咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Smart Contract Based DDoS Atta... 收藏

Smart Contract Based DDoS Attack Traceability Audit Mechanism in Intelligent IoT

作     者:Zhuohao Wang Weiting Zhang Runhu Wang Ying Liu Chenyang Xu Chengxiao Yu Zhuohao Wang;Weiting Zhang;Runhu Wang;Ying Liu;Chenyang Xu;Chengxiao Yu

作者机构:Institute of Scientific and Technical Information of ChinaBeijing 100038China School of Electronic and Information EngineeringBeijing Jiaotong UniversityBeijing 100044China 

出 版 物:《China Communications》 (中国通信(英文版))

年 卷 期:2023年第20卷第8期

页      面:54-64页

核心收录:

学科分类:0810[工学-信息与通信工程] 08[工学] 0839[工学-网络空间安全] 0804[工学-仪器科学与技术] 

基  金:supported by the Fundamental Research Funds under Grant 2021JBZD204 and 2022RC006 in part by the National Natural Science Foundation of China under Grant 62201029 in part by the China Postdoctoral Science Foundation under Grant Grant BX20220029 and 2022M710007. 

主  题:smart contract Internet of Things distributed denial of service telemetry audit 

摘      要:In this paper,we focus on providing data provenance auditing schemes for distributed denial of service(DDoS)defense in intelligent internet of things(IoT).To achieve effective DDoS defense,we introduce a two-layer collaborative blockchain framework to support data auditing.Specifically,using data scattered among intelligent IoT devices,switch gateways self-assemble a layer of blockchain in the local autonomous system(AS),and the main chain with controller participation can be aggregated by its associated layer of blocks once a cycle,to obtain a global security model.To optimize the processing delay of the security model,we propose a process of data pre-validation with the goal of ensuring data consistency while satisfying overhead requirements.Since the flood of identity spoofing packets,it is difficult to solve the identity consistency of data with traditional detection methods,and accountability cannot be pursued afterwards.Thus,we proposed a Packet Traceback Telemetry(PTT)scheme,based on in-band telemetry,to solve the problem.Specifically,the PTT scheme is executed on the distributed switch side,the controller to schedule and select routing policies.Moreover,a tracing probabilistic optimization is embedded into the PTT scheme to accelerate path reconstruction and save device resources.Simulation results show that the PTT scheme can reconstruct address spoofing packet forward path,reduce the resource consumption compared with existing tracing scheme.Data tracing audit method has fine-grained detection and feasible performance.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分