咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Blockchain-based DDoS attack m... 收藏

Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home

作     者:Bello Musa Yakubu Majid Iqbal Khan Abid Khan Farhana Jabeen Gwanggil Jeon Bello Musa Yakubu;Majid Iqbal Khan;Abid Khan;Farhana Jabeen;Gwanggil Jeon

作者机构:Department of Mathematics and Computer ScienceChulalongkorn UniversityBangkok10330Thailand Department of Computer ScienceCOMSATS University Islamabad(CUI)Islamabad45550Pakistan College of Science and EngineeringUniversity of DerbyDerbyDE221GBUnited Kingdom Department of Embedded Systems EngineeringIncheon National UniversityIncheon22012South Korea 

出 版 物:《Digital Communications and Networks》 (数字通信与网络(英文版))

年 卷 期:2023年第9卷第2期

页      面:383-392页

核心收录:

学科分类:0839[工学-网络空间安全] 08[工学] 

主  题:DDoS attack Device-to-device Smart homes Blockchain Authentication Ethereum smartcontract 

摘      要:Smart home devices are vulnerable to a variety of *** matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,Smart home).To handle these attacks,most studies have hitherto proposed authentication protocols that cannot necessarily be implemented in devices,especially during Device-to-Device(D2D)*** into the potential of Ethereum blockchain and smart contracts,this work proposes a lightweight authentication mechanism that enables safe D2D interactions in a smart *** Ethereum blockchain enables the implementation of a decentralized prototype as well as a peer-to-peer distributed ledger *** work also uses a single server queuing system model and the authentication mechanism to curtail DDoS attacks by controlling the number of service requests in the *** simulation was conducted twenty times,each with varying number of devices chosen at random(ranging from 1 to 30).Each requester device sends an arbitrary request with a unique resource requirement at a *** is done to measure the system s consistency across a variety of device *** experimental results show that the proposed protocol not only prevents colluding attacks,but also outperforms the benchmark protocols in terms of computational cost,message processing,and response times.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分