EIDDM: Edge and Internet Layer Distributed DoS Threats Detection and Mitigation for Internet of Things Wireless Communications

被引:2
|
作者
Kumavat, Kavita [1 ,2 ]
Gomes, Joanne [3 ]
机构
[1] St Francis Inst Technol, Dept Comp Engn, Mumbai, India
[2] Vishwakarma Univ, Pune, India
[3] St Francis Inst Technol, Dept Informat Technol, Mumbai, India
关键词
Distributed denial of service; Edge layer; Internet of things; Internet layer; Network security; Network tree analysis; Trust-based measure; NETWORK;
D O I
10.1007/s11277-023-10453-w
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Distributed Denial of Service (DDoS) attacks, plague the Internet of Things (IoT)-enabled distributed communication network. To mitigate DDoS attacks on IoT many protocols have been suggested in earlier literature, but most of them are successful in mitigating attacks on one layer at any given time. This research work proposes a mechanism to mitigate DDoS attacks on multiple layers of IoT networks. An IoT wireless network has been simulated in NS2 for developing a mechanism to detect and mitigate such attacks. Defending against multi-layer DDoS attacks is tough since DDoS threats are introduced on several tiers of IoT communication networks. This research work presents a unique security strategy to evaluate, detect, and neutralize the behavior of attack nodes. The protocol named "Edge and Internet Layer DDoS Threats Detection and Mitigation" (EIDDM), has been proposed in this work, as most DDoS attacks are introduced on edge and internet layers of the IoT framework. The functionality of EIDDM is driven by Network tree analysis. Edge and internet layer trust factors are routinely assessed for each IoT communication system sensor node. These trust factors are used to analyze node activity and reputation in network tree form. The trust-based network tree analysis of each node first detects attacker nodes and then determines the type of DDoS threat and its underlying cause. IoT connectivity technologies related to attacking nodes are discontinued till DDoS attacks have been mitigated. The proposed EIDDM protocol has been evaluated for its efficiency in terms of throughput, latency, energy consumption, Packet Delivery Ratio (PDR), and communication overhead in simulations. EIDDM protocol has been surpassed other protocols. Earlier protocols had throughput in the range of 53-56% and PDR in the range of 75-80%, whereas for EIDDM these are increased by 6.5% and 14%, respectively. Earlier protocols had overhead in the range of 10-12% and average energy utilization in the range of 1706-1756 J, whereas the EIDDM protocol reduced communication overhead by 25% and average energy utilization by 6.6%.
引用
收藏
页码:709 / 735
页数:27
相关论文
共 50 条
  • [31] OPTIMAL SECRET SHARING FOR SECURE WIRELESS COMMUNICATIONS IN THE ERA OF INTERNET OF THINGS
    Miao, Lei
    Jiang, Dingde
    4TH INTERNATIONAL CONFERENCE ON SMART AND SUSTAINABLE CITY (ICSSC 2017), 2017, : 111 - 116
  • [32] A smart Internet of Things-based mechanism for wireless communications in NoC
    Chi, Tao
    Chen, Manman
    Chen, Ming
    Yan, Haowei
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (10):
  • [33] A Hybrid Intrusion Detection Model for Identification of Threats in Internet of Things Environment
    Owoh, Nsikak Pius
    Singh, Manmeet Mahinderjit
    Zaaba, Zarul Fitril
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (09) : 689 - 697
  • [34] Toward a Distributed Approach for Detection and Mitigation of Denial-of-Service Attacks Within Industrial Internet of Things
    Borgiani, Vladimir
    Moratori, Patrick
    Kazienko, Juliano F.
    Tubino, Emilio R. R.
    Quincozes, Silvio E.
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) : 4569 - 4578
  • [35] Wireless Powered Mobile Edge Computing for Industrial Internet of Things Systems
    Wu, Hao
    Tian, Hui
    Nie, Gaofeng
    Zhao, Pengtao
    IEEE ACCESS, 2020, 8 : 101539 - 101549
  • [36] Edge Computing Enabled Resilient Wireless Network Virtualization for Internet of Things
    Rawat, Danda B.
    Parwez, Md. Salik
    Alshammari, Abdullah
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 155 - 162
  • [37] Artificial Intelligence Enabled Distributed Edge Computing for Internet of Things Applications
    Fragkos, Georgios
    Tsiropoulou, Eirini Eleni
    Papavassiliou, Symeon
    16TH ANNUAL INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS 2020), 2020, : 450 - 457
  • [38] Empowering the Internet of Things Using Light Communication and Distributed Edge Computing
    Ateya, Abdelhamied A.
    Mahmoud, Mona
    Zaghloul, Adel
    Soliman, Naglaa F.
    Muthanna, Ammar
    ELECTRONICS, 2022, 11 (09)
  • [39] An intelligent trusted edge data production method for distributed Internet of things
    Jiangjiang Zhang
    Zhenhu Ning
    Hangrui Cao
    Neural Computing and Applications, 2023, 35 : 21333 - 21347
  • [40] Edge-Fog Cloud: A Distributed Cloud for Internet of Things Computations
    Mohan, Nitinder
    Kangasharju, Jussi
    2016 CLOUDIFICATION OF THE INTERNET OF THINGS (CIOT), 2016,