Smart City Gnosys

Smart city article details

Title Mitigating Ddos Flooding Attacks Against Iot Using Custom Hardware Modules
ID_Doc 37141
Authors Brasilino L.R.B.; Swany M.
Year 2019
Published 2019 6th International Conference on Internet of Things: Systems, Management and Security, IOTSMS 2019
DOI http://dx.doi.org/10.1109/IOTSMS48152.2019.8939176
Abstract The increasing number of deployed Internet of Things (IoT) devices is supporting a plethora of new applica-tions that enriches our daily lives. Smart Cities, for instance, leverage IoT to enable new ways of interactions among citizens, government, public services, healthcare, natural resources, waste and energy management. This synergy pushes the participation of individuals and organizations to new levels, strengthening democracy. However, the ubiquity of such devices and their unique characteristics of being numerous, constantly connected to the Internet and having constrained processing capabilities turned IoT into the new target of cyberattacks. Lately, we have witnessed an alarming increase in attack events towards IoT. The most common pattern is usually done in two phases. In the first phase, attackers exploit vulnerabilities in as many devices as possible, turning them into their bots. In the second phase, attackers order bots to dispatch as many request as possible towards a chosen target, flooding them with requests, attempting to exhaust device's computing resources: a Distributed Denial of Service (DDoS) is in place. The traditional targets of massive DDoS attacks are eminent organizations, like financial institutions, governments and online retailers. However, there is space still for small scale DDoS attacks towards IoT devices itself. The main objective would be bringing down IoT devices which firmwares are not easily exploitable, such as security/video surveillance devices. In this paper, we present a study on DDoS flooding attack mitigation where IoT devices are the targets. To that end, we propose a feasible architecture leveraging a CoAP Accelerator to effectively improve device's resilience. The CoAP Accelerator works in cooperation with the device's CPU, having a key role on CoAP message processing. The architecture was prototyped in a System-on-Chip (SoC) Field Programmable Gate Array (FPGA) and evaluations were carried out demonstrating how device's computing resources are not exhausted, thus allowing it to proper operate while under attack. © 2019 IEEE.
Author Keywords CoAP; Embedded Systems; FPGA; Internet of Things; IoT; Programmable Logic; Resilience; Security


Similar Articles


Id Similarity Authors Title Published
17581 View0.897Rajan D.M.; Sathya Priya S.Ddos Mitigation Techniques In Iot: A Survey2022 International Conference on IoT and Blockchain Technology, ICIBT 2022 (2022)
14580 View0.894El Houda Z.A.; Hafid A.; Khoukhi L.Co-Iot: A Collaborative Ddos Mitigation Scheme In Iot Environment Based On Blockchain Using SdnProceedings - IEEE Global Communications Conference, GLOBECOM (2019)
5530 View0.892Dantas Silva F.S.; Silva E.; Neto E.P.; Lemos M.; Venancio Neto A.J.; Esposito F.A Taxonomy Of Ddos Attack Mitigation Approaches Featured By Sdn Technologies In Iot ScenariosSensors (Switzerland), 20, 11 (2020)
12424 View0.891Shah Z.; Ullah I.; Li H.; Levula A.; Khurshid K.Blockchain Based Solutions To Mitigate Distributed Denial Of Service (Ddos) Attacks In The Internet Of Things (Iot): A SurveySensors, 22, 3 (2022)
33934 View0.889Shukla P.; Krishna C.R.; Patil N.V.Iot Traffic-Based Ddos Attacks Detection Mechanisms: A Comprehensive ReviewJournal of Supercomputing, 80, 7 (2024)
19238 View0.88Thiruppathi K.; Jaidhar C.D.Detection And Mitigation Of Iot Based Ddos Attack Using Extended Mud Enabled Device Profiling TechniquesCommunications in Computer and Information Science, 2333 CCIS (2025)
30623 View0.864Bamou A.; Khardioui M.; El Ouadghiri M.D.; Aghoutane B.Implementing And Evaluating An Intrusion Detection System For Denial Of Service Attacks In Iot EnvironmentsLecture Notes in Networks and Systems, 92 (2020)
1267 View0.863Lawall M.A.; Shaikh R.A.; Hassan S.R.A Ddos Attack Mitigation Framework For Iot Networks Using Fog ComputingProcedia Computer Science, 182 (2021)
15037 View0.861Abinaya M.; Prabakeran S.; Kalpana M.Comparative Evaluation On Various Machine Learning Strategies Based On Identification Of Ddos Attacks In Iot Environment2023 9th International Conference on Advanced Computing and Communication Systems, ICACCS 2023 (2023)
20623 View0.861Akhtar M.M.; Alasmari S.A.; Haidar S.W.; Alzubaidi A.A.Distributed Denial Of Service Attack Detection And Mitigation Strategy In 5G-Enabled Internet Of Things Networks With Adaptive Cascaded Gated Recurrent UnitPeer-to-Peer Networking and Applications, 18, 2 (2025)