Abstract

Due to different heterogeneous objects connected to the Internet, security and privacy of the users is difficult to guarantee. Internet forms the heart of IoT and therefore all the security threats and attacks that are present or are possible within Internet propagates to IoT too. Due to the resource constrained characteristics of IoT network, it has become a major victim of DDoS attacks. Detecting DoS and DDoS attacks at an early stage can prevent the resource constrained devices from becoming victim and dying out early. Constrained network uses Constrained Application Protocol (CoAP) at the application layer. CoAP employs DTLS as its security protocol for securing client server communication. DTLS is vulnerable to DoS attacks. In this work, we have proposed a novel algorithm for detection and mitigation of DoS and DDoS attacks at an early stage. The algorithm is designed to be suitable for the constrained environments. The implementation of the algorithm is done on Contiki Cooja simulator. Results show that our algorithm performs better than E-Lithe, proposed by Asma Haroon et al. The performance metrics taken for the evaluation of the algorithm are malicious packet delivery ratio and legitimate packet delivery ratio.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call