Skip to main content

Analysis of Different Detection and Mitigation Algorithm of DDoS Attack in Software-Defined Internet of Things Framework: A Review

  • Chapter
  • First Online:
Recent Trends and Advances in Artificial Intelligence and Internet of Things

Part of the book series: Intelligent Systems Reference Library ((ISRL,volume 172))

Abstract

A decentralized type of network which senses the information from surrounding regions and then forwards it to the base station is known as Internet of Things (IoT). With the increasing demand of IoT applications, security is the major issue. Recently most popular attack in the world of internet is the distributed denial of service (DDoS) attack and for the safety management of IoT devices SDx paradigm can be used. In this paper, we will present the overview and applications of IoT and SDx paradigm, brief description of distributed denial of service attack as well as the different detection and mitigation algorithms. The study shows that security has extremely important for the reliable communication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gluhak, A., Krco, S., Nati, M., Pfisterer, D., Mitton, N., Razafindralambo, T.: A survey on facilities for experimental internet of things research. IEEE Commun. Mag. 49(11), 58–67 (2011)

    Article  Google Scholar 

  2. Fevgas, A., Tsompanopoulou, P., Bozanis, P.: iMuse mobile tour: a personalized multimedia museum guide opens to groups. In: Proceedings of 2011 IEEE Symposium on Computers and Communications (ISCC) (2011)

    Google Scholar 

  3. Kanda, A., Arai, M., Suzuki, R., Kobayashi, Y., Kuno, Y.: Recognizing groups of visitors for a robot museum guide tour. In: Proceedings of 2014 7th International Conference on Human System Interactions (HSI) (2014)

    Google Scholar 

  4. Yu, N., Han, Q.: Context-aware community: integrating contexts with contacts for proximity-based mobile social networking. In: Proceedings of 2013 IEEE International Conference on Distributed Computing in Sensor Systems (2013)

    Google Scholar 

  5. Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)

    Article  Google Scholar 

  6. Sethi, P., Sarangi, S.: Internet of Things: architectures, protocols, and applications. J. Electr. Comput. Eng. 2017, 1–25 (2017)

    Article  Google Scholar 

  7. Guo, B., Zhang, D., Wang, Z., Yu, Z., Zhou, X.: Opportunistic IoT: exploring the harmonious interaction between human and the Internet of Things. J. Netwo. Comput. Appl. 36(6), 1531–1539 (2013)

    Article  Google Scholar 

  8. Aazam, M., Khan, I., Alsaffar, A., Huh, E.: Cloud of things: integrating Internet of Things and cloud computing and the issues involved. In: Proceedings of 2014 11th International Bhurban Conference on Applied Sciences & Technology (IBCAST) Islamabad, Pakistan, 14th–18th January, 2014 (2014)

    Google Scholar 

  9. Zhang, D., Yang, L., Huang, H.: Searching in Internet of Things: vision and challenges. In: Proceedings of 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications (2011)

    Google Scholar 

  10. Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of things: vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497–1516 (2012)

    Article  Google Scholar 

  11. Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., Jamalipour, A.: Wireless body area networks: a survey. IEEE Communi. Surv. Tutorials 16(3), 1658–1686 (2014)

    Article  Google Scholar 

  12. Kuo, Y., Li, C., Jhang, J., Lin, S.: Design of a wireless sensor network-based IoT platform for wide area and heterogeneous applications. IEEE Sens. J. 18(12), 5187–5197 (2018)

    Article  Google Scholar 

  13. Vermesan, O., Friess, P.: Internet of Things—Global Technological and Societal Trends. River Publishers, Aalborg (2011)

    Google Scholar 

  14. Kargl, F., Maier, J., Weber, M.: Protecting web servers from distributed denial of service attacks. In: Proceedings of the Tenth International Conference on World Wide Web—WWW’01 (2001)

    Google Scholar 

  15. Bany Salameh, H., Almajali, S., Ayyash, M., Elgala, H.: Spectrum Assignment in cognitive radio networks for Internet-of-Things delay-sensitive applications under jamming attacks. IEEE Internet of Things J. 5(3), 1904–1913 (2018)

    Article  Google Scholar 

  16. Gresty, D., Shi, Q., Merabti, M.: Requirements for a general framework for response to distributed denial-of-service. In: Proceeding of Seventeenth Annual Computer Security Applications Conference (2002)

    Google Scholar 

  17. Yin, D., Zhang, L., Yang, K.: A DDoS attack detection and mitigation with software-defined Internet of Things framework. IEEE Access 6, 24694–24705 (2018)

    Article  Google Scholar 

  18. Bekara, C.: Security issues and challenges for the IoT-based smart grid. Procedia Comput. Sci. 34, 532–537 (2014)

    Article  Google Scholar 

  19. Mukherjee, A.: Physical-layer security in the Internet of Things: sensing and communication confidentiality under resource constraints. Proc. IEEE 103(10), 1747–1761 (2015)

    Article  Google Scholar 

  20. Asplund, M., Nadjm-Tehrani, S.: Attitudes and perceptions of IoT security in critical societal services. IEEE Access 4, 2130–2138 (2016)

    Article  Google Scholar 

  21. Ge, M., Hong, J., Guttmann, W., Kim, D.: A framework for automating security analysis of the Internet of Things. J. Netw. Comput. Appl. 83, 12–27 (2017)

    Article  Google Scholar 

  22. Zhang, P., Nagarajan, S., Nevat, I.: Secure location of things (SLOT): mitigating localization spoofing attacks in the Internet of Things. IEEE Internet of Things J. 4(6), 2199–2206 (2017)

    Article  Google Scholar 

  23. Yan, Q., Huang, W., Luo, X., Gong, Q., Yu, F.: A multi-level DDoS mitigation framework for the industrial Internet of Things. IEEE Commun. Mag. 56(2), 30–36 (2018)

    Article  Google Scholar 

  24. Sicari, S., Rizzardi, A., Miorandi, D., Coen-Porisini, A.: REATO: REActing TO denial of service attacks in the Internet of Things. Comput. Netw. 137, 37–48 (2018)

    Article  Google Scholar 

  25. Diro, A., Chilamkurti, N., Nam, Y.: Analysis of lightweight encryption scheme for fog-to-things communication. IEEE Access 6, 26820–26830 (2018)

    Google Scholar 

  26. Liu, Y., Kuang, Y., Xiao, Y., Xu, G.: SDN-based data transfer security for Internet of Things. IEEE Internet of Things J. 5(1), 257–268 (2018)

    Article  Google Scholar 

  27. Mavropoulos, O., Mouratidis, H., Fish, A., Panaousis, E.: Apparatus: a framework for security analysis in Internet of Things systems. Ad Hoc Netw. (2018)

    Google Scholar 

  28. Sani, A., Yuan, D., Jin, J., Gao, L., Yu, S., Dong, Z.: Cyber security framework for Internet of Things-based energy internet. Future Gener. Comput. Syst. 93, 849–859 (2019)

    Article  Google Scholar 

  29. Zhang, S., Xu, X., Wang, H., Peng, J., Zhang, D., Huang, K.: Enhancing the physical layer security of uplink non-orthogonal multiple access in cellular Internet of Things. IEEE Access 6, 58405–58417 (2018)

    Article  Google Scholar 

  30. Chu G.: Security and privacy analyses of Internet of Things children’s toys. IEEE Internet of Things J. 1–1 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajshree Srivastava .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kumar, N., Mittal, N., Thakur, P., Srivastava, R. (2020). Analysis of Different Detection and Mitigation Algorithm of DDoS Attack in Software-Defined Internet of Things Framework: A Review. In: Balas, V., Kumar, R., Srivastava, R. (eds) Recent Trends and Advances in Artificial Intelligence and Internet of Things. Intelligent Systems Reference Library, vol 172. Springer, Cham. https://doi.org/10.1007/978-3-030-32644-9_39

Download citation

Publish with us

Policies and ethics