Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey

被引:57
作者
Shah, Zawar [1 ]
Ullah, Imdad [2 ]
Li, Huiling [3 ]
Levula, Andrew [1 ]
Khurshid, Khawar [4 ]
机构
[1] Sydney Int Sch Technol & Commerce, Dept Informat Technol, Sydney, NSW 2000, Australia
[2] Prince Sattam Bin Abdulaziz Univ, Coll Comp Engn & Sci, Al Kharj 11942, Saudi Arabia
[3] Whitireia Community Polytech, Sch Informat Technol, Auckland 1010, New Zealand
[4] Natl Univ Sci & Technol NUST, Sch Elect Engn & Comp Sci SEECS, Islamabad 44000, Pakistan
基金
英国科研创新办公室;
关键词
blockchain; distributed denial of service (DDoS) attacks; internet of things (IoT); mitigation of DDoS attacks; DEFENSE-MECHANISMS; SMART CONTRACTS; BIG DATA; SECURITY; FUTURE; REQUIREMENTS; ARCHITECTURE; CHALLENGES; SYSTEM; TRUST;
D O I
10.3390/s22031094
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Internet of Things (IoT) devices are widely used in many industries including smart cities, smart agriculture, smart medical, smart logistics, etc. However, Distributed Denial of Service (DDoS) attacks pose a serious threat to the security of IoT. Attackers can easily exploit the vulnerabilities of IoT devices and control them as part of botnets to launch DDoS attacks. This is because IoT devices are resource-constrained with limited memory and computing resources. As an emerging technology, Blockchain has the potential to solve the security issues in IoT. Therefore, it is important to analyse various Blockchain-based solutions to mitigate DDoS attacks in IoT. In this survey, a detailed survey of various Blockchain-based solutions to mitigate DDoS attacks in IoT is carried out. First, we discuss how the IoT networks are vulnerable to DDoS attacks, its impact over IoT networks and associated services, the use of Blockchain as a potential technology to address DDoS attacks, in addition to challenges of Blockchain implementation in IoT. We then discuss various existing Blockchain-based solutions to mitigate the DDoS attacks in the IoT environment. Then, we classify existing Blockchain-based solutions into four categories i.e., Distributed Architecture-based solutions, Access Management-based solutions, Traffic Control-based solutions and the Ethereum Platform-based solutions. All the solutions are critically evaluated in terms of their working principles, the DDoS defense mechanism (i.e., prevention, detection, reaction), strengths and weaknesses. Finally, we discuss future research directions that can be explored to design and develop better Blockchain-based solutions to mitigate DDoS attacks in IoT.
引用
收藏
页数:26
相关论文
共 149 条
[1]   IoT-Inspired Framework of Intruder Detection for Smart Home Security Systems [J].
Ahanger, Tariq Ahamed ;
Tariq, Usman ;
Ibrahim, Atef ;
Ullah, Imdad ;
Bouteraa, Yassine .
ELECTRONICS, 2020, 9 (09) :1-17
[2]   Bringing Computation Closer toward the User Network: Is Edge Computing the Solution? [J].
Ahmed, Ejaz ;
Ahmed, Arif ;
Yaqoob, Ibrar ;
Shuja, Junaid ;
Gani, Abdullah ;
Imran, Muhammad ;
Shoaib, Muhammad .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (11) :138-144
[3]  
Ahmed Z, 2019, IEEE INT WORKSH COMP, DOI [10.1109/camad.2019.8858484, 10.1109/SCCS.2019.8852596]
[4]   Toward Secure Software Defined Vehicular Networks: Taxonomy, Requirements, and Open Issues [J].
Akhunzada, Adnan ;
Khan, Muhammad Khurram .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (07) :110-118
[5]  
Akshay P., 2019, P 5 INT C ADV COMP C
[6]  
Alghamdi A.M., 2018, P 2 INT C FUT NETW D
[7]  
Ali D., 2017, ARXIV171202969
[8]  
[Anonymous], 2014, Ethereum: A secure decentralised generalised transaction ledger
[9]  
[Anonymous], 2018, DELEGATED PROOF OF S
[10]  
[Anonymous], 2020, TOPICS CRYPTOLOGY CT