The IUP Journal of Information Technology
Blockchain Solutions for IoT Devices Against DDoS Attacks: A Review

Article Details
Pub. Date : Dec, 2022
Product Name : The IUP Journal of Information Technology
Product Type : Article
Product Code : IJIT021222
Author Name : G Mahalaxmi, R Varaprasad and T Aditya Sai Srinivas
Availability : YES
Subject/Domain : Engineering
Download Format : PDF Format
No. of Pages : 22

Price

Download
Abstract

Internet of Things (IoT)-connected devices are used in a wide range of applications, including smart cities, agriculture, healthcare, logistics, etc. However, the rise in the number of attacks utilizing Distributed Denial of Service (DDoS) protocols is a cause for concern. IoT devices have security holes that make it easier for fraudsters to take control of them and use them as part of botnets to launch DDoS assaults. The processing and storage capabilities of the vast majority of IoT-connected devices are quite constrained. Blockchain technology, which is still in its early stages, may be used to address concerns over the security of IoT devices. It is crucial to consider many blockchain-based defence techniques that are currently available for IoT devices in order to prevent DDoS attacks.


Introduction

The number of businesses adopting Internet of Things (IoT) products and solutions has increased as a result of the technology's rapid development. Smart towns and houses, intelligent transportation, and logistics management are a few examples of IoT applications (Rghioui and Oumnad, 2017; and Reddy et al., 2022). By 2030, it is anticipated that there will be close to 125 billion IoT devices in operation worldwide (IHS, 2017). However, there are still issues with the IoT's security, privacy, identity management and other associated issues (Li et al., 2016). Among the most significant security risks are Distributed Denial of Service (DDoS) attacks (Deshmukh and Devadkar, 2015). A vast majority of IoT devices lack security protection due to memory and computational power limitations. Resources are generally scarce in IoT devices. Attackers utilize IoT devices as part of botnets which they deploy to launch DDoS assaults in order to take advantage of security holes in IoT devices. For instance, in


Keywords

Internet of Things (IoT), Distributed Denial of Service (DDoS) Attacks, Blockchain technology