Analysis of Different Detection and Mitigation Algorithm of DDoS Attack in Software-Defined Internet of Things Framework: A Review

A decentralized type of network which senses the information from surrounding regions and then forwards it to the base station is known as Internet of Things (IoT). With the increasing demand of IoT applications, security is the major issue. Recently most popular attack in the world of internet is the distributed denial of service (DDoS) attack and for the safety management of IoT devices SDx paradigm can be used. In this paper, we will present the overview and applications of IoT and SDx paradigm, brief description of distributed denial of service attack as well as the different detection and mitigation algorithms. The study shows that security has extremely important for the reliable communication.

[1]  Jin B. Hong,et al.  A framework for automating security analysis of the internet of things , 2017, J. Netw. Comput. Appl..

[2]  Abbas Jamalipour,et al.  Wireless Body Area Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[3]  Athanasios Fevgas,et al.  iMuse Mobile Tour: A personalized multimedia museum guide opens to groups , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).

[4]  Amitav Mukherjee,et al.  Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.

[5]  Moussa Ayyash,et al.  Spectrum Assignment in Cognitive Radio Networks for Internet-of-Things Delay-Sensitive Applications Under Jamming Attacks , 2018, IEEE Internet of Things Journal.

[6]  Jiong Jin,et al.  Cyber security framework for Internet of Things-based Energy Internet , 2018, Future Gener. Comput. Syst..

[7]  Eui-Nam Huh,et al.  Cloud of Things: Integrating Internet of Things and cloud computing and the issues involved , 2014, Proceedings of 2014 11th International Bhurban Conference on Applied Sciences & Technology (IBCAST) Islamabad, Pakistan, 14th - 18th January, 2014.

[8]  Qi Shi,et al.  Requirements for a general framework for response to distributed denial-of-service , 2001, Seventeenth Annual Computer Security Applications Conference.

[9]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[10]  Guangxia Xu,et al.  SDN-Based Data Transfer Security for Internet of Things , 2018, IEEE Internet of Things Journal.

[11]  Ido Nevat,et al.  Secure Location of Things (SLOT): Mitigating Localization Spoofing Attacks in the Internet of Things , 2017, IEEE Internet of Things Journal.

[12]  Nick Feamster,et al.  Security and Privacy Analyses of Internet of Things Children’s Toys , 2019, IEEE Internet of Things Journal.

[13]  Simin Nadjm-Tehrani,et al.  Attitudes and Perceptions of IoT Security in Critical Societal Services , 2016, IEEE Access.

[14]  Daqiang Zhang,et al.  Searching in Internet of Things: Vision and Challenges , 2011, 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications.

[15]  Kun Yang,et al.  A DDoS Attack Detection and Mitigation With Software-Defined Internet of Things Framework , 2018, IEEE Access.

[16]  Daniele Miorandi,et al.  REATO: REActing TO Denial of Service attacks in the Internet of Things , 2018, Comput. Networks.

[17]  Michael Weber,et al.  Protecting web servers from distributed denial of service attacks , 2001, WWW '01.

[18]  F. Richard Yu,et al.  A Multi-Level DDoS Mitigation Framework for the Industrial Internet of Things , 2018, IEEE Communications Magazine.

[19]  Zhu Wang,et al.  Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things , 2013, J. Netw. Comput. Appl..

[20]  Huiming Wang,et al.  Enhancing the Physical Layer Security of Uplink Non-Orthogonal Multiple Access in Cellular Internet of Things , 2018, IEEE Access.

[21]  Smruti R. Sarangi,et al.  Internet of Things: Architectures, Protocols, and Applications , 2017, J. Electr. Comput. Eng..

[22]  Yunyoung Nam,et al.  Analysis of Lightweight Encryption Scheme for Fog-to-Things Communication , 2018, IEEE Access.

[23]  Chakib Bekara,et al.  Security Issues and Challenges for the IoT-based Smart Grid , 2014, FNC/MobiSPC.

[24]  Qi Han,et al.  Context-Aware Community: Integrating Contexts with Contacts for Proximity-Based Mobile Social Networking , 2013, 2013 IEEE International Conference on Distributed Computing in Sensor Systems.

[25]  Alexander Gluhak,et al.  A survey on facilities for experimental internet of things research , 2011, IEEE Communications Magazine.

[26]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[27]  Orestis Mavropoulos,et al.  Apparatus: A framework for security analysis in internet of things systems , 2019, Ad Hoc Networks.

[28]  Yoshinori Kobayashi,et al.  Recognizing groups of visitors for a robot museum guide tour , 2014, 2014 7th International Conference on Human System Interactions (HSI).

[29]  Yaw-Wen Kuo,et al.  Design of a Wireless Sensor Network-Based IoT Platform for Wide Area and Heterogeneous Applications , 2018, IEEE Sensors Journal.