2018
DOI: 10.1007/978-981-10-7868-2_22
|View full text |Cite
|
Sign up to set email alerts
|

Defending DDoS in the Insecure Internet of Things: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…Integrating blockchain with IoT technology can provide an effective solution for securityand privacy-related issues and the challenges of IoT gadgets. Many researchers [3,8,15,20,28,34,37,39,43] also address the collaboration of these technologies and provide a robust solution. Table 2 presents some work done by researchers in recent years to address IoT security threats and attacks.…”
Section: Intrusion Detection System 03 2020mentioning
confidence: 99%
“…Integrating blockchain with IoT technology can provide an effective solution for securityand privacy-related issues and the challenges of IoT gadgets. Many researchers [3,8,15,20,28,34,37,39,43] also address the collaboration of these technologies and provide a robust solution. Table 2 presents some work done by researchers in recent years to address IoT security threats and attacks.…”
Section: Intrusion Detection System 03 2020mentioning
confidence: 99%
“…DDoS is one of the types of attack that has been a significant challenge in the IoT environment. It comes in different types: flooding attacks (e.g., UDP flood or HTTP flood), amplification and IP spoofing, selective forwarding, hello floods, overloading, sinkholes, wormhole attacks, packet fragmentation attacks, exhaustive attacks and jamming attacks [89]. Figure 9 explains the DDoS attack mechanism.…”
Section: Denial Of Service (Dos/ddos) Attacksmentioning
confidence: 99%
“…IEEE 802.15.4 suffers from MAC layer attacks like collision attacks and back-off manipulation attack and also from physical layer attacks like power analysis attacks, jamming and exhaustion attacks. Jamming and exhaustion attacks are types of Denial-of-Service (DoS) attack which easily target IoT devices since they are resource constrained [15].…”
Section: A Paper Outlinementioning
confidence: 99%
“…For example, in the transport layer, the attacker can send superfluous connection requests to the victim node. A detailed classification of DDoS attacks in IoT is given in [15]. In such attacks, attackers gain control of the system by exploiting a number of software flaws.…”
Section: ) On the Basis Of Validation Strategymentioning
confidence: 99%