Skip to main content
Log in

Isolation of DDoS Attack in IoT: A New Perspective

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Internet of Things (IoT) involves all the surrounding with smart devices to Internet and has been gaining more recognition because it provides substantial benefits in comparison to other systems. Further, due to the decentralized nature of IoT network many types of active and passive attacks are possible. The distributed denial of service is the active type of attack which reduces network performance. In this research work, technique of mutual authentication is designed which detects and isolates malicious nodes from the network and thus improves session resumption technique for minimizing execution time. The proposed technique has been implemented and also compared with existing technique in terms of certain parameters. These parameters are bandwidth consumption, routing overhead, and packet delivery ratio. The performance of proposed technique is evaluated in NS2 and results shows that proposed algorithm performs well in comparison to existing results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Al-Shammari, B. K. J., Al-Aboody, N., & Al-Raweshidy, H. S. (2018). IoT traffic management and integration in the QoS supported network. IEEE Internet of Things Journal, 5(1), 352–370.

    Article  Google Scholar 

  2. Zanella, A., Bui, N., Castellani, A., Vangelista, L., & Zorzi, M. (2014). Internet of things for smart cities. IEEE Internet of Things Journal, 1(1), 30–34.

    Article  Google Scholar 

  3. Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions on Industrial Informatics, 10(4), 2233–2243.

    Article  Google Scholar 

  4. Rose, K., Eldridge, S., & Chapin, L. (2015). The Internet of things: An overview. The Internet Society (ISOC), 80, 1–50.

    Google Scholar 

  5. Rajagopalan, A., Jagga, M., Kumari, A., & Ali, S. T. (2017). A DDoS prevention scheme for session resumption SEA architecture in healthcare IoT. In 3rd IEEE international conference on computational intelligence and communication technology (IEEE-CICT) (Vol. 6, pp. 1–5).

  6. Restruccia, F., Salvatorc, D., & Melodia, T. (2018). Security the Internet of things, new perspective and Research challenges. IEEE Internet of Things Journal, 1(1), 1–16.

    Article  Google Scholar 

  7. Deogirikar, J., & Vidhate, A. (2017). Security attacks in IoT. In A survey international conference on I-SMAC (IoT in social, mobile, analytics and cloud) (Vol. 4, pp. 3–6).

  8. Lokulwar, P. P., & Deshmukh, H. R. (2017).Threat analysis and attacks modelling in routing towards IoT. In International conference on I-SMAC (IoT in social, mobile, analytics and cloud) (Vol. 6, pp. 2–4).

  9. Seo, J. W., & Lee, S. J. (2016). A Study of efficient detection of network based IP Spoofing DDoS and Malware infected system. Springer Plus, 5(1), 1–20.

    Article  Google Scholar 

  10. Liang, L., Zheng, K., Sheng, Q., & Huang, X. (2016). A denial of service attack method for an IoT system. In 8th international conference on information technology in medicine and education (Vol. 5, pp. 1–3).

  11. Liu, X., Trappe, W., & Lindqvist, J. (2014). A policy-driven approach to access control in future internet name resolution services. In Proceedings of the 9th ACM workshop on mobility in the evolving internet architecture, Maui, HI, USA (pp. 7–12).

  12. Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78(3), 680–698.

    Article  Google Scholar 

  13. Anirudh, M., Arul Thileeban, S., & Nallathambi, D. J. (2017). Use of honeypots for mitigating DoS attacks targeted on IoT networks. In IEEE international conference on computer, communication, and signal processing (ICCCSP-2017) (Vol. 4, pp. 3–5).

  14. Ammar, M., Russello, G., & Crispo, B. (2018). Internet of things: Survey on the security of Iot frameworks. Journal of Information Security and Applications, 38, 8–27.

    Article  Google Scholar 

  15. Lee, S. M., Kim, D. S., Lee, J. H., & Park, J. S. (2012). Detection of DDoS attacks using optimized traffic matrix (pp. 501–510). Amsterdam: Elsevier.

    Google Scholar 

  16. Hossain, M. M., Fotouhi, M., & Hasan, R. (2015). Towards an analysis of security issues, challenges, and open problems in the internet of things. In IEEE World congress on services (SERVICES). IEEE (pp. 21–28).

  17. Chen, S., Xu, H., Liu, D., Hu, B., & Wang, H. (2014). Vision of IoT: Applications, challenges, and opportunities with china perspective. IEEE Internet of Things Journal, 1(4), 349–359.

    Article  Google Scholar 

  18. Gehrmann, C., & Abdelraheem, M. A. (2016). IoT protection through device to cloud synchronization. In IEEE 8th international conference on cloud computing technology and science (Vol. 4, pp. 1–6).

  19. Ramasamy, T., & Arjunasamy, A. (2017). Advanced heuristic for selecting friends in social Internet of things. Wireless Personal Communications, 97(4), 4951–4965.

    Article  Google Scholar 

  20. Mahmudul Hasah, Md, Milon Islam, Md, Zarif, Ishrak Islam, & Hashem, M. M. A. (2019). Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things, 7, 1–14.

    Google Scholar 

  21. Calvert, Chad L., & Khoshgoftaar, Taghi M. (2019). Impact of class distribution on the detection of slow HTTP DoS attacks using big data. Journal of Big Data, 6(67), 1–18.

    Google Scholar 

  22. Vishwakarma, Ruchi, & Jain, Ankit Kumar. (2020). A survey of DDoS attacking techniques and defence mechanism in the IoT network. Telecommunication systems, 73, 3–25.

    Article  Google Scholar 

  23. Galeano-Brajones, Jesús, Carmona-Murillo, Javier, Valenzuela-Valdés, Juan F., & Luna-Valero, Francisco. (2020). Detection and mitigation of DoS and DDoS attacks in IoT-based stateful SDN: An experimental approach. Sensors, 816, 1–18.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Upendra Kumar.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, U., Navaneet, S., Kumar, N. et al. Isolation of DDoS Attack in IoT: A New Perspective. Wireless Pers Commun 114, 2493–2510 (2020). https://doi.org/10.1007/s11277-020-07486-w

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07486-w

Keywords

Navigation