skip to main content
10.1145/3211933.3211946acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

Mitigating loT Device based DDoS Attacks using Blockchain

Published:15 June 2018Publication History

ABSTRACT

Many IoT devices lack memory and computational complexities of modern computing devices, making them vulnerable to a wide range of cyber attacks. Among these, DDoS attacks are a growing concern in IoT. Such attacks are executed through the introduction of rogue devices and then using them and/or other compromised devices to facilitate DDoS attacks by generating relentless traffic. This paper aims to address DDoS security issues in IoT by proposing an integration of IoT devices with blockchain. This paper uses Ethereum, a blockchain variant, with smart contracts to replace the traditional centralized IoT infrastructure with a decentralized one. IoT devices are then required to access the network using smart contracts. The integration of IoT with Ethereum not only prevents rogue devices from gaining access to the server but also addresses DDoS attacks by using static resource allocation for devices.

References

  1. {n. d.}. Secure Contract Source Code, howpublished = http://https://www.ece.nus.edu.sg/stfpage/bsikdar/scripts/contracts/, note = Accessed: 04-02-2018. ({n. d.}).Google ScholarGoogle Scholar
  2. Talal Alharbi, Ahamed Aljuhani, Hang Liu, and Chunqiang Hu. 2017. Smart and Lightweight DDoS Detection Using NFV. In Proceedings of the International Conference on Compute and Data Analysis (ICCDA '17). ACM, New York, NY, USA, 220--227. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Roman Beck, Jacob Stenum Czepluch, Nikolaj Lollike, and Simon Malone. 2016. Blockchain -- The Gateway to Trust-Free Cryptographic Transactions. In Twenty-Fourth European Conference on Information Systems (ECIS), Istanbul, Turkey 2016. Springer Publishing Company, United States, 1--14. ISBN to be added later.Google ScholarGoogle Scholar
  4. Vitalik Buterin. 2014. Ethereum: A next-generation smart contract and decentralized application platform. https://github.com/ethereum/wiki/wiki/White-Paper. (2014). https://github.com/ethereum/wiki/wiki/White-Paper Accessed: 2016-08-22.Google ScholarGoogle Scholar
  5. Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gün Sirer, Dawn Song, and Roger Wattenhofer. 2016. On Scaling Decentralized Blockchains. (02 2016), 106--125 pages.Google ScholarGoogle Scholar
  6. Tien Tuan Anh Dinh, Ji Wang, Gang Chen, Rui Liu, Beng Chin Ooi, and Kian-Lee Tan. 2017. BLOCKBENCH: A Framework for Analyzing Private Blockchains. In Proceedings of the 2017 ACM International Conference on Management of Data (SIGMOD '17). ACM, New York, NY, USA, 1085--1100. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Michele De Donno, Nicola Dragoni, Alberto Giaretta, and Manuel Mazzara. 2017. AntibloTic: Protecting IoT Devices Against DDoS Attacks. CoRR abs/1708.05050 (2017).Google ScholarGoogle Scholar
  8. Satoshi Nakamoto. 2009. Bitcoin: A peer-to-peer electronic cash system. (03 2009).Google ScholarGoogle Scholar
  9. Charith Perera, Rajiv Ranjan, Lizhe Wang, Samee Ullah Khan, and Albert Y. Zomaya. 2014. Privacy of Big Data in the Internet of Things Era. CoRR abs/1412.8339 (2014). arXiv:1412.8339 http://arxiv.org/abs/1412.8339Google ScholarGoogle Scholar
  10. Nicole Perlroth. 2016. Hackers use new weapons to disrupt major webites across US. The New York Times 21 (2016).Google ScholarGoogle Scholar
  11. S. Ravi, A. Raghunathan, and S. Chakradhar. 2004. Tamper resistance mechanisms for secure embedded systems. In 17th International Conference on VLSI Design. Proceedings. 605--611. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Fabrice J. Ryba, Matthew Orlinski, Matthias Wählisch, Christian Rossow, and Thomas C. Schmidt. 2015. Amplification and DRDoS Attack Defense - A Survey and New Perspectives. CoRR abs/1505.07892 (2015).Google ScholarGoogle Scholar
  13. J. A. Stankovic. 2014. Research Directions for the Internet of Things. IEEE Internet of Things journal 1, 1 (Feb 2014), 3--9.Google ScholarGoogle ScholarCross RefCross Ref
  14. H. Suo, J. Wan, C. Zou, and J. Liu. 2012. Security in the Internet of Things: A Review. In 2012 International Conference on Computer Science and Electronics Engineering, Vol. 3. 648--651. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Verma, Y. Kawamoto, Z. M. Fadlullah, H. Nishiyama, and N. Kato. 2017. A Survey on Network Methodologies for Real-Time Analytics of Massive IoT Data and Open Research Issues. IEEE Communications Surveys Tutorials 19, 3 (thirdquarter 2017), 1457--1477.Google ScholarGoogle ScholarCross RefCross Ref
  16. T. Xu, J. B. Wendt, and M. Potkonjak. 2014. Security of IoT systems: Design challenges and opportunities. In 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). 417--423. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Wenyuan Xu, Wade Trappe, Yanyong Zhang, and Timothy Wood. 2005. The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '05). ACM, New York, NY, USA, 46--57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Saman Taghavi Zargar, James Joshi, and David Tipper. 2013. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE communications surveys & tutorials 15, 4 (2013), 2046--2069.Google ScholarGoogle Scholar
  19. Congyingzi Zhang and Robert Green. 2015. Communication Security in Internet of Thing: Preventive Measure and Avoid DDoS Attack over IoT Network. In Proceedings of the 18th Symposium on Communications & Networking (CNS '15). Society for Computer Simulation International, San Diego, CA, USA, 8--15. http://dl.acm.org.libproxyl.nus.edu.sg/citation.cfm?id=2872550.2872552 Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Yu Zhang and Jiangtao Wen. 2017. The IoT electric business model: Using blockchain technology for the internet of things. Peer-to-Peer Networking and Applications 10, 4 (2017), 983--994.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Mitigating loT Device based DDoS Attacks using Blockchain

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CryBlock'18: Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems
        June 2018
        121 pages
        ISBN:9781450358385
        DOI:10.1145/3211933

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 15 June 2018

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Upcoming Conference

        MOBISYS '24

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader