| Literature DB >> 35161838 |
Zawar Shah1, Imdad Ullah2, Huiling Li3, Andrew Levula1, Khawar Khurshid4.
Abstract
Internet of Things (IoT) devices are widely used in many industries including smart cities, smart agriculture, smart medical, smart logistics, etc. However, Distributed Denial of Service (DDoS) attacks pose a serious threat to the security of IoT. Attackers can easily exploit the vulnerabilities of IoT devices and control them as part of botnets to launch DDoS attacks. This is because IoT devices are resource-constrained with limited memory and computing resources. As an emerging technology, Blockchain has the potential to solve the security issues in IoT. Therefore, it is important to analyse various Blockchain-based solutions to mitigate DDoS attacks in IoT. In this survey, a detailed survey of various Blockchain-based solutions to mitigate DDoS attacks in IoT is carried out. First, we discuss how the IoT networks are vulnerable to DDoS attacks, its impact over IoT networks and associated services, the use of Blockchain as a potential technology to address DDoS attacks, in addition to challenges of Blockchain implementation in IoT. We then discuss various existing Blockchain-based solutions to mitigate the DDoS attacks in the IoT environment. Then, we classify existing Blockchain-based solutions into four categories i.e., Distributed Architecture-based solutions, Access Management-based solutions, Traffic Control-based solutions and the Ethereum Platform-based solutions. All the solutions are critically evaluated in terms of their working principles, the DDoS defense mechanism (i.e., prevention, detection, reaction), strengths and weaknesses. Finally, we discuss future research directions that can be explored to design and develop better Blockchain-based solutions to mitigate DDoS attacks in IoT.Entities:
Keywords: blockchain; distributed denial of service (DDoS) attacks; internet of things (IoT); mitigation of DDoS attacks
Year: 2022 PMID: 35161838 PMCID: PMC8840306 DOI: 10.3390/s22031094
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1A DDoS attack scenario in IoT networks as a Botnet to target legitimate servers.
Figure 2The Chain of Transactions within Blockchain [29], (a). the architecture of Blockchain (b), and a sample Merkle Tree is also shown.
Figure 3The signing and verification of messages (i.e., transaction data) in a Blockchain network.
Summary of literature works.
| Referenced Works | Explanation of Blockchain | Security Issues in IoT | DDoS Attacks | Benefits and Challenges of Combining IoT and Blockchain | General Defense Mechanisms against DDoS Attacks | Usage of Blockchain in Security | Solutions for DDoS Attacks in IoT |
|---|---|---|---|---|---|---|---|
| [ | Yes | Yes | No | Yes | No | No | No |
| [ | Yes | ||||||
| [ | No | No | |||||
| [ | Yes | ||||||
| [ | Yes | ||||||
| [ | |||||||
| [ | No | ||||||
| [ | Yes | ||||||
| [ | No | ||||||
| [ | No | No | Yes | No | Yes | ||
| [ | |||||||
| [ | |||||||
| [ | |||||||
| [ | |||||||
| [ | Yes | No | Yes | ||||
| [ | No | ||||||
| [ | Yes | No |
Distribution of research articles with various publishers.
| Resources | IEEE Xplore | Elsevier | ScienceDirect | Springer | ProQuest | ACM | |
|---|---|---|---|---|---|---|---|
| Conference | 32 | 0 | 238 | 159 | 429 | 52 | |
| Journals | 7 | 19 | 156 | 25 | |||
| Books | 24 | 200 | 22 | 345 | 2132 | 0 | |
| Early Access Articles | 1 | 0 | 0 | 0 | 0 | 0 | |
| Magazines | 1 | 0 | 0 | 0 | 20 | 0 | |
| Webpages | 0 | 0 | 0 | 0 | 16 | 0 | |
| Connect | 0 | 1 | 0 | 0 | 0 | 0 | |
| Survey Articiles | 0 | 0 | 76 | 0 | 0 | 0 | |
| Discussion | 0 | 0 | 1 | 0 | 0 | 0 | |
| Editorials | 0 | 0 | 1 | 0 | 0 | 0 | |
| Dissertations & Thesis | 0 | 0 | 0 | 0 | 20 | 0 | |
| Newsletter | 0 | 0 | 0 | 0 | 0 | 6 | |
| Reports | 0 | 0 | 0 | 0 | 0 | 0 | |
| Total | |||||||
| Total | 65 | 220 | 338 | 660 | 2617 | 83 | 3983 |
| Excluded (Books, etc.) | 26 | 201 | 100 | 345 | 2188 | 6 | 2866 |
| Included (Conf. Jour.) | 39 | 19 | 238 | 315 | 429 | 77 | 1117 |
| The excluded 2866 articles were Books, Reports, etc. Following is the breakdown of resultant 1117 research articles: | |||||||
| Blockchain-based Solutions = 34; Survey Articles = 12; Supporting Articles = 103; Remaining = 1117 − 149 = 968 | |||||||
| Finally, 968 research articles were excluded from our repository that were not classified as Blockchain-based Solutions. | |||||||
Figure 4Classification of the blockchain-based solutions to mitigate DDoS attacks in IoT.
Summary of distributed architecture based solutions.
| Solutions | Working Principle | DDoS Attack Mitigation | Weaknesses | Strengths | ||
|---|---|---|---|---|---|---|
| Prevention | Detection | Reaction | ||||
| [ | The systems are decentralised, and all the nodes share the ledger with redundancy data storage. | Yes | No | No | Nodes not under attack will be under heavy load. | Utilise natural feature of Blockchain to mitigate DDoS attacks. |
| [ | Use the distributed structure of Blockchain to mitigate DDoS attacks. | Yes | No | No | Specific node under attack can not work. | When DDoS attacks occur, the whole system continues to work. |
| [ | Uses the collaborative DDoS detection scheme utilising Blockchain and lightweight agents in IoT. | Yes | Yes | Yes | Details over the consensus algorithm on agents are missing, since these algorithms are supposed to be installed over limited resources hardware. | The use of lightweight agents exchange outbound traffic information to identify possible victims of DDoS attacks and is governed by a Blockchain smart contract, which ensures the integrity of both the procedure and exchanged information. |
Summary of access management based solutions.
| Solutions | Working Principle | DDoS Attack Mitigation | Weaknesses | Strengths | ||
|---|---|---|---|---|---|---|
| Prevention | Detection | Reaction | ||||
| PKAM [ | Based on public key to manage access. Reject requests if the requester’s public key is not registered or unavailable. | Yes | No | No | Cannot prevent DDoS attacks if attackers use multiple public keys. | Prevent DDoS attacks by limiting unauthorised access. |
| PUFAM [ | Use PUF to verify the authenticity of the IoT devices. All tampered, fake and cloned devices will be detected, which can prevent devices from becoming part of a botnet. | Yes | No | No | No experiments to prove the robustness against DDoS attacks. | It is a lightweight access management solution which is suitable for an IoT environment. |
Summary of traffic control based solutions.
| Solutions | Working Principle | DDoS Attack Mitigation | Weaknesses | Strengths | ||
|---|---|---|---|---|---|---|
| Prevention | Detection | Reaction | ||||
| SDNTCB [ | Combine SDN and Blockchain to monitor traffic to detect DDoS attacks. | Yes | Yes | Yes | Delay caused by processing of traffic is not calculated. | Sound mechanism to mitigate DDoS attacks. |
| TCMRT [ | If the threshold of maximum transaction rate is exceeded, the node manager updates to prevent the node from continuously sending transactions to the target nodes. | Yes | Yes | Yes | Can create too much traffic in the network. | A lightweight mechanism to mitigate DDoS attacks. |
| TCVT [ | Verify outgoing transactions to prevent nodes from becoming part of botnets. | Yes | No | No | Lack of protection of smart contract. | Does not utilise additional resources. |
| TCWM [ | A whitelisting mechanism is used to prevent DDoS attacks by filtering and eliminating malicious traffic. | Yes | Yes | Only [ | It is possible that illegal traffic complies with validation rules but perform harmful actions. | It is very quick to verify the access traffic and filter the unwanted traffic. |
Summary of the Ethereum Platform based solutions.
| Solutions | Working Principle | DDoS Attack Mitigation | Weaknesses | Strengths | ||
|---|---|---|---|---|---|---|
| Prevention | Detection | Reaction | ||||
| SSEP [ | Prevent attackers from sending too many service requests because of payment of transactions. | Yes | No | No | No mechanism for detecting and mitigating DDoS attacks. | Use existing Ethereum platform to prevent DDoS attacks. |
| SEPTC [ | Combines the Ethereum platform and traffic control to mitigate DDoS attacks. | Yes | Yes | Yes | Decrease in performance because of extra processing of data. | Use maximum rate of transactions and white listing mechanisms. |
| SEPA [ | Combines the Ethereum platform with authorisation to prevent DDoS attacks. | Yes | No | No | Do not consider detection and mitigation of DDoS attacks. | Can also prevent malicious users from accessing the systems. |
List of acronyms and their explanation.
| Acronyms | Explanation |
|---|---|
| DDoS | Distributed Denial of Service |
| IoT | Internet of Things |
| IIoT | Industrial Internet of Things |
| IoA | Internet of Anything |
| IoE | Internet of Everything |
| SIoT | Social Internet of Things |
| WoT | Web of Things |
| IoMT | Internet of Medical Things |
| SDIoT | Software-Defined Internet of Things |
| SDIoT-Edge | Software-Defined Internet of Things and Edge |
| SDN | Software Defined Networking |
| PoS | Proof of Stake |
| BFT | Byzantine Fault Tolerance |
| PoET | Proof of Elapsed Time |
| ECDSA | Elliptic Curve Digital Signature Algorithm |
| HTTP | Hyper Text Transfer Protocol |
| VoIP | Voice over Internet Protocol |
| SHA | Secure Hash Algorithm |
| 6LoWPAN | IPv6 over Low-Power Wireless Personal Area Networks |
| PKAM | Public Key based Access Management |
| PUF | Physically Unclonable Function based Access Management |
| PUFAM | PUF based Access Management |
| SDNTCB | SDN based Traffic Control via Blockchain |
| TCMRT | Traffic Control based on the Maximum Rate of Transactions |
| TCVT | Traffic Control based on Verification of Transactions |
| TCWM | Traffic Control based on Whitelisting Mechanism |
| TCP | Transmission Control Protocol |
| SYN | Synchronise |
| DNS | Domain Name System |
| CoAP | Constrained Application Protocol |
| PoW | Proof of Work |
| DPoS | Delegated-Proof-of-Stake |
| PoET | Proof of Elapsed Time |
| PoL | Proof of Luck |
| PoSp | Proof of Space |
| PBFT | Practical Byzantine Fault Tolerance |
| ePBFT | Excellent Practical Byzantine Fault Tolerance |
| PoL | Proof of Luck |
| CA | Certificate Authority |
| PK | Public Key |
| SC | Smart Contracts |
| BTC | Bitcoin |
| ICMP | Internet Control Message Protocol |
| SSEP | Solutions Simply based on Ethereum Platform |
| SEPTC | Ethereum Platform with Traffic Control |
| SEPA | Solutions based on the Ethereum Platform with Authorization |
| TLS | Transport Layer Security |
| CPU | Central Processing Unit |
| SSL | Secure Sockets Layer |
| IP | Internet Protocol |
| UDP | User Datagram Protocol |
| ICT | Information and Communication Technologies |
| ITU | International Telecommunication Union |
| RFID | Radio Frequency Identification |