ABSTRACT
Many IoT devices lack memory and computational complexities of modern computing devices, making them vulnerable to a wide range of cyber attacks. Among these, DDoS attacks are a growing concern in IoT. Such attacks are executed through the introduction of rogue devices and then using them and/or other compromised devices to facilitate DDoS attacks by generating relentless traffic. This paper aims to address DDoS security issues in IoT by proposing an integration of IoT devices with blockchain. This paper uses Ethereum, a blockchain variant, with smart contracts to replace the traditional centralized IoT infrastructure with a decentralized one. IoT devices are then required to access the network using smart contracts. The integration of IoT with Ethereum not only prevents rogue devices from gaining access to the server but also addresses DDoS attacks by using static resource allocation for devices.
- {n. d.}. Secure Contract Source Code, howpublished = http://https://www.ece.nus.edu.sg/stfpage/bsikdar/scripts/contracts/, note = Accessed: 04-02-2018. ({n. d.}).Google Scholar
- Talal Alharbi, Ahamed Aljuhani, Hang Liu, and Chunqiang Hu. 2017. Smart and Lightweight DDoS Detection Using NFV. In Proceedings of the International Conference on Compute and Data Analysis (ICCDA '17). ACM, New York, NY, USA, 220--227. Google ScholarDigital Library
- Roman Beck, Jacob Stenum Czepluch, Nikolaj Lollike, and Simon Malone. 2016. Blockchain -- The Gateway to Trust-Free Cryptographic Transactions. In Twenty-Fourth European Conference on Information Systems (ECIS), Istanbul, Turkey 2016. Springer Publishing Company, United States, 1--14. ISBN to be added later.Google Scholar
- Vitalik Buterin. 2014. Ethereum: A next-generation smart contract and decentralized application platform. https://github.com/ethereum/wiki/wiki/White-Paper. (2014). https://github.com/ethereum/wiki/wiki/White-Paper Accessed: 2016-08-22.Google Scholar
- Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gün Sirer, Dawn Song, and Roger Wattenhofer. 2016. On Scaling Decentralized Blockchains. (02 2016), 106--125 pages.Google Scholar
- Tien Tuan Anh Dinh, Ji Wang, Gang Chen, Rui Liu, Beng Chin Ooi, and Kian-Lee Tan. 2017. BLOCKBENCH: A Framework for Analyzing Private Blockchains. In Proceedings of the 2017 ACM International Conference on Management of Data (SIGMOD '17). ACM, New York, NY, USA, 1085--1100. Google ScholarDigital Library
- Michele De Donno, Nicola Dragoni, Alberto Giaretta, and Manuel Mazzara. 2017. AntibloTic: Protecting IoT Devices Against DDoS Attacks. CoRR abs/1708.05050 (2017).Google Scholar
- Satoshi Nakamoto. 2009. Bitcoin: A peer-to-peer electronic cash system. (03 2009).Google Scholar
- Charith Perera, Rajiv Ranjan, Lizhe Wang, Samee Ullah Khan, and Albert Y. Zomaya. 2014. Privacy of Big Data in the Internet of Things Era. CoRR abs/1412.8339 (2014). arXiv:1412.8339 http://arxiv.org/abs/1412.8339Google Scholar
- Nicole Perlroth. 2016. Hackers use new weapons to disrupt major webites across US. The New York Times 21 (2016).Google Scholar
- S. Ravi, A. Raghunathan, and S. Chakradhar. 2004. Tamper resistance mechanisms for secure embedded systems. In 17th International Conference on VLSI Design. Proceedings. 605--611. Google ScholarDigital Library
- Fabrice J. Ryba, Matthew Orlinski, Matthias Wählisch, Christian Rossow, and Thomas C. Schmidt. 2015. Amplification and DRDoS Attack Defense - A Survey and New Perspectives. CoRR abs/1505.07892 (2015).Google Scholar
- J. A. Stankovic. 2014. Research Directions for the Internet of Things. IEEE Internet of Things journal 1, 1 (Feb 2014), 3--9.Google ScholarCross Ref
- H. Suo, J. Wan, C. Zou, and J. Liu. 2012. Security in the Internet of Things: A Review. In 2012 International Conference on Computer Science and Electronics Engineering, Vol. 3. 648--651. Google ScholarDigital Library
- S. Verma, Y. Kawamoto, Z. M. Fadlullah, H. Nishiyama, and N. Kato. 2017. A Survey on Network Methodologies for Real-Time Analytics of Massive IoT Data and Open Research Issues. IEEE Communications Surveys Tutorials 19, 3 (thirdquarter 2017), 1457--1477.Google ScholarCross Ref
- T. Xu, J. B. Wendt, and M. Potkonjak. 2014. Security of IoT systems: Design challenges and opportunities. In 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). 417--423. Google ScholarDigital Library
- Wenyuan Xu, Wade Trappe, Yanyong Zhang, and Timothy Wood. 2005. The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '05). ACM, New York, NY, USA, 46--57. Google ScholarDigital Library
- Saman Taghavi Zargar, James Joshi, and David Tipper. 2013. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE communications surveys & tutorials 15, 4 (2013), 2046--2069.Google Scholar
- Congyingzi Zhang and Robert Green. 2015. Communication Security in Internet of Thing: Preventive Measure and Avoid DDoS Attack over IoT Network. In Proceedings of the 18th Symposium on Communications & Networking (CNS '15). Society for Computer Simulation International, San Diego, CA, USA, 8--15. http://dl.acm.org.libproxyl.nus.edu.sg/citation.cfm?id=2872550.2872552 Google ScholarDigital Library
- Yu Zhang and Jiangtao Wen. 2017. The IoT electric business model: Using blockchain technology for the internet of things. Peer-to-Peer Networking and Applications 10, 4 (2017), 983--994.Google ScholarCross Ref
Index Terms
- Mitigating loT Device based DDoS Attacks using Blockchain
Recommendations
DDoS attacks on the internet of things and their prevention methods
ICFNDS '18: Proceedings of the 2nd International Conference on Future Networks and Distributed SystemsThe Internet of Things (IoT) vulnerabilities provides an ideal target for botnets, making them a major contributor in the increased number of Distributed Denial of Service (DDoS) attacks. The increase in DDoS attacks has made it important to address the ...
A survey on Blockchain solutions in DDoS attacks mitigation: Techniques, open challenges and future directions
AbstractWith the proliferation of new technologies such as the Internet of Things (IoT) and Software-Defined Networking (SDN) in recent years, the Distributed Denial of Service (DDoS) attack vector has broadened and opened new opportunities ...
DDoS attacks in cloud computing
Security issues related to the cloud computing are relevant to various stakeholders for an informed cloud adoption decision. Apart from data breaches, the cyber security research community is revisiting the attack space for cloud-specific solutions as ...
Comments