2020
DOI: 10.1002/ett.4112
|View full text |Cite
|
Sign up to set email alerts
|

A Distributed framework for detecting DDoS attacks in smart contract‐based Blockchain‐IoT Systems by leveraging Fog computing

Abstract: With the advancement of blockchain technology, and the proliferation of Internet of things (IoT)-driven devices, the blockchain-IoT applications is changing the perception and working infrastructure of smart networks. Blockchain supports decentralized architecture and provides secure management, authentication, and access to IoT systems by deploying smart contracts provided by Ethereum. The growing demand and expansion of blockchain-IoT systems is generating large volume of sensitive data. Moreover, distribute… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
59
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 103 publications
(59 citation statements)
references
References 69 publications
0
59
0
Order By: Relevance
“…The term privacy is mainly applied, to protect the sensitive or confidential data from unauthorized access while sharing over the network. The privacy mechanism is broadly classified into five types such as perturbation‐based, 48,49 encryption‐based, 49,50 authentication‐based, 51 differential privacy, 52 and BC‐based approach 14,53 . These privacy mechanism is discussed below:…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The term privacy is mainly applied, to protect the sensitive or confidential data from unauthorized access while sharing over the network. The privacy mechanism is broadly classified into five types such as perturbation‐based, 48,49 encryption‐based, 49,50 authentication‐based, 51 differential privacy, 52 and BC‐based approach 14,53 . These privacy mechanism is discussed below:…”
Section: Background and Related Workmentioning
confidence: 99%
“…To differentiate the faulty from reliable sensors, there must be some trust‐enable infrastructure, where these issues can be observed (which sensors are faulty and which sensors are reliable). Thus, maintaining trust among IIoT sensors is essential aspect in development of secure power grid CPS system 14‐16 …”
Section: Introductionmentioning
confidence: 99%
“…Centralization exposes a single point of failure; the chance of an attack as DDOS succeeding increases, which makes these systems vulnerable to this familiar and routine cyber attacks [ 26 ]. Centralized systems have unavoidable and unstable behavior when receiving them.…”
Section: Decentralized Management Securitymentioning
confidence: 99%
“…The results show that the detection rate of the model is more than 96%. However, this approach failed to detect low rate DDoS attacks. Kumar et al 103 proposed a distributed detection approach in the Fog computing environment for IoT applications. They employed Random Forest and XGBoost algorithms to decision making on traffic with autonomous control.…”
Section: Review Of Existing Distributed Processing Framework‐based Ddos Detection Systemmentioning
confidence: 99%