Internet of Things (IoT) involves all the surrounding with smart devices to Internet and has been gaining more recognition because it provides substantial benefits in comparison to other systems. Further, due to the decentralized nature of IoT network many types of active and passive attacks are possible. The distributed denial of service is the active type of attack which reduces network performance. In this research work, technique of mutual authentication is designed which detects and isolates malicious nodes from the network and thus improves session resumption technique for minimizing execution time. The proposed technique has been implemented and also compared with existing technique in terms of certain parameters. These parameters are bandwidth consumption, routing overhead, and packet delivery ratio. The performance of proposed technique is evaluated in NS2 and results shows that proposed algorithm performs well in comparison to existing results.
This is a preview of subscription content,to check access.
Access this article
Similar content being viewed by others
Al-Shammari, B. K. J., Al-Aboody, N., & Al-Raweshidy, H. S. (2018). IoT traffic management and integration in the QoS supported network. IEEE Internet of Things Journal, 5(1), 352–370.
Zanella, A., Bui, N., Castellani, A., Vangelista, L., & Zorzi, M. (2014). Internet of things for smart cities. IEEE Internet of Things Journal, 1(1), 30–34.
Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions on Industrial Informatics, 10(4), 2233–2243.
Rose, K., Eldridge, S., & Chapin, L. (2015). The Internet of things: An overview. The Internet Society (ISOC), 80, 1–50.
Rajagopalan, A., Jagga, M., Kumari, A., & Ali, S. T. (2017). A DDoS prevention scheme for session resumption SEA architecture in healthcare IoT. In 3rd IEEE international conference on computational intelligence and communication technology (IEEE-CICT) (Vol. 6, pp. 1–5).
Restruccia, F., Salvatorc, D., & Melodia, T. (2018). Security the Internet of things, new perspective and Research challenges. IEEE Internet of Things Journal, 1(1), 1–16.
Deogirikar, J., & Vidhate, A. (2017). Security attacks in IoT. In A survey international conference on I-SMAC (IoT in social, mobile, analytics and cloud) (Vol. 4, pp. 3–6).
Lokulwar, P. P., & Deshmukh, H. R. (2017).Threat analysis and attacks modelling in routing towards IoT. In International conference on I-SMAC (IoT in social, mobile, analytics and cloud) (Vol. 6, pp. 2–4).
Seo, J. W., & Lee, S. J. (2016). A Study of efficient detection of network based IP Spoofing DDoS and Malware infected system. Springer Plus, 5(1), 1–20.
Liang, L., Zheng, K., Sheng, Q., & Huang, X. (2016). A denial of service attack method for an IoT system. In 8th international conference on information technology in medicine and education (Vol. 5, pp. 1–3).
Liu, X., Trappe, W., & Lindqvist, J. (2014). A policy-driven approach to access control in future internet name resolution services. In Proceedings of the 9th ACM workshop on mobility in the evolving internet architecture, Maui, HI, USA (pp. 7–12).
Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78(3), 680–698.
Anirudh, M., Arul Thileeban, S., & Nallathambi, D. J. (2017). Use of honeypots for mitigating DoS attacks targeted on IoT networks. In IEEE international conference on computer, communication, and signal processing (ICCCSP-2017) (Vol. 4, pp. 3–5).
Ammar, M., Russello, G., & Crispo, B. (2018). Internet of things: Survey on the security of Iot frameworks. Journal of Information Security and Applications, 38, 8–27.
Lee, S. M., Kim, D. S., Lee, J. H., & Park, J. S. (2012). Detection of DDoS attacks using optimized traffic matrix (pp. 501–510). Amsterdam: Elsevier.
Hossain, M. M., Fotouhi, M., & Hasan, R. (2015). Towards an analysis of security issues, challenges, and open problems in the internet of things. In IEEE World congress on services (SERVICES). IEEE (pp. 21–28).
Chen, S., Xu, H., Liu, D., Hu, B., & Wang, H. (2014). Vision of IoT: Applications, challenges, and opportunities with china perspective. IEEE Internet of Things Journal, 1(4), 349–359.
Gehrmann, C., & Abdelraheem, M. A. (2016). IoT protection through device to cloud synchronization. In IEEE 8th international conference on cloud computing technology and science (Vol. 4, pp. 1–6).
Ramasamy, T., & Arjunasamy, A. (2017). Advanced heuristic for selecting friends in social Internet of things. Wireless Personal Communications, 97(4), 4951–4965.
Mahmudul Hasah, Md, Milon Islam, Md, Zarif, Ishrak Islam, & Hashem, M. M. A. (2019). Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things, 7, 1–14.
Calvert, Chad L., & Khoshgoftaar, Taghi M. (2019). Impact of class distribution on the detection of slow HTTP DoS attacks using big data. Journal of Big Data, 6(67), 1–18.
Vishwakarma, Ruchi, & Jain, Ankit Kumar. (2020). A survey of DDoS attacking techniques and defence mechanism in the IoT network. Telecommunication systems, 73, 3–25.
Galeano-Brajones, Jesús, Carmona-Murillo, Javier, Valenzuela-Valdés, Juan F., & Luna-Valero, Francisco. (2020). Detection and mitigation of DoS and DDoS attacks in IoT-based stateful SDN: An experimental approach. Sensors, 816, 1–18.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
About this article
Cite this article
Kumar, U., Navaneet, S., Kumar, N. et al. Isolation of DDoS Attack in IoT: A New Perspective. Wireless Pers Commun 114, 2493–2510 (2020). https://doi.org/10.1007/s11277-020-07486-w