Defending Iot from Ddos Using Lightweight Authentication
-
2018-09-25 https://doi.org/10.14419/ijet.v7i4.6.28447 -
Internet of things, Distributed Denial of Services attack, network, algorithm, defense methodology. -
Abstract
The emergence of Internet of things (IoT) is due to its  ability to dutifully transfer the data through a network. Now the concern is that security is not considered as main priority while developing the product. IoT is prone to vulnerabilities where Botnet and DDoS kind of attacks are common and a major issue that has to be considered these days. Since IoT is in no way resistive to attacks, this paper is all about proposing a solution for the Distributed Denial of Services attack that happens on IoT platform. Light weight authentication is necessary for any IoT devices because to reduce the power consumption and increase the processing speed of the device [16]. The experimental setup is built on OS named Contiki with cooja simulator that suits to all the devices that are in the IoT environment.
Â
Â
Â
-
References
[1] https://ww.iotforall.com/5-worst-iot-hacking-vulnerabilities
[2] http://www.gkmit.co/articles/internet-of-things-iot-introduction-applications-and-future-scope
[3] https://www.cso.com.au/article/575407/internet-things-iot-threats-Countermeasures
[4] https://www.incapsula.com/ddos/denial-of-service.html
[5] https://www.corero.com/blog/870-the-rise-of-iot-botnet-threats-and-ddos-attacks.html
[6] Kasi Nathan P, et al. "DEMO: An IDS framework for internet of things empowered by 6LoWPAN." Proceedings of the 2013 ACMSIGSAC conference on Computer & communications security. ACM, 2013.
[7] Misra S, et al. "A learning automata-based solution for preventing distributed denial of service in Internet of things." Internet of Things (iThings/CPSCom), 2011 International Conference on and 4th International Conference on Cyber, Physical and Social Computing. IEEE, 2011.
[8] Hsiao-Chung LIN, and WANG Ping, "Implementation of an SDNbased Security Defense Mechanism Against DDoS Attacks."DEStech Transactions on Economics and Management, 2016.
[9] Sonar K. and Upadhyay H., "An Approach to Secure Internet of Things Against DDoS." Proceedings of International Conference on ICT for Sustainable Development. Springer Singapore, 2016.
[10] https://www.bleepingcomputer.com/news/security/dramatic-increase-of-ddos-attack-sizes-attributed-to-iot-devices
[11] https://dzone.com/articles/cert-analysis-on-iot-botnet-and-ddos-attacks
[12] https://www.networkcomputing.com/network-security/iot-based-ddos-threats-loom/1614938156
[13] https://ieeexplore.ieee.org/document/8039175
[14] https://ieeexplore.ieee.org/document/8073643
[15] https: www.networkcomputing.com/network-security/iot-based-ddos- Threats
[16] https: www.ncbi.nlm.nih.gov/pubmed
-
Downloads
-
How to Cite
A. Vani, G., & Metilda Florence, M. (2018). Defending Iot from Ddos Using Lightweight Authentication. International Journal of Engineering & Technology, 7(4.6), 388-390. https://doi.org/10.14419/ijet.v7i4.6.28447Received date: 2019-03-16
Accepted date: 2019-03-16
Published date: 2018-09-25