneurs paradigm is being promoted outside of the corporate and industrial realms. These distinctive changes are definitive of the IoT computing era. With a wide variety of architectures ranging from undocumented ad hoc embedded devices to very structured ones adhering to the standards, the IoT is burdened with additional security issues. For this reason, a ubiquitous IDS joined at time of network access, interacting with each service layer, will gain importance as an everincreasing number of less visible but Internet accessible applications are created.
B. Future Work
Within the last five years, the concept of a holistic architecture for IDS in the IoT has begun to be explored. Still in its infancy, this trend will grow and continued evaluation of IDS implementation at each service layer as well as benchmarks between systems will be important to the safety of the machines and their owners. Moreover, the prevention of unauthorized access to the IoT will depend on the intrusion detection capability of the most vulnerable components which are the embedded devices constrained by limited computational capacity and power – a long standing open problem for WSNs. Another issue is that the DIY user group is not trained in security. For example, the default userid and password of a Raspberry Pi microcontroller; Raspberry, Pi respectively is used. Also, rebooting microcontrollers for software updates is less frequent because it interrupts data collection of the monitored physical phenomena. For this reason, education and policy will also need to be established as part of the effort towards end to end IoT intrusion detection.