Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey
Abstract
:1. Introduction
2. Background
2.1. Distributed Denial-of-Service (DDoS) Attacks
2.2. Blockchain
2.3. Internet of Things (IoT)
2.4. Integration of Blockchain and IoT
2.5. Benefits and Challenges of Using Blockchain in IoT
3. Literature Review
4. Research Methodology
- How the attackers exploit IoT networks as a botnet to launch DDoS attacks to target legitimate users, in addition to the severity of the DDoS attacks in IoT domains;
- How the Blockchain may be a candidate technology to mitigate the DDoS attacks;
- What are the current proposals of Blockchain-based solutions used to mitigate the DDoS attacks in the IoT domain, specifically, their working principles, and the DDoS defense mechanism (i.e., prevention, detection, reaction)?
- What are the strengths and weaknesses of the current solutions and the major challenges for designing and implementing comprehensive architectures for implementing Blockchain-based solutions to mitigate DDoS attacks in IoT networks?
- What are the open research areas and challenges for proposing secure Blockchain-based IoT networks (and to suggest the use of other supporting technologies) to mitigate DDoS attacks?
5. Blockchain Based Solutions to Mitigate DDoS Attacks in IoT
5.1. Distributed Architecture Based Solutions
Strengths and Weaknesses of Distributed Architecture Based Solutions
5.2. Access Management Based Solutions
5.2.1. Public Key Based Access Management (PKAM)
5.2.2. PUF Based Access Management (PUFAM)
5.2.3. Strengths and Weaknesses of Access Management Based Solutions
5.3. Traffic Control Based Solutions
5.3.1. Software Defined Networking (SDN) Based Traffic Control via Blockchain (SDNTCB)
5.3.2. Traffic Control Based on the Maximum Rate of Transactions (TCMRT)
5.3.3. Traffic Control Based on the Verification of Transactions (TCVT)
5.3.4. Traffic Control Based on the Whitelisting Mechanism (TCWM)
5.3.5. Strengths and Weaknesses of Traffic Control Based Solutions
5.4. The Ethereum Platform Based Solutions
5.4.1. Solutions Simply Based on the Ethereum Platform (SSEP)
5.4.2. Solutions Based on the Ethereum Platform with Traffic Control (SEPTC)
5.4.3. Solutions Based on the Ethereum Platform with Authorization (SEPA)
5.4.4. Strengths and Weaknesses of the Ethereum Platform Based Solutions
6. Future Research Directions
6.1. Protection of Smart Contracts
6.2. Portability of Mitigation Solutions
6.3. Combination of Prevention, Detection and Reaction Mechanisms for DDoS Attacks
6.4. Different Types of DDoS Attacks
6.5. DDoS Attacks on IoT Based on Recently Known Botnets
6.6. Large-Scale IoT Network and Scalability
6.7. Compatibility of Solutions with Different IoT Application Domains
6.8. Comprehensive Experiments
6.9. Hybrid Platforms for Securing IoT Using Blockchain
6.9.1. Edge Computing and Blockchain IoT
6.9.2. Software-Defined Internet of Things, Blockchain and Edge
6.9.3. High-Speed Cellular 5G/6G Networks
7. Conclusions
Author Contributions
Funding
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Rghioui, A.; Oumnad, A. Internet of things: Surveys for measuring human activities from everywhere. Int. J. Electr. Comput. Eng. 2017, 7, 2474–2482. [Google Scholar] [CrossRef]
- IHS Market. The Internet of Things: A Moment, Not a Market. Available online: https://cdn.ihs.com/www/pdf/IoT_ebook.pdf (accessed on 18 November 2021).
- Li, S.; Tryfonas, T.; Li, H. The Internet of things: A security point of view. Internet Res. 2016, 26, 337–359. [Google Scholar] [CrossRef] [Green Version]
- Rashmi, D.; Devadkar, K. Understanding DDoS attack & its effect in cloud environment. Procedia Comput. Sci. 2015, 49, 202–210. [Google Scholar]
- Mohammad, M.; Abdolee, R.; Tazekand, B.M. On the convergence of blockchain and Internet of Things (IoT) technologies. arXiv 2019, arXiv:1904.01936. [Google Scholar]
- Castagna, L.R.; Michelin, R.A.; Neu, C.V.; Zorzo, A.F. Distributed access control on IoT ledger-based architecture. In Proceedings of the IEEE/IFIP Network Operations and Management Symposium, Taipei, Taiwan, 23–27 April 2018. [Google Scholar]
- Ujjwal, G.; Cui, P.; Skjellum, A. Ensuring proof-of-authenticity of IoT edge devices using blockchain technology. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings), Halifax, NS, Canada, 30 July–3 August 2018. [Google Scholar]
- Kajwadkar, S.; Jain, V.K. A novel algorithm for DoS and DDoS attack detection in Internet of things. In Proceedings of the Conference on Information and Communication Technology (CICT), Jabalpur, India, 26–28 October 2018. [Google Scholar]
- Da, Y.; Zhang, L.; Yang, K. A DDoS attack detection and mitigation with software-defined Internet of things framework. IEEE Access 2018, 6, 24694–24705. [Google Scholar]
- Tamotsu, K.; Fukushi, M.; Hirano, Y.; Fujita, Y.; Hamamoto, Y. An NTP-based detection module for DDoS attacks on IoT. In Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), Taipei, Taiwan, 12–14 June 2017. [Google Scholar]
- Modi, K.; Quadir, A. Detection and prevention of DDoS attacks on the cloud using double-TCP mechanism and HMM-based architecture. Int. J. Cloud Comput. Serv. Sci. 2014, 3, 113. [Google Scholar]
- Sriman, I.; Banerjee, A.; Ganapathy, G. A fuzzy logic based defense mechanism against distributed denial of service attack in cloud computing environment. Int. J. Commun. Netw. Inf. Secur. (IJCNIS) 2014, 6, 233–245. [Google Scholar]
- Dargahi, T.P.J.T.; Dehghantanha, A.; Parizi, R.M.; Choo, K.K.R. A systematic literature review of blockchain cyber security. Digit. Commun. Netw. 2020, 6, 147–156. [Google Scholar]
- Hany, A.; Alenezi, A.; Alassafi, M.O.; Wills, G. Blockchain with Internet of things: Benefits, challenges, and future directions. Int. J. Intell. Syst. Appl. 2018, 10, 40–48. [Google Scholar]
- Horn, N.J.; Koohang, A.; Paliszkiewicz, J. The Internet of things: Review and theoretical framework. Expert Syst. Appl. 2019, 133, 97–108. [Google Scholar]
- Wani, S.; Imthiyas, M.; Almohamedh, H.; Alhamed, K.M.; AlMotairi, S.; Gulzar, Y. Distributed Denial of Service (DDoS) Mitigation Using Blockchain—A Comprehensive Insight. Symmetry 2021, 13, 227. [Google Scholar] [CrossRef]
- Shammar, E.A.; Zahary, A.T.; Al-Shargabi, A.A. A Survey of IoT and Blockchain Integration: Security Perspective. IEEE Access 2021, 9, 156114–156150. [Google Scholar] [CrossRef]
- Li, D.X.; Yang, L.; Ling, L. Embedding blockchain technology into IoT for security: A survey. IEEE Internet Things J. 2021, 8, 10452–10473. [Google Scholar]
- Banerjee, M.; Lee, J.; Chen, Q.; Choo, K.K.R. Blockchain-based security layer for identification and isolation of malicious things in IoT: A conceptual design. In Proceedings of the IEEE 2018 27th International Conference on Computer Communication and Networks (ICCCN), Hangzhou, China, 30 July–2 August 2018; pp. 1–6. [Google Scholar]
- Ahmad, K.M.; Salah, K. IoT security: Review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 2018, 82, 395–411. [Google Scholar]
- Krushang, S.; Upadhyay, H. A survey: DDOS attack on Internet of things. Int. J. Eng. Res. Dev. 2014, 10, 56–63. [Google Scholar]
- Zibin, Z.; Xie, S.; Dai, Ho.; Chen, X. Blockchain challenges and opportunities: A survey. Int. J. Web Grid Serv. 2018, 14, 352–357. [Google Scholar]
- Michael, C.; Pattanayak, P.; Verma, S.; Kalyanaraman, V. Blockchain technology: Beyond bitcoin. Appl. Innov. 2016, 2, 71. [Google Scholar]
- Andrew, C.; Hammoudeh, M.; Aldabbas, O. Defence for distributed denial of service attacks in cloud computing. Procedia Comput. Sci. 2015, 73, 490–497. [Google Scholar]
- KrebsonSecurity “Study: Attack on KrebsOnSecurity Cost IoT Device Owners $323 K”. Available online: https://krebsonsecurity.com/2018/05/study-attack-on-krebsonsecurity-cost-iot-device-owners-323k/ (accessed on 18 November 2021).
- Record-Breaking DDoS Reportedly Delivered by >145 k Hacked Cameras. Available online: https://arstechnica.com/information-technology/2016/09/botnet-of-145k-cameras-reportedly-deliver-internets-biggest-ddos-ever/ (accessed on 18 November 2021).
- Zhang, C.; Green, R. Communication security in internet of thing: Preventive measure and avoid DDoS attack over IoT network. In Proceedings of the 18th Symposium on Communications & Networking, Alexandria, VA, USA, 12–15 April 2015. [Google Scholar]
- Ahmed, K.; Andrew, M.; Elaine, S.; Zikai, W.; Charalampos, P. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In Proceedings of the IEEE 2016 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 22–26 May 2016; pp. 839–858. [Google Scholar]
- Satoshi, N. Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 31 October 2008).
- Ullah, I.; Boreli, R.; Kanhere, S.S. Privacy in targeted advertising: A survey. arXiv 2020, arXiv:2009.06861. [Google Scholar]
- Ullah, I.; Kanhere, S.S.; Boreli, R. Privacy-preserving targeted mobile advertising: A Blockchain-based framework for mobile ads. arXiv 2020, arXiv:2008.10479. [Google Scholar]
- Dorri, A.; Steger, M.; Kanhere, S.S.; Jurdak, R. Blockchain: A distributed solution to automotive security and privacy. IEEE Commun. Mag. 2017, 55, 119–125. [Google Scholar] [CrossRef] [Green Version]
- Christidis, K.; Michael, D. Blockchains and smart contracts for the internet of things. IEEE Access 2016, 4, 2292–2303. [Google Scholar] [CrossRef]
- Peters, G.W.; Panayi, E. Understanding modern banking ledgers through blockchain technologies: Future of transaction processing and smart contracts on the internet of money. In Banking Beyond Banks and Money; Springer: Cham, Switzerland, 2016; pp. 239–278. [Google Scholar]
- Rossi, A.H.; Kurniawan, N.B.; Suhardi. Blockchain technology and implementation: A systematic literature review. In Proceedings of the International Conference on Information Technology Systems and Innovation (ICITSI), Bandung, Indonesia, 22–26 October 2018.
- Gramoli, V. From blockchain consensus back to Byzantine consensus. Future Gener. Comput. Syst. 2020, 107, 760–769. [Google Scholar] [CrossRef]
- Vukolić, M. The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication. In Springer International Workshop on Open Problems in Network Security; iNetSec: Zurich, Switzerland, 29 October 2015; pp. 112–125. [Google Scholar]
- Wood, G. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 2014, 151, 1–32. [Google Scholar]
- Ferdous, M.S.; Chowdhury, M.J.M.; Hoque, M.A. “A survey of consensus algorithms in public blockchain systems for crypto-currencies. J. Netw. Comput. Appl. 2021, 182, 103035. [Google Scholar] [CrossRef]
- Xiao, Y.; Zhang, N.; Lou, W.; Hou, Y.T. A survey of distributed consensus protocols for blockchain networks. IEEE Commun. Surv. Tutor. 2020, 22, 1432–1465. [Google Scholar] [CrossRef] [Green Version]
- Nguyen, G.-T.; Kim, K. A survey about consensus algorithms used in blockchain. J. Inf. Process. Syst. Korea Inf. Process. Soc. 2018, 14, 101–128. [Google Scholar]
- Bamakan, S.M.H.; Motavali, A.; Bondarti, A.B. A survey of blockchain consensus algorithms performance evaluation criteria. Expert Syst. Appl. 2020, 154, 113385. [Google Scholar] [CrossRef]
- Garay, J.; Kiayias, A. Sok: A consensus taxonomy in the blockchain era. In Proceedings of the Cryptographers’ Track at the RSA Conference, San Francisco, CA, USA, 24–28 February 2020; Springer: Cham, Switzerland, 2020; pp. 284–318. [Google Scholar]
- Castro, M.; Liskov, B. Practical Byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. (TOCS) 2002, 20, 398–461. [Google Scholar] [CrossRef]
- He, L.; Hou, Z. An improvement of consensus fault tolerant algorithm applied to alliance chain. In Proceedings of the IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC), Beijing, China, 12–14 July 2019; pp. 1–4. [Google Scholar]
- Miller, A.; Xia, Y.; Croman, K.; Shi, E.; Song, D. The honey badger of BFT protocols. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 31–42. [Google Scholar]
- Delegated Proof-of-Stake Consensus. 2018. Available online: https://how.bitshares.works/en/master/technology/dpos.html (accessed on 18 November 2021).
- Qu, X.; Wang, S.; Hu, Q.; Cheng, X. Proof of Federated Learning: A Novel Energy-Recycling Consensus Algorithm. IEEE Trans. Parallel Distrib. Syst. 2021, 32, 2074–2085. [Google Scholar] [CrossRef]
- Intel. Sawtooth. 2021. Available online: https://www.hyperledger.org/use/sawtooth (accessed on 18 November 2021).
- Milutinovic, M.; He, W.; Wu, H.; Kanwa, M. Proof of luck: An efficient Blockchain consensus protocol. In Proceedings of the 1st Workshop on System Software for Trusted Execution, New York, NY, USA, 12–16 December 2016. [Google Scholar]
- Park, S.; Kwon, A.; Fuchsbauer, G.; Gai, P.; Alwen, J.; Pietrzak, K. SpaceMint: A Cryptocurrency Based on Proofs of Space. Cryptology ePrint Archive, Report 2015/528. 2015. Available online: https://eprint.iacr.org/2015/528 (accessed on 18 November 2021).
- Daniel, L. Delegated proof-of-stake (DPoS). Bitshare Whitepaper 2014, 81, 85. [Google Scholar]
- Johnson, D.; Menezes, A.; Vanstone, S. The elliptic curve digital signature algorithm (ECDSA). Springer Int. J. Inf. Secur. 2001, 1, 36–63. [Google Scholar] [CrossRef]
- Wu, Y.-C.; Tseng, H.-R.; Yang, W.; Jan, R.-H. DDoS detection and traceback with decision tree and grey relational analysis. Int. J. Hoc Ubiquitous Comput. 2011, 7, 121–136. [Google Scholar] [CrossRef] [Green Version]
- Cabrera, J.B.D.; Lewis, L.; Qin, X.; Lee, W.; Prasanth, R.K.; Ravichandran, B.; Mehra, R.K. Proactive detection of distributed denial of service attacks using mib traffic variables-a feasibility study. In Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings, Seattle, WA, USA, 14–18 May 2001; pp. 609–622. [Google Scholar]
- Jalili, R.; Imani-Mehr, F.; Amini, M.; Shahriari, H.R. Detection of Distributed Denial of Service Attacks Using Statistical Pre-Processor and Unsupervised Neural Networks; Springer International Conference on Information Security Practice and Experience: Berlin/Heidelberg, Germany, 2005. [Google Scholar]
- Ahanger, T.A.; Tariq, U.; Ibrahim, A.; Ullah, I.; Bouteraa, Y. Iot-inspired framework of intruder detection for smart home security systems. Electronics 2020, 9, 1361. [Google Scholar] [CrossRef]
- Rafique, W.; Qi, L.; Yaqoob, I.; Imran, M.; Rasool, R.U.; Dou, W. Complementing IoT services through software defined networking and edge computing: A comprehensive survey. IEEE Commun. Surv. Tutor. 2020, 22, 1761–1804. [Google Scholar] [CrossRef]
- Shah, Z.; Levula, A.; Khurshid, K.; Ahmed, J.; Ullah, I.; Singh, S. Routing Protocols for Mobile Internet of Things (IoT): A Survey on Challenges and Solutions. Electronics 2021, 10, 2320. [Google Scholar] [CrossRef]
- Li, M.; Liu, J.; Long, D. Probability principle of a reliable approach to detect signs of DDOS flood attacks. In Proceedings of the International Conference on Parallel and Distributed Computing: Applications and Technologies, Singapore, 8–10 December 2004; Springer: Berlin/Heidelberg, Germany, 2004; pp. 596–599. [Google Scholar]
- Peng, T.; Leckie, C.; Ramamohanarao, K. Protection from distributed denial of service attacks using history-based IP filtering. In Proceedings of the IEEE International Conference on Communications, ICC’2003, Anchorage, AK, USA, 11–15 May 2003; Volume 3, pp. 482–486. [Google Scholar]
- Xu, X.; Liu, Q.; Luo, Y.; Peng, K.; Zhang, X.; Meng, S.; Qi, L. A computation offloading method over big data for IoT-enabled cloud-edge computing. Future Gener. Comput. Syst. 2019, 95, 522–533. [Google Scholar] [CrossRef]
- Tu, L.; Liu, S.; Wang, Y.; Zhang, C.; Li, P. An optimized cluster storage method for real-time big data in Internet of Things. J. Supercomput. 2020, 76, 5175–5191. [Google Scholar] [CrossRef]
- Habib, S.; Qadir, J.; Ali, A.; Habib, D.; Li, M.; Sathiaseelan, A. The past, present, and future of transport-layer multipath. J. Netw. Comput. Appl. 2016, 75, 236–258. [Google Scholar] [CrossRef] [Green Version]
- Vasseur, J.P.; Dunkels, A. Chapter 3-Why IP for Smart Objects? In Interconnecting Smart Objects with IP; Morgan Kaufmann: Boston, MA, USA, 2010. [Google Scholar]
- Sollins, K.R. IoT big data security and privacy versus innovation. IEEE Internet Things J. 2019, 6, 1628–1635. [Google Scholar] [CrossRef]
- Olaniyan, R.; Fadahunsi, O.; Maheswaran, M.; Zhani, M.F. Opportunistic edge computing: Concepts, opportunities and research challenges. Future Gener. Comput. Syst. 2018, 89, 633–645. [Google Scholar] [CrossRef] [Green Version]
- Ahmed, E.; Ahmed, A.; Yaqoob, I.; Shuja, J.; Gani, A.; Imran, M.; Shoaib, M. Bringing computation closer toward the user network: Is edge computing the solution? IEEE Commun. Mag. 2017, 55, 138–144. [Google Scholar] [CrossRef]
- Latif, K.; Javaid, N.; Ullah, I.; Kaleem, Z.; Abbas Malik, Z.; Nguyen, L.D. DIEER: Delay-intolerant energy-efficient routing with sink mobility in underwater wireless sensor networks. Sensors 2020, 20, 3467. [Google Scholar] [CrossRef]
- Dizdarević, J.; Carpio, F.; Jukan, A.; Masip-Bruin, X. A survey of communication protocols for internet of things and related challenges of fog and cloud computing integration. ACM Comput. Surv. (CSUR) 2019, 51, 1–29. [Google Scholar] [CrossRef]
- Yaqoob, I.; Hashem, I.A.T.; Ahmed, A.; Kazmi, S.M.A.; Hong, C.S. Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges. Future Gener. Comput. Syst. 2019, 92, 265–275. [Google Scholar] [CrossRef]
- Ferrer, A.J.; Marquès, J.M.; Jorba, J. Towards the decentralised cloud: Survey on approaches and challenges for mobile, ad hoc, and edge computing. ACM Comput. Surv. (CSUR) 2019, 51, 1–36. [Google Scholar] [CrossRef]
- Baresi, L.; Mendonça, D.F.; Garriga, M.; Guinea, S.; Quattrocchi, G. A unified model for the mobile-edge-cloud continuum. ACM Trans. Internet Technol. (TOIT) 2019, 19, 1–21. [Google Scholar] [CrossRef]
- Wang, S.; Zhao, Y.; Huang, L.; Xu, J.; Hsu, C.-H. QoS prediction for service recommendations in mobile edge computing. J. Parallel Distrib. Comput. 2019, 127, 134–144. [Google Scholar] [CrossRef]
- Farris, I.; Taleb, T.; Khettab, Y.; Song, J. A survey on emerging SDN and NFV security mechanisms for IoT systems. IEEE Commun. Surv. Tutor. 2018, 21, 812–837. [Google Scholar] [CrossRef]
- Khan, S.; Gani, A.; Wahab, A.W.A.; Guizani, M.; Khan, M.K. Topology discovery in software defined networks: Threats, taxonomy, and state-of-the-art. IEEE Commun. Surv. Tutor. 2016, 19, 303–324. [Google Scholar] [CrossRef]
- Zarca, A.M.; Bernabe, J.B.; Trapero, R.; Rivera, D.; Villalobos, J.; Skarmeta, A.; Bianchi, S.; Zafeiropoulos, A.; Gouvas, P. Security management architecture for NFV/SDN-aware IoT systems. IEEE Internet Things J. 2019, 6, 8005–8020. [Google Scholar] [CrossRef]
- Akhunzada, A.; Khan, M.K. Toward secure software defined vehicular networks: Taxonomy, requirements, and open issues. IEEE Commun. Mag. 2017, 55, 110–118. [Google Scholar] [CrossRef]
- Darabseh, A.; Freris, N.M. A software-defined architecture for control of IoT cyberphysical systems. Clust. Comput. 2019, 22, 1107–1122. [Google Scholar] [CrossRef] [Green Version]
- Jararweh, Y.; Al-Ayyoub, M.; Benkhelifa, E. An experimental framework for future smart cities using data fusion and software defined systems: The case of environmental monitoring for smart healthcare. Future Gener. Comput. Syst. 2020, 107, 883–897. [Google Scholar] [CrossRef]
- Haque, I.; Nurujjaman, M.; Harms, J.; Abu-Ghazaleh, N. SDSense: An agile and flexible SDN-based framework for wireless sensor networks. IEEE Trans. Veh. Technol. 2018, 68, 1866–1876. [Google Scholar] [CrossRef]
- Alam, I.; Sharif, K.; Li, F.; Latif, Z.; Karim, M.M.; Nour, B.; Biswas, S.; Wang, Y. IoT virtualization: A survey of software definition & function virtualization techniques for internet of things. arXiv 2019, arXiv:1902.10910. [Google Scholar]
- Uddin, M.; Nadeem, T.; Nukavarapu, S. Extreme SDN framework for IoT and mobile applications flexible privacy at the edge. In Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom), Kyoto, Japan, 11–15 March 2019; pp. 1–11. [Google Scholar]
- Sairam, R.; Bhunia, S.S.; Thangavelu, V.; Gurusamy, M. NETRA: Enhancing IoT security using NFV-based edge traffic analysis. IEEE Sens. J. 2019, 19, 4660–4671. [Google Scholar] [CrossRef] [Green Version]
- Panarello, A.; Tapas, N.; Merlino, G.; Longo, F.; Puliafito, A. Blockchain and iot integration: A systematic survey. Sensors 2018, 18, 2575. [Google Scholar] [CrossRef] [Green Version]
- Kolias, C.; Kambourakis, G.; Stavrou, A.; Voas, J. DDoS in the IoT: Mirai and other botnets. IEEE Comput. 2017, 50, 80–84. [Google Scholar] [CrossRef]
- Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013, 29, 1645–1660. [Google Scholar] [CrossRef] [Green Version]
- Sicari, S.; Rizzardi, A.; Cappiello, C.; Miorandi, D.; Coen-Porisini, A. Toward data governance in the internet of things. In New Advances in the Internet of Things; Springer: Cham, Switzerland, 2018; pp. 59–74. [Google Scholar]
- Hawlitschek, F.; Notheisen, B.; Teubner, T. The limits of trust-free systems: A literature review on blockchain technology and trust in the sharing economy. Electron. Commer. Res. Appl. 2018, 29, 50–63. [Google Scholar] [CrossRef]
- Imran, M.; Abolhasan, M.; Abbas, H.; Ni, W. Blockchain’s adoption in IoT: The challenges, and a way forward. J. Netw. Comput. Appl. 2018, 125, 251–279. [Google Scholar]
- Mocnej, J.; Seah, W.K.G.; Pekar, A.; Zolotova, I. Decentralised IoT architecture for efficient resources utilisation. IFAC-PapersOnLine 2018, 51, 168–173. [Google Scholar] [CrossRef]
- Xu, W.; Zha, X.; Ni, W.; Liu, R.P.; Guo, Y.J.; Niu, X.; Zheng, K. Survey on blockchain for Internet of Things. Comput. Commun. 2019, 136, 10–29. [Google Scholar]
- Ana, R.; Martín, C.; Chen, J.; Soler, E.; Díaz, M. On blockchain and its integration with IoT. Challenges and opportunities. Future Gener. Comput. Syst. 2018, 88, 173–190. [Google Scholar]
- Amine, F.M.; Derdour, M.; Mukherjee, M.; Derhab, A.; Maglaras, L.; Janicke, H. Blockchain technologies for the Internet of things: Research issues and challenges. IEEE Internet Things J. 2018, 6, 2188–2204. [Google Scholar]
- Ferreira, J.E.; Chicarino, V.R.L.; de Albuquerque, C.V.N.; Rocha, A.A.D.A. A survey of how to use blockchain to secure Internet of things and the stalker attack. Secur. Commun. Netw. 2018, 7, 1–27. [Google Scholar]
- Mandrita, B.; Lee, J.; Choo, Ki.R. A blockchain future for Internet of things security: A position paper. Digit. Commun. Netw. 2018, 4, 149–160. [Google Scholar]
- Sana, M.; Karim, A.; Safdar, Z.; Safdar, K.; Ahmed, E.; Imran, M. Securing IoTs in distributed blockchain: Analysis, requirements and open issues. Future Gener. Comput. Syst. 2019, 100, 325–343. [Google Scholar]
- Riza’ain, Y.A.; Udzir, N.I.; Selamat, A. Systematic literature review and taxonomy for DDoS attack detection and prediction. Int. J. Digit. Enterp. Technol. 2019, 1, 292–315. [Google Scholar]
- Jaafar Ghafar, A.; Shahidan, M. Abdullah and Saifuladli Ismail. Review of Recent Detection Methods for HTTP DDoS Attack. J. Comput. Netw. Commun. 2019, 2019, 1–10. [Google Scholar] [CrossRef] [Green Version]
- Taghizadeh, M.M. Defense mechanisms against Distributed Denial of Service attacks: A survey. Comput. Electr. Eng. 2018, 72, 26–38. [Google Scholar]
- Jeet, K.; Gandhi, A.B. Security and DDOS mechanisms in Internet of things. Int. J. Adv. Res. Comput. Sci. 2017, 8, 261–265. [Google Scholar]
- Hanan, M.; Alghamdi, A.M. DDoS attacks on the Internet of things and their prevention methods. In Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, New York, NY, USA, 26–27 June 2018. [Google Scholar]
- Malik Manisha and Maitreyee Dutta. Defending DDoS in the Insecure Internet of things: A Survey. In Artificial Intelligence and Evolutionary Computations in Engineering Systems; Springer: Singapore, 2018. [Google Scholar]
- Ziyan, W.; Dong, X.; Li, Y.; Fang, L.; Chen, P. IoT security model and performance evaluation: A blockchain approach. In Proceedings of the International Conference on Network Infrastructure and Digital Content (IC-NIDC), Guiyang, China, 22–24 August 2018. [Google Scholar]
- Li, D.; Peng, W.; Deng, W.; Gai, F. A blockchain-based authentication and security mechanism for IoT. In Proceedings of the 27th International Conference on Computer Communication and Networks (ICCCN), Hangzhou, China, 30 July–2 August 2018. [Google Scholar]
- Spathoulas, G.; Giachoudis, N.; Damiris, G.-P.; Theodoridis, G. Collaborative blockchain-based detection of distributed denial of service attacks based on internet of things botnets. Future Internet 2019, 11, 226. [Google Scholar] [CrossRef] [Green Version]
- Dhar, D.A.; Srivastava, G.; Dhar, S.; Singh, R. A decentralized privacy-preserving healthcare blockchain for IoT. Sensors 2019, 19, 326. [Google Scholar] [CrossRef] [Green Version]
- Ali, D.; Kanhere, S.S.; Jurdak, R. Blockchain in internet of things: Challenges and solutions. arXiv 2016, arXiv:1608.05187. [Google Scholar]
- Sun, S.; Du, R.; Chen, S.; Li, W. Blockchain-Based IoT Access Control System: Towards Security, Lightweight, and Cross-Domain. IEEE Access 2021, 9, 36868–36878. [Google Scholar] [CrossRef]
- Pinchen, C.; Guin, U. Countering botnet of things using blockchain-based authenticity framework. In Proceedings of the IEEE Computer Society Annual Symposium on VLSI (ISVLSI), Miami, FL, USA, 15–17 July 2019. [Google Scholar]
- Cui, Y.; Qian, Q.; Guo, C.; Shen, G.; Tian, Y.; Xing, H.; Yan, L. Towards DDoS detection mechanisms in Software-Defined Networking. J. Netw. Comput. Appl. 2021, 190, 103156. [Google Scholar] [CrossRef]
- Shailendra, R.; Kwon, B.W.; Park, J.H. BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network. J. Netw. Comput. Appl. 2019, 143, 167–177. [Google Scholar]
- Qaisar, S.; Basit, A. DDoS botnet prevention using blockchain in software defined Internet of things. In Proceedings of the 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST), Islamabad, Pakistan, 8–12 January 2019. [Google Scholar]
- Bruno, R.; Bocek, T.; Lareida, A.; Hausheer, D.; Rafati, S.; Stiller, B. A blockchain-based architecture for collaborative DDoS mitigation with smart contracts. In Proceedings of the IFIP International Conference on Autonomous Infrastructure, Management and Security, Zurich, Switzerland, 10–13 July 2017. [Google Scholar]
- Kumar, S.P.; Singh, S.; Jeong, Yo.; Park, J.H. Distblocknet: A distributed blockchains-based secure SDN architecture for IoT networks. IEEE Commun. Mag. 2017, 55, 78–85. [Google Scholar]
- Kotaro, K.; Gangwar, S.; Podili, P. Trust list: Internet-wide and distributed IoT traffic management using blockchain and SDN. In Proceedings of the IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 5–8 February 2018. [Google Scholar]
- Abou El Houda, Z.; Hafid, A.; Khoukhi, L. Co-IoT: A collaborative DDoS mitigation scheme in IoT environment based on blockchain using SDN. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar]
- Islam, M.J.; Rahman, A.; Kabir, S.; Karim, M.R.; Acharjee, U.K.; Nasir, M.K.; Band, S.S.; Sookhak, M.; Wu, S. Blockchain-sdn based energy-aware and distributed secure architecture for IoTs in smart cities. IEEE Internet Things J. 2021. [Google Scholar] [CrossRef]
- Shah, Z.; Cosgrove, S. Mitigating ARP Cache Poisoning Attack in Software-Defined Networking (SDN): A Survey. Electronics 2019, 8, 1095. [Google Scholar] [CrossRef] [Green Version]
- Ali, D.; Kanhere, S.S.; Jurdak, R.; Gauravaram, P. LSB: A lightweight scalable blockchain for IoT security and privacy. arXiv 2017, arXiv:1712.02969. [Google Scholar]
- Haiping, S.; Sun, C.; Li, Y.; Qiao, H.; Shi, L. IoT information sharing security mechanism based on blockchain technology. Future Gener. Comput. Syst. 2019, 101, 1028–1040. [Google Scholar]
- Tahar, H.M.; Hammi, B.; Bellot, P.; Serhrouchni, A. Bubbles of trust: A decentralized blockchain-based authentication system for IoT. Comput. Secur. 2018, 78, 126–142. [Google Scholar]
- Jawad, A.; Ali, T.; Musa, S.; Zahrani, A. Towards secure IoT communication with smart contracts in a blockchain infrastructure. Trans. Hash. 2018, 9, 584–591. [Google Scholar]
- Jiafu, W.; Li, J.; Imran, M.; Li, D. A blockchain-based solution for enhancing security and privacy in smart factory. IEEE Trans. Ind. Inform. 2019, 15, 3652–3660. [Google Scholar]
- Lun, L.; Liu, J.; Cheng, L.; Qiu, S.; Wang, W.; Zhang, X.; Zhang, Z. Creditcoin: A privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles. IEEE Trans. Intell. Transp. Syst. 2018, 19, 2204–2220. [Google Scholar]
- Gokhan, S.; Carminati, B.; Ferrari, E. AutoBotCatcher: Blockchain-based P2P botnet detection for the Internet of things. In Proceedings of the IEEE 4th International Conference on Collaboration and Internet Computing (CIC), Philadelphia, PA, USA, 18–20 October 2018. [Google Scholar]
- Gregory, F.; Li, C.; Fedorov, P.; Caldera, C.; Arora, R.; Jackson, K. Neuromesh: IoT security enabled by a blockchain powered botnet vaccine. In Proceedings of the The International Conference on Omni-Layer Intelligent Systems, Crete Greece, 5–7 May 2019. [Google Scholar]
- Akshay, P.; Sindhu, M.; Lakshmy, K.V. Securing firmware in Internet of things using blockchain. In Proceedings of the 5th International Conference on Advanced Computing & Communication Systems (ICACCS), Coimbatore, India, 15–16 March 2019. [Google Scholar]
- Seyoung, H.; Cho, S.; Kim, S. Managing IoT devices using blockchain platform. In Proceedings of the 2017 19th International Conference on Advanced Communication Technology (ICACT), Pyeongchang, Korea, 19–22 February 2017. [Google Scholar]
- Quanqing, X.; Aung, K.M.M.; Zhu, Y.; Yong, K.L. A blockchain-based storage system for data analytics in the Internet of things. In New Advances in the Internet of Things; Springer: Cham, Switzerland, 2018. [Google Scholar]
- Lee, J. Patch transporter: Incentivized, decentralized software patch system for WSN and IoT environments. Sensors 2018, 18, 574. [Google Scholar] [CrossRef] [Green Version]
- Kruthik, J.T.; Ramakrishnan, K.; Sunitha, R.; Honnavalli, B.P. Security Model for Internet of Things Based on Blockchain. In Innovative Data Communication Technologies and Application; Springer: Singapore, 2021; pp. 543–557. [Google Scholar]
- Lee, J. Mitigating loT device based DDoS attacks using blockchain. In Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, Munich, Germany, 15 June 2018. [Google Scholar]
- Michael, A.; Kolb, J.; Chen, K.; Fierro, G.; Culler, D.E.; Popa, R.A. Wave: A Decentralized Authorization System for IoT via Blockchain Smart Contracts; EECS Department, University of California: Berkeley, CA, USA, 2017. [Google Scholar]
- Mena, M.; Diego, M.; Yang, B. Blockchain-based whitelisting for consumer IoT devices and home networks. In Proceedings of the 19th Annual SIG Conference on Information Technology Education, Fort Lauderdale, FL, USA, 3–6 October 2018. [Google Scholar]
- Olivier, A.; Amoretti, M.; Claeys, T.; Dall’Asta, S.; Duda, A.; Ferrari, G.; Rousseau, F.; Tourancheau, B.; Veltri, L.; Zanichelli, F. IoTChain: A blockchain security architecture for the Internet of things. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain, 15–18 April 2018. [Google Scholar]
- Mansoor, A.; Salah, K.; Alhammadi, Y. Blockchain-based ownership management for medical IoT (MIoT) devices. In Proceedings of the International Conference on Innovations in Information Technology (IIT), Al Ain, United Arab Emirates, 18–19 November 2018. [Google Scholar]
- Uzair, J.; Aman, M.N.; Sikdar, B. BlockPro: Blockchain based data provenance and integrity for secure IoT environments. In Proceedings of the 1st Workshop on Blockchain-Enabled Networked Sensor Systems, Shenzhen, China, 4 November 2018. [Google Scholar]
- Tahar, H.M.; Bellot, P.; Serhrouchni, A. BCTrust: A decentralized authentication blockchain-based mechanism. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain, 15–18 April 2018. [Google Scholar]
- Ingo, W.; Gramoli, V.; Ponomarev, A.; Staples, M.; Holz, R.; Tran, A.B.; Rimba, P. On availability for blockchain-based systems. In Proceedings of the IEEE 36th Symposium on Reliable Distributed Systems (SRDS), Hong Kong, China, 26–29 September 2017. [Google Scholar]
- Santeri, P.; Elo, T.; Nikander, P. Risks from spam attacks on blockchains for Intemet-of-Things devices. In Proceedings of the IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 1–3 November 2018. [Google Scholar]
- Vishwakarma, R.; Kumar, A. A survey of DDoS attacking techniques and defence mechanisms in the IoT network. Telecommun. Syst. 2019, 73, 1–23. [Google Scholar] [CrossRef]
- Prokofiev, A.; Smirnova, Y.S. Counteraction against Internet of Things Botnets in Private Networks. In Proceedings of the IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), Saint Petersburg, Russia, 28–31 January 2019. [Google Scholar]
- Madiha, S.; Fernandez, E.; Moreno, J. A misuse pattern for DDoS in the IoT. In Proceedings of the ACM European Conference on Pattern Languages of Programs, Irsee, Germany, 4–8 July 2018. [Google Scholar]
- Ahmed, Z.; Danish, S.M.; Qureshi, H.K.; Lestas, M. Protecting iots from mirai botnet attacks using blockchains. In Proceedings of the IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Limassol, Cyprus, 11–13 September 2019; pp. 1–6. [Google Scholar]
- Saxena, S.; Bhushan, B.; Ahad, M.A. Blockchain based solutions to secure IoT: Background, integration trends and a way forward. J. Netw. Comput. Appl. 2021, 181, 103050. [Google Scholar] [CrossRef]
- Fortino, G.; Fotia, L.; Messina, F.; Rosaci, D.; Sarné, G.M.L. Trust and reputation in the internet of things: State-of-the-art and research challenges. IEEE Access 2020, 8, 60117–60125. [Google Scholar] [CrossRef]
- Fortino, G.; Messina, F.; Rosaci, D.; Sarné, G.M.L. Using blockchain in a reputation-based model for grouping agents in the Internet of Things. IEEE Trans. Eng. Manag. 2019, 67, 1231–1243. [Google Scholar] [CrossRef]
- Lin, X.; Li, J.; Wu, J.; Liang, H.; Yang, W. Making knowledge tradable in edge-AI enabled IoT: A consortium blockchain-based efficient and incentive approach. IEEE Trans. Ind. Inform. 2019, 15, 6367–6378. [Google Scholar] [CrossRef]
- Xu, X.; Zeng, Z.; Yang, S.; Shao, H. A novel blockchain framework for industrial IoT edge computing. Sensors 2020, 20, 2061. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Yeh, L.-Y.; Lu, P.J.; Huang, S.-H.; Huang, J.-L. SOChain: A privacy-preserving DDoS data exchange service over soc consortium blockchain. IEEE Trans. Eng. Manag. 2020, 67, 1487–1500. [Google Scholar] [CrossRef]
- Muñoz, R.; Vilalta, R.; Yoshikane, N.; Casellas, R.; Martínez, R.; Tsuritani, T.; Morita, I. Integration of IoT, transport SDN, and edge/cloud computing for dynamic distribution of IoT analytics and efficient use of network resources. IEEE J. Light. Technol. 2018, 36, 1420–1428. [Google Scholar] [CrossRef]
- P1916.1; Standard for Software Defined Networking and Network Function Virtualization Performance. Available online: https://sagroups.ieee.org/1916-1/ (accessed on 18 November 2021).
Referenced Works | Explanation of Blockchain | Security Issues in IoT | DDoS Attacks | Benefits and Challenges of Combining IoT and Blockchain | General Defense Mechanisms against DDoS Attacks | Usage of Blockchain in Security | Solutions for DDoS Attacks in IoT |
---|---|---|---|---|---|---|---|
[20] | Yes | Yes | No | Yes | No | No | No |
[94] | Yes | ||||||
[92] | No | No | |||||
[12] | Yes | ||||||
[95] | Yes | ||||||
[96] | |||||||
[90] | No | ||||||
[97] | Yes | ||||||
[5] | No | ||||||
[98] | No | No | Yes | No | Yes | ||
[4] | |||||||
[15] | |||||||
[99] | |||||||
[100] | |||||||
[102] | Yes | No | Yes | ||||
[103] | No | ||||||
[101] | Yes | No |
Resources | IEEE Xplore | Elsevier | ScienceDirect | Springer | ProQuest | ACM | |
---|---|---|---|---|---|---|---|
Conference | 32 | 0 | 238 | 159 | 429 | 52 | |
Journals | 7 | 19 | 156 | 25 | |||
Books | 24 | 200 | 22 | 345 | 2132 | 0 | |
Early Access Articles | 1 | 0 | 0 | 0 | 0 | 0 | |
Magazines | 1 | 0 | 0 | 0 | 20 | 0 | |
Webpages | 0 | 0 | 0 | 0 | 16 | 0 | |
Connect | 0 | 1 | 0 | 0 | 0 | 0 | |
Survey Articiles | 0 | 0 | 76 | 0 | 0 | 0 | |
Discussion | 0 | 0 | 1 | 0 | 0 | 0 | |
Editorials | 0 | 0 | 1 | 0 | 0 | 0 | |
Dissertations & Thesis | 0 | 0 | 0 | 0 | 20 | 0 | |
Newsletter | 0 | 0 | 0 | 0 | 0 | 6 | |
Reports | 0 | 0 | 0 | 0 | 0 | 0 | |
Total | |||||||
Total | 65 | 220 | 338 | 660 | 2617 | 83 | 3983 |
Excluded (Books, etc.) | 26 | 201 | 100 | 345 | 2188 | 6 | 2866 |
Included (Conf. Jour.) | 39 | 19 | 238 | 315 | 429 | 77 | 1117 |
The excluded 2866 articles were Books, Reports, etc. Following is the breakdown of resultant 1117 research articles: | |||||||
Blockchain-based Solutions = 34; Survey Articles = 12; Supporting Articles = 103; Remaining = 1117 − 149 = 968 | |||||||
Finally, 968 research articles were excluded from our repository that were not classified as Blockchain-based Solutions. |
Solutions | Working Principle | DDoS Attack Mitigation | Weaknesses | Strengths | ||
---|---|---|---|---|---|---|
Prevention | Detection | Reaction | ||||
[104] | The systems are decentralised, and all the nodes share the ledger with redundancy data storage. | Yes | No | No | Nodes not under attack will be under heavy load. | Utilise natural feature of Blockchain to mitigate DDoS attacks. |
[105] | Use the distributed structure of Blockchain to mitigate DDoS attacks. | Yes | No | No | Specific node under attack can not work. | When DDoS attacks occur, the whole system continues to work. |
[106] | Uses the collaborative DDoS detection scheme utilising Blockchain and lightweight agents in IoT. | Yes | Yes | Yes | Details over the consensus algorithm on agents are missing, since these algorithms are supposed to be installed over limited resources hardware. | The use of lightweight agents exchange outbound traffic information to identify possible victims of DDoS attacks and is governed by a Blockchain smart contract, which ensures the integrity of both the procedure and exchanged information. |
Solutions | Working Principle | DDoS Attack Mitigation | Weaknesses | Strengths | ||
---|---|---|---|---|---|---|
Prevention | Detection | Reaction | ||||
PKAM [107,108,109] | Based on public key to manage access. Reject requests if the requester’s public key is not registered or unavailable. | Yes | No | No | Cannot prevent DDoS attacks if attackers use multiple public keys. | Prevent DDoS attacks by limiting unauthorised access. |
PUFAM [7,110] | Use PUF to verify the authenticity of the IoT devices. All tampered, fake and cloned devices will be detected, which can prevent devices from becoming part of a botnet. | Yes | No | No | No experiments to prove the robustness against DDoS attacks. | It is a lightweight access management solution which is suitable for an IoT environment. |
Solutions | Working Principle | DDoS Attack Mitigation | Weaknesses | Strengths | ||
---|---|---|---|---|---|---|
Prevention | Detection | Reaction | ||||
SDNTCB [112,113,114,115,116,117,118] | Combine SDN and Blockchain to monitor traffic to detect DDoS attacks. | Yes | Yes | Yes | Delay caused by processing of traffic is not calculated. | Sound mechanism to mitigate DDoS attacks. |
TCMRT [120,121] | If the threshold of maximum transaction rate is exceeded, the node manager updates to prevent the node from continuously sending transactions to the target nodes. | Yes | Yes | Yes | Can create too much traffic in the network. | A lightweight mechanism to mitigate DDoS attacks. |
TCVT [123] | Verify outgoing transactions to prevent nodes from becoming part of botnets. | Yes | No | No | Lack of protection of smart contract. | Does not utilise additional resources. |
TCWM [124,125,126,127] | A whitelisting mechanism is used to prevent DDoS attacks by filtering and eliminating malicious traffic. | Yes | Yes | Only [126] | It is possible that illegal traffic complies with validation rules but perform harmful actions. | It is very quick to verify the access traffic and filter the unwanted traffic. |
Solutions | Working Principle | DDoS Attack Mitigation | Weaknesses | Strengths | ||
---|---|---|---|---|---|---|
Prevention | Detection | Reaction | ||||
SSEP [128,129,130,131,132] | Prevent attackers from sending too many service requests because of payment of transactions. | Yes | No | No | No mechanism for detecting and mitigating DDoS attacks. | Use existing Ethereum platform to prevent DDoS attacks. |
SEPTC [133,134,135] | Combines the Ethereum platform and traffic control to mitigate DDoS attacks. | Yes | Yes | Yes | Decrease in performance because of extra processing of data. | Use maximum rate of transactions and white listing mechanisms. |
SEPA [136,137,138,139] | Combines the Ethereum platform with authorisation to prevent DDoS attacks. | Yes | No | No | Do not consider detection and mitigation of DDoS attacks. | Can also prevent malicious users from accessing the systems. |
Acronyms | Explanation |
---|---|
DDoS | Distributed Denial of Service |
IoT | Internet of Things |
IIoT | Industrial Internet of Things |
IoA | Internet of Anything |
IoE | Internet of Everything |
SIoT | Social Internet of Things |
WoT | Web of Things |
IoMT | Internet of Medical Things |
SDIoT | Software-Defined Internet of Things |
SDIoT-Edge | Software-Defined Internet of Things and Edge |
SDN | Software Defined Networking |
PoS | Proof of Stake |
BFT | Byzantine Fault Tolerance |
PoET | Proof of Elapsed Time |
ECDSA | Elliptic Curve Digital Signature Algorithm |
HTTP | Hyper Text Transfer Protocol |
VoIP | Voice over Internet Protocol |
SHA | Secure Hash Algorithm |
6LoWPAN | IPv6 over Low-Power Wireless Personal Area Networks |
PKAM | Public Key based Access Management |
PUF | Physically Unclonable Function based Access Management |
PUFAM | PUF based Access Management |
SDNTCB | SDN based Traffic Control via Blockchain |
TCMRT | Traffic Control based on the Maximum Rate of Transactions |
TCVT | Traffic Control based on Verification of Transactions |
TCWM | Traffic Control based on Whitelisting Mechanism |
TCP | Transmission Control Protocol |
SYN | Synchronise |
DNS | Domain Name System |
CoAP | Constrained Application Protocol |
PoW | Proof of Work |
DPoS | Delegated-Proof-of-Stake |
PoET | Proof of Elapsed Time |
PoL | Proof of Luck |
PoSp | Proof of Space |
PBFT | Practical Byzantine Fault Tolerance |
ePBFT | Excellent Practical Byzantine Fault Tolerance |
PoL | Proof of Luck |
CA | Certificate Authority |
PK | Public Key |
SC | Smart Contracts |
BTC | Bitcoin |
ICMP | Internet Control Message Protocol |
SSEP | Solutions Simply based on Ethereum Platform |
SEPTC | Ethereum Platform with Traffic Control |
SEPA | Solutions based on the Ethereum Platform with Authorization |
TLS | Transport Layer Security |
CPU | Central Processing Unit |
SSL | Secure Sockets Layer |
IP | Internet Protocol |
UDP | User Datagram Protocol |
ICT | Information and Communication Technologies |
ITU | International Telecommunication Union |
RFID | Radio Frequency Identification |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Shah, Z.; Ullah, I.; Li, H.; Levula, A.; Khurshid, K. Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey. Sensors 2022, 22, 1094. https://doi.org/10.3390/s22031094
Shah Z, Ullah I, Li H, Levula A, Khurshid K. Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey. Sensors. 2022; 22(3):1094. https://doi.org/10.3390/s22031094
Chicago/Turabian StyleShah, Zawar, Imdad Ullah, Huiling Li, Andrew Levula, and Khawar Khurshid. 2022. "Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey" Sensors 22, no. 3: 1094. https://doi.org/10.3390/s22031094
APA StyleShah, Z., Ullah, I., Li, H., Levula, A., & Khurshid, K. (2022). Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey. Sensors, 22(3), 1094. https://doi.org/10.3390/s22031094