EIDDM: Edge and Internet Layer Distributed DoS Threats Detection and Mitigation for Internet of Things Wireless Communications

被引:2
|
作者
Kumavat, Kavita [1 ,2 ]
Gomes, Joanne [3 ]
机构
[1] St Francis Inst Technol, Dept Comp Engn, Mumbai, India
[2] Vishwakarma Univ, Pune, India
[3] St Francis Inst Technol, Dept Informat Technol, Mumbai, India
关键词
Distributed denial of service; Edge layer; Internet of things; Internet layer; Network security; Network tree analysis; Trust-based measure; NETWORK;
D O I
10.1007/s11277-023-10453-w
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Distributed Denial of Service (DDoS) attacks, plague the Internet of Things (IoT)-enabled distributed communication network. To mitigate DDoS attacks on IoT many protocols have been suggested in earlier literature, but most of them are successful in mitigating attacks on one layer at any given time. This research work proposes a mechanism to mitigate DDoS attacks on multiple layers of IoT networks. An IoT wireless network has been simulated in NS2 for developing a mechanism to detect and mitigate such attacks. Defending against multi-layer DDoS attacks is tough since DDoS threats are introduced on several tiers of IoT communication networks. This research work presents a unique security strategy to evaluate, detect, and neutralize the behavior of attack nodes. The protocol named "Edge and Internet Layer DDoS Threats Detection and Mitigation" (EIDDM), has been proposed in this work, as most DDoS attacks are introduced on edge and internet layers of the IoT framework. The functionality of EIDDM is driven by Network tree analysis. Edge and internet layer trust factors are routinely assessed for each IoT communication system sensor node. These trust factors are used to analyze node activity and reputation in network tree form. The trust-based network tree analysis of each node first detects attacker nodes and then determines the type of DDoS threat and its underlying cause. IoT connectivity technologies related to attacking nodes are discontinued till DDoS attacks have been mitigated. The proposed EIDDM protocol has been evaluated for its efficiency in terms of throughput, latency, energy consumption, Packet Delivery Ratio (PDR), and communication overhead in simulations. EIDDM protocol has been surpassed other protocols. Earlier protocols had throughput in the range of 53-56% and PDR in the range of 75-80%, whereas for EIDDM these are increased by 6.5% and 14%, respectively. Earlier protocols had overhead in the range of 10-12% and average energy utilization in the range of 1706-1756 J, whereas the EIDDM protocol reduced communication overhead by 25% and average energy utilization by 6.6%.
引用
收藏
页码:709 / 735
页数:27
相关论文
共 50 条
  • [41] An intelligent trusted edge data production method for distributed Internet of things
    Zhang, Jiangjiang
    Ning, Zhenhu
    Cao, Hangrui
    NEURAL COMPUTING & APPLICATIONS, 2023, 35 (29): : 21333 - 21347
  • [42] Edge Mesh: A New Paradigm to Enable Distributed Intelligence in Internet of Things
    Sahni, Yuvraj
    Cao, Jiannong
    Zhang, Shigeng
    Yang, Lei
    IEEE ACCESS, 2017, 5 : 16441 - 16458
  • [43] Smart Audio Sensors in the Internet of Things Edge for Anomaly Detection
    Antonini, Mattia
    Vecchio, Massimo
    Antonelli, Fabio
    Ducange, Pietro
    Perera, Charith
    IEEE ACCESS, 2018, 6 : 67594 - 67610
  • [44] Distributed Massive MIMO for Wireless Power Transfer in the Industrial Internet of Things
    Dinh-van, Son
    Ngo, Hien Quoc
    Cotton, Simon L.
    Mo, Yuen Kwan
    Higgins, Matthew D.
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2024, 5 : 7160 - 7175
  • [45] Distributed Internal Anomaly Detection System for Internet-of-Things
    Thanigaivelan, Nanda Kumar
    Nigussie, Ethiopia
    Kanth, Rajeev Kumar
    Virtanen, Seppo
    Isoaho, Jouni
    2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2016,
  • [46] Lightweight Distributed Attack Detection and Prevention for the Safe Internet of Things
    Eliseev, Vladimir
    Eliseeva, Olga
    2018 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2018,
  • [47] Generative Adversarial Networks for Distributed Intrusion Detection in the Internet of Things
    Ferdowsi, Aidin
    Saad, Walid
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [48] A Trust Based Distributed Intrusion Detection Mechanism for Internet of Things
    Khan, Zeeshan Ali
    Herrmann, Peter
    2017 IEEE 31ST INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2017, : 1169 - 1176
  • [49] Detection and Blockchain-Based Collaborative Mitigation of Internet of Things Botnets
    Sajjad, Syed Muhammad
    Mufti, Muhammad Rafiq
    Yousaf, Muhammad
    Aslam, Waqar
    Alshahrani, Reem
    Nemri, Nadhem
    Afzal, Humaira
    Khan, Muhammad Asghar
    Chen, Chien-Ming
    Wireless Communications and Mobile Computing, 2022, 2022
  • [50] Laser-Based Optical Wireless Communications for Internet of Things (IoT) Application
    Manie, Yibeltal Chanie
    Yao, Cheng-Kai
    Yeh, Tsung-Yuan
    Teng, Yu-Chieh
    Peng, Peng-Chun
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (23): : 24466 - 24476