Skip to main content
Erschienen in: Wireless Personal Communications 3/2020

19.05.2020

Isolation of DDoS Attack in IoT: A New Perspective

verfasst von: Upendra Kumar, Shreyshi Navaneet, Neeraj Kumar, Subhash Chandra Pandey

Erschienen in: Wireless Personal Communications | Ausgabe 3/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of Things (IoT) involves all the surrounding with smart devices to Internet and has been gaining more recognition because it provides substantial benefits in comparison to other systems. Further, due to the decentralized nature of IoT network many types of active and passive attacks are possible. The distributed denial of service is the active type of attack which reduces network performance. In this research work, technique of mutual authentication is designed which detects and isolates malicious nodes from the network and thus improves session resumption technique for minimizing execution time. The proposed technique has been implemented and also compared with existing technique in terms of certain parameters. These parameters are bandwidth consumption, routing overhead, and packet delivery ratio. The performance of proposed technique is evaluated in NS2 and results shows that proposed algorithm performs well in comparison to existing results.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Al-Shammari, B. K. J., Al-Aboody, N., & Al-Raweshidy, H. S. (2018). IoT traffic management and integration in the QoS supported network. IEEE Internet of Things Journal, 5(1), 352–370.CrossRef Al-Shammari, B. K. J., Al-Aboody, N., & Al-Raweshidy, H. S. (2018). IoT traffic management and integration in the QoS supported network. IEEE Internet of Things Journal, 5(1), 352–370.CrossRef
2.
Zurück zum Zitat Zanella, A., Bui, N., Castellani, A., Vangelista, L., & Zorzi, M. (2014). Internet of things for smart cities. IEEE Internet of Things Journal, 1(1), 30–34.CrossRef Zanella, A., Bui, N., Castellani, A., Vangelista, L., & Zorzi, M. (2014). Internet of things for smart cities. IEEE Internet of Things Journal, 1(1), 30–34.CrossRef
3.
Zurück zum Zitat Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions on Industrial Informatics, 10(4), 2233–2243.CrossRef Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions on Industrial Informatics, 10(4), 2233–2243.CrossRef
4.
Zurück zum Zitat Rose, K., Eldridge, S., & Chapin, L. (2015). The Internet of things: An overview. The Internet Society (ISOC), 80, 1–50. Rose, K., Eldridge, S., & Chapin, L. (2015). The Internet of things: An overview. The Internet Society (ISOC), 80, 1–50.
5.
Zurück zum Zitat Rajagopalan, A., Jagga, M., Kumari, A., & Ali, S. T. (2017). A DDoS prevention scheme for session resumption SEA architecture in healthcare IoT. In 3rd IEEE international conference on computational intelligence and communication technology (IEEE-CICT) (Vol. 6, pp. 1–5). Rajagopalan, A., Jagga, M., Kumari, A., & Ali, S. T. (2017). A DDoS prevention scheme for session resumption SEA architecture in healthcare IoT. In 3rd IEEE international conference on computational intelligence and communication technology (IEEE-CICT) (Vol. 6, pp. 1–5).
6.
Zurück zum Zitat Restruccia, F., Salvatorc, D., & Melodia, T. (2018). Security the Internet of things, new perspective and Research challenges. IEEE Internet of Things Journal, 1(1), 1–16.CrossRef Restruccia, F., Salvatorc, D., & Melodia, T. (2018). Security the Internet of things, new perspective and Research challenges. IEEE Internet of Things Journal, 1(1), 1–16.CrossRef
7.
Zurück zum Zitat Deogirikar, J., & Vidhate, A. (2017). Security attacks in IoT. In A survey international conference on I-SMAC (IoT in social, mobile, analytics and cloud) (Vol. 4, pp. 3–6). Deogirikar, J., & Vidhate, A. (2017). Security attacks in IoT. In A survey international conference on I-SMAC (IoT in social, mobile, analytics and cloud) (Vol. 4, pp. 3–6).
8.
Zurück zum Zitat Lokulwar, P. P., & Deshmukh, H. R. (2017).Threat analysis and attacks modelling in routing towards IoT. In International conference on I-SMAC (IoT in social, mobile, analytics and cloud) (Vol. 6, pp. 2–4). Lokulwar, P. P., & Deshmukh, H. R. (2017).Threat analysis and attacks modelling in routing towards IoT. In International conference on I-SMAC (IoT in social, mobile, analytics and cloud) (Vol. 6, pp. 2–4).
9.
Zurück zum Zitat Seo, J. W., & Lee, S. J. (2016). A Study of efficient detection of network based IP Spoofing DDoS and Malware infected system. Springer Plus, 5(1), 1–20.CrossRef Seo, J. W., & Lee, S. J. (2016). A Study of efficient detection of network based IP Spoofing DDoS and Malware infected system. Springer Plus, 5(1), 1–20.CrossRef
10.
Zurück zum Zitat Liang, L., Zheng, K., Sheng, Q., & Huang, X. (2016). A denial of service attack method for an IoT system. In 8th international conference on information technology in medicine and education (Vol. 5, pp. 1–3). Liang, L., Zheng, K., Sheng, Q., & Huang, X. (2016). A denial of service attack method for an IoT system. In 8th international conference on information technology in medicine and education (Vol. 5, pp. 1–3).
11.
Zurück zum Zitat Liu, X., Trappe, W., & Lindqvist, J. (2014). A policy-driven approach to access control in future internet name resolution services. In Proceedings of the 9th ACM workshop on mobility in the evolving internet architecture, Maui, HI, USA (pp. 7–12). Liu, X., Trappe, W., & Lindqvist, J. (2014). A policy-driven approach to access control in future internet name resolution services. In Proceedings of the 9th ACM workshop on mobility in the evolving internet architecture, Maui, HI, USA (pp. 7–12).
12.
Zurück zum Zitat Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78(3), 680–698.CrossRef Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78(3), 680–698.CrossRef
13.
Zurück zum Zitat Anirudh, M., Arul Thileeban, S., & Nallathambi, D. J. (2017). Use of honeypots for mitigating DoS attacks targeted on IoT networks. In IEEE international conference on computer, communication, and signal processing (ICCCSP-2017) (Vol. 4, pp. 3–5). Anirudh, M., Arul Thileeban, S., & Nallathambi, D. J. (2017). Use of honeypots for mitigating DoS attacks targeted on IoT networks. In IEEE international conference on computer, communication, and signal processing (ICCCSP-2017) (Vol. 4, pp. 3–5).
14.
Zurück zum Zitat Ammar, M., Russello, G., & Crispo, B. (2018). Internet of things: Survey on the security of Iot frameworks. Journal of Information Security and Applications, 38, 8–27.CrossRef Ammar, M., Russello, G., & Crispo, B. (2018). Internet of things: Survey on the security of Iot frameworks. Journal of Information Security and Applications, 38, 8–27.CrossRef
15.
Zurück zum Zitat Lee, S. M., Kim, D. S., Lee, J. H., & Park, J. S. (2012). Detection of DDoS attacks using optimized traffic matrix (pp. 501–510). Amsterdam: Elsevier. Lee, S. M., Kim, D. S., Lee, J. H., & Park, J. S. (2012). Detection of DDoS attacks using optimized traffic matrix (pp. 501–510). Amsterdam: Elsevier.
16.
Zurück zum Zitat Hossain, M. M., Fotouhi, M., & Hasan, R. (2015). Towards an analysis of security issues, challenges, and open problems in the internet of things. In IEEE World congress on services (SERVICES). IEEE (pp. 21–28). Hossain, M. M., Fotouhi, M., & Hasan, R. (2015). Towards an analysis of security issues, challenges, and open problems in the internet of things. In IEEE World congress on services (SERVICES). IEEE (pp. 21–28).
17.
Zurück zum Zitat Chen, S., Xu, H., Liu, D., Hu, B., & Wang, H. (2014). Vision of IoT: Applications, challenges, and opportunities with china perspective. IEEE Internet of Things Journal, 1(4), 349–359.CrossRef Chen, S., Xu, H., Liu, D., Hu, B., & Wang, H. (2014). Vision of IoT: Applications, challenges, and opportunities with china perspective. IEEE Internet of Things Journal, 1(4), 349–359.CrossRef
18.
Zurück zum Zitat Gehrmann, C., & Abdelraheem, M. A. (2016). IoT protection through device to cloud synchronization. In IEEE 8th international conference on cloud computing technology and science (Vol. 4, pp. 1–6). Gehrmann, C., & Abdelraheem, M. A. (2016). IoT protection through device to cloud synchronization. In IEEE 8th international conference on cloud computing technology and science (Vol. 4, pp. 1–6).
19.
Zurück zum Zitat Ramasamy, T., & Arjunasamy, A. (2017). Advanced heuristic for selecting friends in social Internet of things. Wireless Personal Communications, 97(4), 4951–4965.CrossRef Ramasamy, T., & Arjunasamy, A. (2017). Advanced heuristic for selecting friends in social Internet of things. Wireless Personal Communications, 97(4), 4951–4965.CrossRef
20.
Zurück zum Zitat Mahmudul Hasah, Md, Milon Islam, Md, Zarif, Ishrak Islam, & Hashem, M. M. A. (2019). Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things, 7, 1–14. Mahmudul Hasah, Md, Milon Islam, Md, Zarif, Ishrak Islam, & Hashem, M. M. A. (2019). Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things, 7, 1–14.
21.
Zurück zum Zitat Calvert, Chad L., & Khoshgoftaar, Taghi M. (2019). Impact of class distribution on the detection of slow HTTP DoS attacks using big data. Journal of Big Data, 6(67), 1–18. Calvert, Chad L., & Khoshgoftaar, Taghi M. (2019). Impact of class distribution on the detection of slow HTTP DoS attacks using big data. Journal of Big Data, 6(67), 1–18.
22.
Zurück zum Zitat Vishwakarma, Ruchi, & Jain, Ankit Kumar. (2020). A survey of DDoS attacking techniques and defence mechanism in the IoT network. Telecommunication systems, 73, 3–25.CrossRef Vishwakarma, Ruchi, & Jain, Ankit Kumar. (2020). A survey of DDoS attacking techniques and defence mechanism in the IoT network. Telecommunication systems, 73, 3–25.CrossRef
23.
Zurück zum Zitat Galeano-Brajones, Jesús, Carmona-Murillo, Javier, Valenzuela-Valdés, Juan F., & Luna-Valero, Francisco. (2020). Detection and mitigation of DoS and DDoS attacks in IoT-based stateful SDN: An experimental approach. Sensors, 816, 1–18. Galeano-Brajones, Jesús, Carmona-Murillo, Javier, Valenzuela-Valdés, Juan F., & Luna-Valero, Francisco. (2020). Detection and mitigation of DoS and DDoS attacks in IoT-based stateful SDN: An experimental approach. Sensors, 816, 1–18.
Metadaten
Titel
Isolation of DDoS Attack in IoT: A New Perspective
verfasst von
Upendra Kumar
Shreyshi Navaneet
Neeraj Kumar
Subhash Chandra Pandey
Publikationsdatum
19.05.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07486-w

Weitere Artikel der Ausgabe 3/2020

Wireless Personal Communications 3/2020 Zur Ausgabe

Neuer Inhalt