Smart City Gnosys

Smart city article details

Title Security Provision For Protecting Intelligent Sensors And Zero Touch Devices By Using Blockchain Method For The Smart Cities
ID_Doc 47966
Authors Un Nisa K.; Alhudhaif A.; Qureshi K.N.; Hadi H.J.; Jeon G.
Year 2022
Published Microprocessors and Microsystems, 90
DOI http://dx.doi.org/10.1016/j.micpro.2022.104503
Abstract Internet of Things (IoT) networks has gained popularity due to their amazing and cost-effective services and one of the main areas in smart cities. The stability of these networks is based on stable and secure data transmission without any vulnerabilities present used devices. Distributed Denial of Services (DDoS) attacks have brought critical interruptions in IoT services and significantly damage the network. In DDoS attacks, attackers utilize botnets, with the capability of frequently exploiting the millions of IoT devices around the globe. After the source code of Mirai malware is loaded on GitHub, the threats are significantly increased. Manufacturer Usage Description (MUD) is an embedded software standard for IoT device makers to advertise device specifications, including the intended communication patterns when it connects to the network. Even though the MUD mechanism is promising exertion, still there is a need for evaluating its viability, recognize its limits, and upgrade its architecture to reduce shortcomings in its architecture as well as to increase its effectiveness. This standard neither identifies the vulnerability path before the creation of the MUD profile. Thus, it is possible to exploit an IoT device even after the MUD profile is issued to the device by manipulating the vulnerabilities in the device. By keeping in mind this situation, this paper discusses the limitations of MUD in detail and proposed a framework to identify the patch and default vulnerabilities by using blockchain method before the generation/creation of MUD profiles. The proposed framework can also mitigate open ports, DDoS attacks, and Brute force attacks. The experiment results show the identification, elimination, and sharing of vulnerability report with vendors and significantly minimized the risk of IoT device exploitation. © 2022 Elsevier B.V.
Author Keywords Authentication; Botnet; Brute force; Corda virtual machine; Ddos; Manufacturer usage description; Mirai; Owasp; Port scanning; Vulnerability


Similar Articles


Id Similarity Authors Title Published
19238 View0.894Thiruppathi K.; Jaidhar C.D.Detection And Mitigation Of Iot Based Ddos Attack Using Extended Mud Enabled Device Profiling TechniquesCommunications in Computer and Information Science, 2333 CCIS (2025)
12424 View0.887Shah Z.; Ullah I.; Li H.; Levula A.; Khurshid K.Blockchain Based Solutions To Mitigate Distributed Denial Of Service (Ddos) Attacks In The Internet Of Things (Iot): A SurveySensors, 22, 3 (2022)
33934 View0.87Shukla P.; Krishna C.R.; Patil N.V.Iot Traffic-Based Ddos Attacks Detection Mechanisms: A Comprehensive ReviewJournal of Supercomputing, 80, 7 (2024)
14580 View0.868El Houda Z.A.; Hafid A.; Khoukhi L.Co-Iot: A Collaborative Ddos Mitigation Scheme In Iot Environment Based On Blockchain Using SdnProceedings - IEEE Global Communications Conference, GLOBECOM (2019)
17581 View0.865Rajan D.M.; Sathya Priya S.Ddos Mitigation Techniques In Iot: A Survey2022 International Conference on IoT and Blockchain Technology, ICIBT 2022 (2022)
3409 View0.863Bediya A.K.; Kumar R.A Novel Intrusion Detection System For Internet Of Things Network SecurityResearch Anthology on Convergence of Blockchain, Internet of Things, and Security (2022)
12622 View0.861Babu E.S.; BKN S.; Nayak S.R.; Verma A.; Alqahtani F.; Tolba A.; Mukherjee A.Blockchain-Based Intrusion Detection System Of Iot Urban Data With Device Authentication Against Ddos AttacksComputers and Electrical Engineering, 103 (2022)
18989 View0.858Kim D.; Jeon S.; Shin J.; Seo J.T.Design The Iot Botnet Defense Process For Cybersecurity In Smart CityIntelligent Automation and Soft Computing, 37, 3 (2023)
11132 View0.853Khalifa O.O.; Japar D.F.B.; Rahman F.D.A.; Nasir H.Authentication Of Iot In Smart City Applications8th IEEE International Conference on Smart Instrumentation, Measurement and Applications, ICSIMA 2022 (2022)
37141 View0.851Brasilino L.R.B.; Swany M.Mitigating Ddos Flooding Attacks Against Iot Using Custom Hardware Modules2019 6th International Conference on Internet of Things: Systems, Management and Security, IOTSMS 2019 (2019)