A Distributed Mitigation Strategy against DoS attacks in Edge Computing

Internet of Things (IoT) is a platform where every day devices become smarter, every day processing becomes intelligent, and every day communication becomes informative. Numerous challenges prevent to secure IoT devices and their end-to-end communication in an IoT environment. In fact, the IoT security is still an open challenge. The purpose of this work is to examine a distributed strategy for mitigating Denial of Service (DoS) attacks against the fog node in an edge computing context in which the nodes exchange messages through Message Queue Telemetry Transport (MQTT) protocol. The proposed strategy is based on a dynamic message sending frequency of the lightweight nodes. It is also mitigated data tampering and eavesdropping by using Elliptic Curve Cryptography (ECC).

[1]  Juan-Carlos Cano,et al.  TEEM: Trust-based Energy-Efficient Distributed Monitoring for Mobile Ad-hoc Networks , 2017, 2017 Wireless Days.

[2]  Abdon Serianni,et al.  A two stages fuzzy logic approach for Internet of Things (IoT) wearable devices , 2016, 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[3]  Abdelouahed Zakari,et al.  New approach for securing communication over MQTT protocol A comparaison between RSA and Elliptic Curve , 2016, 2016 Third International Conference on Systems of Collaboration (SysCo).

[4]  Ramjee Prasad,et al.  Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) , 2010, CNSA.

[5]  Miroslav Voznák,et al.  Effective Packet Loss Estimation on VoIP Jitter Buffer , 2012, Networking Workshops.

[6]  Hakima Chaouchi,et al.  Introduction to the Internet of Things , 2013 .

[7]  Ion Bica,et al.  Mitigating DoS attacks in publish-subscribe IoT networks , 2017, 2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI).

[8]  Abdon Serianni,et al.  A real IoT device deployment for e-Health applications under lightweight communication protocols, activity classifier and edge data filtering , 2018, Comput. Commun..

[9]  Hannu Tenhunen,et al.  An Intrusion Detection System for Fog Computing and IoT based Logistic Systems using a Smart Data Approach , 2016 .

[10]  P. Balamuralidhar,et al.  Secure MQTT for Internet of Things (IoT) , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.

[11]  Robert John Walters,et al.  Fog Computing and the Internet of Things: A Review , 2018, Big Data Cogn. Comput..

[12]  Naveen K. Chilamkurti,et al.  Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing , 2017, Mobile Networks and Applications.

[13]  Yan Zhang,et al.  Mobile Edge Computing: A Survey , 2018, IEEE Internet of Things Journal.

[14]  Floriano De Rango,et al.  Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i , 2006, EURASIP J. Wirel. Commun. Netw..

[16]  Floriano De Rango,et al.  Evaluation of the Energy Consumption Introduced by a Trust Management Scheme on Mobile Ad-hoc Networks , 2015, J. Networks.

[17]  E. Mohammed,et al.  Elliptic curve cryptosystems on smart cards , 2001, Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186).

[18]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[19]  Eric Rescorla,et al.  SSL and TLS: Designing and Building Secure Systems , 2000 .