2022
DOI: 10.3390/s22031094
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey

Abstract: Internet of Things (IoT) devices are widely used in many industries including smart cities, smart agriculture, smart medical, smart logistics, etc. However, Distributed Denial of Service (DDoS) attacks pose a serious threat to the security of IoT. Attackers can easily exploit the vulnerabilities of IoT devices and control them as part of botnets to launch DDoS attacks. This is because IoT devices are resource-constrained with limited memory and computing resources. As an emerging technology, Blockchain has the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 57 publications
(28 citation statements)
references
References 109 publications
0
18
0
Order By: Relevance
“…This survey is motivated by the realization that SDN tends to be a feasible alternative for IoT network architectures that ✓ ✓ ✓ OpenFlow (OF), NFV, Middleware [20] ✓ ✓ OF, NFV, Middleware [21] ✓ ✓ ✓ NFV [22] ✓ NFV [23] ✓ ✓ ✓ NFV, Middleware [24] ✓ ✓ ✓ ✓ NFV, OF [25] ✓ NFV, OF [26] ✓ Middleware, OF [27] ✓ ✓ ✓ Middleware, NFV [28] ✓ ✓ ✓ Blockchain [29] ✓ ✓ ✓ Blockchain [30] ✓ ✓ ✓ Middleware [31] ✓ ✓ Middleware [32] ✓ Middleware [33] ✓ Middleware, NFV [34] ✓ ✓ Blockchain [35] ✓ ✓ Blockchain [36] ✓ ✓ ✓ ✓ Blockchain [37] ✓ ✓ ✓ Blockchain [38] ✓ ✓ OF [39] ✓ Blockchain [40] ✓ Blockchain [41] ✓ Blockchain [42] ✓ ✓ NFV [43] ✓ Middleware [44] ✓ ✓ Blockchain [45] ✓ Blockchain [46] ✓ ✓ Blockchain [47] ✓ ✓ NFV, OF [48] ✓ NFV, OF [49] ✓ ✓ Edge Computing, NFV [50] ✓ NFV [51] ✓ NFV [52] ✓ NFV, Blockchain [53] ✓ ✓ Blockchain [54] ✓ ✓ NFV [55] ✓ ✓ Blockchain [56] ✓ ✓ ✓ NFV, Middleware [57] ✓ ✓ ✓ Middleware, Blockchain [58] ✓ ✓ ✓ Blockchain,NFV [59] ✓ ✓ ✓ NFV, Middleware, Blockchain [60] ✓ ✓ ✓ ✓ NFV, Middleware [61] ✓ ✓ ✓ ✓ ✓ NFV, Middleware,Blockchain Our Survey ✓ ✓ ✓ ...…”
Section: A Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…This survey is motivated by the realization that SDN tends to be a feasible alternative for IoT network architectures that ✓ ✓ ✓ OpenFlow (OF), NFV, Middleware [20] ✓ ✓ OF, NFV, Middleware [21] ✓ ✓ ✓ NFV [22] ✓ NFV [23] ✓ ✓ ✓ NFV, Middleware [24] ✓ ✓ ✓ ✓ NFV, OF [25] ✓ NFV, OF [26] ✓ Middleware, OF [27] ✓ ✓ ✓ Middleware, NFV [28] ✓ ✓ ✓ Blockchain [29] ✓ ✓ ✓ Blockchain [30] ✓ ✓ ✓ Middleware [31] ✓ ✓ Middleware [32] ✓ Middleware [33] ✓ Middleware, NFV [34] ✓ ✓ Blockchain [35] ✓ ✓ Blockchain [36] ✓ ✓ ✓ ✓ Blockchain [37] ✓ ✓ ✓ Blockchain [38] ✓ ✓ OF [39] ✓ Blockchain [40] ✓ Blockchain [41] ✓ Blockchain [42] ✓ ✓ NFV [43] ✓ Middleware [44] ✓ ✓ Blockchain [45] ✓ Blockchain [46] ✓ ✓ Blockchain [47] ✓ ✓ NFV, OF [48] ✓ NFV, OF [49] ✓ ✓ Edge Computing, NFV [50] ✓ NFV [51] ✓ NFV [52] ✓ NFV, Blockchain [53] ✓ ✓ Blockchain [54] ✓ ✓ NFV [55] ✓ ✓ Blockchain [56] ✓ ✓ ✓ NFV, Middleware [57] ✓ ✓ ✓ Middleware, Blockchain [58] ✓ ✓ ✓ Blockchain,NFV [59] ✓ ✓ ✓ NFV, Middleware, Blockchain [60] ✓ ✓ ✓ ✓ NFV, Middleware [61] ✓ ✓ ✓ ✓ ✓ NFV, Middleware,Blockchain Our Survey ✓ ✓ ✓ ...…”
Section: A Motivationmentioning
confidence: 99%
“…Security challenges related to container-based virtualization technologies are also a popular topic. However, we can still ensure the security of container-based architectures by running them on top of VMs by using an adaptive approach [61].…”
Section: A Network Function Virtualizationmentioning
confidence: 99%
“…On 21 October 2016, the biggest DDoS attack was performed using Mirai IoT malware. The consequences of this attack were hours-long outages and service interruptions for some popular websites such as Amazon, Netflix, Twitter, and others [29,30]. According to Balaban, in 2014, a DDoS attack estimated at 400 gigabits per second slammed Cloudflare, a cybersecurity service and content delivery network [31].…”
Section: Overview Of Denial-of-service (Dos) Attackmentioning
confidence: 99%
“…In the focus of authors is on the DDoS attacks at the network layer; however, Chaganti et al (2022) discussed technologies on an IoT protocol stack to mitigate DDoS attacks, such as IPv6, IEEE 802.15.4, 6LoWPAN, etc. However, Shah et al (2022) did not mention blockchainbased solutions that mitigate DDoS attacks. Tayyab et al (2020) take the approach that each IDS in the network acts as a blockchain node and collaborate with other blockchain IDS nodes to share the attack information like correlated alarms.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This paper aims to fill in this research gap by categorizing and critically evaluating various blockchain-based solutions to mitigate DDoS attacks in IoT. Another novelty of our work is to propose future work directions that can be explored by other researchers to propose better blockchain solutions to mitigate DDoS attacks in IoT (Shah et al, 2022).…”
Section: Literature Reviewmentioning
confidence: 99%