Abstract
A decentralized type of network which senses the information from surrounding regions and then forwards it to the base station is known as Internet of Things (IoT). With the increasing demand of IoT applications, security is the major issue. Recently most popular attack in the world of internet is the distributed denial of service (DDoS) attack and for the safety management of IoT devices SDx paradigm can be used. In this paper, we will present the overview and applications of IoT and SDx paradigm, brief description of distributed denial of service attack as well as the different detection and mitigation algorithms. The study shows that security has extremely important for the reliable communication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Gluhak, A., Krco, S., Nati, M., Pfisterer, D., Mitton, N., Razafindralambo, T.: A survey on facilities for experimental internet of things research. IEEE Commun. Mag. 49(11), 58–67 (2011)
Fevgas, A., Tsompanopoulou, P., Bozanis, P.: iMuse mobile tour: a personalized multimedia museum guide opens to groups. In: Proceedings of 2011 IEEE Symposium on Computers and Communications (ISCC) (2011)
Kanda, A., Arai, M., Suzuki, R., Kobayashi, Y., Kuno, Y.: Recognizing groups of visitors for a robot museum guide tour. In: Proceedings of 2014 7th International Conference on Human System Interactions (HSI) (2014)
Yu, N., Han, Q.: Context-aware community: integrating contexts with contacts for proximity-based mobile social networking. In: Proceedings of 2013 IEEE International Conference on Distributed Computing in Sensor Systems (2013)
Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)
Sethi, P., Sarangi, S.: Internet of Things: architectures, protocols, and applications. J. Electr. Comput. Eng. 2017, 1–25 (2017)
Guo, B., Zhang, D., Wang, Z., Yu, Z., Zhou, X.: Opportunistic IoT: exploring the harmonious interaction between human and the Internet of Things. J. Netwo. Comput. Appl. 36(6), 1531–1539 (2013)
Aazam, M., Khan, I., Alsaffar, A., Huh, E.: Cloud of things: integrating Internet of Things and cloud computing and the issues involved. In: Proceedings of 2014 11th International Bhurban Conference on Applied Sciences & Technology (IBCAST) Islamabad, Pakistan, 14th–18th January, 2014 (2014)
Zhang, D., Yang, L., Huang, H.: Searching in Internet of Things: vision and challenges. In: Proceedings of 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications (2011)
Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of things: vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497–1516 (2012)
Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., Jamalipour, A.: Wireless body area networks: a survey. IEEE Communi. Surv. Tutorials 16(3), 1658–1686 (2014)
Kuo, Y., Li, C., Jhang, J., Lin, S.: Design of a wireless sensor network-based IoT platform for wide area and heterogeneous applications. IEEE Sens. J. 18(12), 5187–5197 (2018)
Vermesan, O., Friess, P.: Internet of Things—Global Technological and Societal Trends. River Publishers, Aalborg (2011)
Kargl, F., Maier, J., Weber, M.: Protecting web servers from distributed denial of service attacks. In: Proceedings of the Tenth International Conference on World Wide Web—WWW’01 (2001)
Bany Salameh, H., Almajali, S., Ayyash, M., Elgala, H.: Spectrum Assignment in cognitive radio networks for Internet-of-Things delay-sensitive applications under jamming attacks. IEEE Internet of Things J. 5(3), 1904–1913 (2018)
Gresty, D., Shi, Q., Merabti, M.: Requirements for a general framework for response to distributed denial-of-service. In: Proceeding of Seventeenth Annual Computer Security Applications Conference (2002)
Yin, D., Zhang, L., Yang, K.: A DDoS attack detection and mitigation with software-defined Internet of Things framework. IEEE Access 6, 24694–24705 (2018)
Bekara, C.: Security issues and challenges for the IoT-based smart grid. Procedia Comput. Sci. 34, 532–537 (2014)
Mukherjee, A.: Physical-layer security in the Internet of Things: sensing and communication confidentiality under resource constraints. Proc. IEEE 103(10), 1747–1761 (2015)
Asplund, M., Nadjm-Tehrani, S.: Attitudes and perceptions of IoT security in critical societal services. IEEE Access 4, 2130–2138 (2016)
Ge, M., Hong, J., Guttmann, W., Kim, D.: A framework for automating security analysis of the Internet of Things. J. Netw. Comput. Appl. 83, 12–27 (2017)
Zhang, P., Nagarajan, S., Nevat, I.: Secure location of things (SLOT): mitigating localization spoofing attacks in the Internet of Things. IEEE Internet of Things J. 4(6), 2199–2206 (2017)
Yan, Q., Huang, W., Luo, X., Gong, Q., Yu, F.: A multi-level DDoS mitigation framework for the industrial Internet of Things. IEEE Commun. Mag. 56(2), 30–36 (2018)
Sicari, S., Rizzardi, A., Miorandi, D., Coen-Porisini, A.: REATO: REActing TO denial of service attacks in the Internet of Things. Comput. Netw. 137, 37–48 (2018)
Diro, A., Chilamkurti, N., Nam, Y.: Analysis of lightweight encryption scheme for fog-to-things communication. IEEE Access 6, 26820–26830 (2018)
Liu, Y., Kuang, Y., Xiao, Y., Xu, G.: SDN-based data transfer security for Internet of Things. IEEE Internet of Things J. 5(1), 257–268 (2018)
Mavropoulos, O., Mouratidis, H., Fish, A., Panaousis, E.: Apparatus: a framework for security analysis in Internet of Things systems. Ad Hoc Netw. (2018)
Sani, A., Yuan, D., Jin, J., Gao, L., Yu, S., Dong, Z.: Cyber security framework for Internet of Things-based energy internet. Future Gener. Comput. Syst. 93, 849–859 (2019)
Zhang, S., Xu, X., Wang, H., Peng, J., Zhang, D., Huang, K.: Enhancing the physical layer security of uplink non-orthogonal multiple access in cellular Internet of Things. IEEE Access 6, 58405–58417 (2018)
Chu G.: Security and privacy analyses of Internet of Things children’s toys. IEEE Internet of Things J. 1–1 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Kumar, N., Mittal, N., Thakur, P., Srivastava, R. (2020). Analysis of Different Detection and Mitigation Algorithm of DDoS Attack in Software-Defined Internet of Things Framework: A Review. In: Balas, V., Kumar, R., Srivastava, R. (eds) Recent Trends and Advances in Artificial Intelligence and Internet of Things. Intelligent Systems Reference Library, vol 172. Springer, Cham. https://doi.org/10.1007/978-3-030-32644-9_39
Download citation
DOI: https://doi.org/10.1007/978-3-030-32644-9_39
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-32643-2
Online ISBN: 978-3-030-32644-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)