A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology

dc.creatorKhan, Zulfiqar Ali (TTU)
dc.creatorNamin, Akbar Siami (TTU)
dc.date.accessioned2023-03-10T20:48:23Z
dc.date.available2023-03-10T20:48:23Z
dc.date.issued2022
dc.description© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).en_US
dc.description.abstractThe Internet of Things (IoT) is a network of sensors that helps collect data 24/7 without human intervention. However, the network may suffer from problems such as the low battery, heterogeneity, and connectivity issues due to the lack of standards. Even though these problems can cause several performance hiccups, security issues need immediate attention because hackers access vital personal and financial information and then misuse it. These security issues can allow hackers to hijack IoT devices and then use them to establish a Botnet to launch a Distributed Denial of Service (DDoS) attack. Blockchain technology can provide security to IoT devices by providing secure authentication using public keys. Similarly, Smart Contracts (SCs) can improve the performance of the IoT–blockchain network through automation. However, surveyed work shows that the blockchain and SCs do not provide foolproof security; sometimes, attackers defeat these security mechanisms and initiate DDoS attacks. Thus, developers and security software engineers must be aware of different techniques to detect DDoS attacks. In this survey paper, we highlight different techniques to detect DDoS attacks. The novelty of our work is to classify the DDoS detection techniques according to blockchain technology. As a result, researchers can enhance their systems by using blockchain-based support for detecting threats. In addition, we provide general information about the studied systems and their workings. However, we cannot neglect the recent surveys. To that end, we compare the state-of-the-art DDoS surveys based on their data collection techniques and the discussed DDoS attacks on the IoT subsystems. The study of different IoT subsystems tells us that DDoS attacks also impact other computing systems, such as SCs, networking devices, and power grids. Hence, our work briefly describes DDoS attacks and their impacts on the above subsystems and IoT. For instance, due to DDoS attacks, the targeted computing systems suffer delays which cause tremendous financial and utility losses to the subscribers. Hence, we discuss the impacts of DDoS attacks in the context of associated systems. Finally, we discuss Machine-Learning algorithms, performance metrics, and the underlying technology of IoT systems so that the readers can grasp the detection techniques and the attack vectors. Moreover, associated systems such as Software-Defined Networking (SDN) and Field-Programmable Gate Arrays (FPGA) are a source of good security enhancement for IoT Networks. Thus, we include a detailed discussion of future development encompassing all major IoT subsystems.en_US
dc.identifier.citationKhan ZA, Namin AS. A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology. Electronics. 2022; 11(23):3892. https://doi.org/10.3390/electronics11233892en_US
dc.identifier.urihttps://doi.org/10.3390/electronics11233892
dc.identifier.urihttps://hdl.handle.net/2346/91785
dc.language.isoengen_US
dc.subjectvulnerabiltiesen_US
dc.subjectblockchainen_US
dc.subjectsmart contractsen_US
dc.subjectdetection techniquesen_US
dc.subjectmachine-learningen_US
dc.subjectinterplanetary file system (IPFS)en_US
dc.subjectIoT architectureen_US
dc.subjectDDoSen_US
dc.subjectdenial of serviceen_US
dc.titleA Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technologyen_US
dc.typeArticleen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Ali khan_Article.pdf
Size:
1.3 MB
Format:
Adobe Portable Document Format
Description:
Main article with TTU Libraries cover page

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.57 KB
Format:
Item-specific license agreed upon to submission
Description:

Collections