Loading…

DDoS attack modeling and resistance using trust based protocol for the security of Internet of Things

The rapid growth of Internet of Things (IoT) devices has led to an increase in security challenges, particularly for wireless sensor networks (WSNs). This work addresses the issue of distributed denial of service (DDoS) attacks in the IoT environment, with a focus on replay attacks. This study intro...

Full description

Saved in:
Bibliographic Details
Published in:Maǧallaẗ al-abḥath al-handasiyyaẗ 2023-06, Vol.11 (2), p.100058, Article 100058
Main Authors: Feroz Khan, A.B., Hussain, Mohammed Muzaffar, Kalpana Devi, S., Gunavathie, M.A.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The rapid growth of Internet of Things (IoT) devices has led to an increase in security challenges, particularly for wireless sensor networks (WSNs). This work addresses the issue of distributed denial of service (DDoS) attacks in the IoT environment, with a focus on replay attacks. This study introduces a novel technique to counter reactive DDoS attacks in the Internet of Things (IoT) environment. The objective is to enhance the security of the IoT by preventing and mitigating DDoS attacks. The proposed technique involves the use of a dynamic frequency hopping mechanism that shifts the operating frequency of the system in real-time, making it difficult for the attacker to interfere with the system. The simulation-based methodology based on network simulator was employed to evaluate the performance of the proposed technique. Results show that the proposed technique effectively reduces the impact of reactive DDoS attacks by up to 95%, with minimal overhead on the system. The evaluation proved that our work outperforms state-of-the-art schemes such as EDDK and HAPOSCO in terms of computational cost, throughput, and delay. Performance metrics considered in the evaluation include energy consumption, packet loss, and computational time Overall, the study demonstrates the effectiveness of the proposed technique in enhancing the security of IoT systems against reactive attacks.
ISSN:2307-1877
2307-1885
DOI:10.1016/j.jer.2023.100058