A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology

14Citations
Citations of this article
80Readers
Mendeley users who have this article in their library.

Abstract

The Internet of Things (IoT) is a network of sensors that helps collect data 24/7 withouthuman intervention. However, the network may suffer from problems such as the low battery,heterogeneity, and connectivity issues due to the lack of standards. Even though these problemscan cause several performance hiccups, security issues need immediate attention because hackersaccess vital personal and financial information and then misuse it. These security issues can allowhackers to hijack IoT devices and then use them to establish a Botnet to launch a Distributed Denial ofService (DDoS) attack. Blockchain technology can provide security to IoT devices by providing secureauthentication using public keys. Similarly, Smart Contracts (SCs) can improve the performance of theIoT–blockchain network through automation. However, surveyed work shows that the blockchainand SCs do not provide foolproof security; sometimes, attackers defeat these security mechanisms andinitiate DDoS attacks. Thus, developers and security software engineers must be aware of differenttechniques to detect DDoS attacks. In this survey paper, we highlight different techniques to detectDDoS attacks. The novelty of our work is to classify the DDoS detection techniques according toblockchain technology. As a result, researchers can enhance their systems by using blockchain-basedsupport for detecting threats. In addition, we provide general information about the studied systemsand their workings. However, we cannot neglect the recent surveys. To that end, we compare thestate-of-the-art DDoS surveys based on their data collection techniques and the discussed DDoSattacks on the IoT subsystems. The study of different IoT subsystems tells us that DDoS attacks alsoimpact other computing systems, such as SCs, networking devices, and power grids. Hence, ourwork briefly describes DDoS attacks and their impacts on the above subsystems and IoT. For instance,due to DDoS attacks, the targeted computing systems suffer delays which cause tremendous financialand utility losses to the subscribers. Hence, we discuss the impacts of DDoS attacks in the contextof associated systems. Finally, we discuss Machine-Learning algorithms, performance metrics, andthe underlying technology of IoT systems so that the readers can grasp the detection techniquesand the attack vectors. Moreover, associated systems such as Software-Defined Networking (SDN)and Field-Programmable Gate Arrays (FPGA) are a source of good security enhancement for IoTNetworks. Thus, we include a detailed discussion of future development encompassing all major IoTsubsystems.

References Powered by Scopus

State estimation under false data injection attacks: Security analysis and system protection

377Citations
N/AReaders
Get full text

An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols

343Citations
N/AReaders
Get full text

A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks

291Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques

10Citations
N/AReaders
Get full text

Dynamic Analysis for Detection of Self-Destructive Smart Contracts

4Citations
N/AReaders
Get full text

A Survey of Vulnerability Detection Techniques by Smart Contract Tools

3Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Khan, Z. A., & Namin, A. S. (2022). A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology. Electronics (Switzerland), 11(23). https://doi.org/10.3390/electronics11233892

Readers' Seniority

Tooltip

Lecturer / Post doc 6

46%

PhD / Post grad / Masters / Doc 6

46%

Researcher 1

8%

Readers' Discipline

Tooltip

Engineering 15

60%

Computer Science 8

32%

Business, Management and Accounting 1

4%

Social Sciences 1

4%

Article Metrics

Tooltip
Mentions
Blog Mentions: 1

Save time finding and organizing research with Mendeley

Sign up for free