Isolation of DDoS Attack in IoT: A New Perspective

  • PDF / 2,494,477 Bytes
  • 18 Pages / 439.37 x 666.142 pts Page_size
  • 108 Downloads / 209 Views

DOWNLOAD

REPORT


Isolation of DDoS Attack in IoT: A New Perspective Upendra Kumar1   · Shreyshi Navaneet1 · Neeraj Kumar1 · Subhash Chandra Pandey1

© Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract Internet of Things (IoT) involves all the surrounding with smart devices to Internet and has been gaining more recognition because it provides substantial benefits in comparison to other systems. Further, due to the decentralized nature of IoT network many types of active and passive attacks are possible. The distributed denial of service is the active type of attack which reduces network performance. In this research work, technique of mutual authentication is designed which detects and isolates malicious nodes from the network and thus improves session resumption technique for minimizing execution time. The proposed technique has been implemented and also compared with existing technique in terms of certain parameters. These parameters are bandwidth consumption, routing overhead, and packet delivery ratio. The performance of proposed technique is evaluated in NS2 and results shows that proposed algorithm performs well in comparison to existing results. Keywords  Internet of Things (IoT) · Denial of service (DoS) · Distributed denial of services (DDoS) · IP spoofing · Packet delivery ratio (PDR)

1 Introduction The sensors and actuators are chief components of the Internet of Things (IoT). These IoT devices are connected with each other across the Internet. Further, in IoT system, the Internet protocol (IP) addresses are assigned to artificial or man-made stuff and thus enable them to transfer data over networks system. It has been observed that around 8.3 billion IoT devices were in use till 2017. It is also envisaged that this number will reach 20.3 billion by 2020. Moreover, substantial quantities of these devices are pragmatically implemented in consumer products like smart TVs and smart speakers in China, America and Europe. * Upendra Kumar [email protected] Shreyshi Navaneet [email protected] Neeraj Kumar [email protected] Subhash Chandra Pandey [email protected] 1



Birla Institute of Technology, Mesra, Ranchi (Patna Campus), Patna, Bihar, India

13

Vol.:(0123456789)



U. Kumar et al.

It has also been observed that the IoT devices are widely used in smart electric meters and commercial security cameras etc. Indeed, in IoT system analysis, integration and automation is required so that higher accuracy can be obtained in different application domains such as sensing, networking as well as robotics. Perhaps, the emergence of IoT systems has attracted the concentration of many researchers owing to the fact that it provides multifaceted benefits in comparison to other systems. Moreover, this system also renders considerable services to the customers which are relevant to social, economic and political sectors. In fact, huge amount of data can be transferred in quick and efficient manner with the help of connections built by IoT devices [1, 2]. Therefore, various activities and oper