Abstract
Now-a-days the technology advancement has made significant improvement in different sectors of the society. IoT is always having an important role dealing with all these smart devices and their security. One such security issue is DOS attacks which is very frequent in IOT devices. This paper provides a solution to the experiment on a NodeMCU12e based smart switch to prevent and mitigate the attacks executed on wireless embedded devices. The major idea for developing this model is to build a suitable security mechanism for constrained devices which are part of various IOT and CPS applications. The results presented claims that when attacks are executed on the device, further communications would be halted with unidentified IP addresses using Request Capturing Security Mechanism (RCSM).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Change history
16 June 2021
In the originally published version of chapter 17, the name of the Author was incorrect. The Author’s name has been corrected as “V. Anantha Narayanan”.
References
Silva, E., Galdino, M., Carmino, J., Bento, A.: An experiment with DDoS attack on NodeMCU12e devices for IoT with T50 Kali Linux. Int. J. Adv. Eng. Res. Sci. 6 (2019). https://doi.org/10.22161/ijaers.6.1.3
Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: Blockchain for IoT security and privacy: the case study of a smart home. In: 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom workshops), pp. 618–623. IEEE (2017)
Thomas, A., Kumar, G.T., Mohan, A.K.: Neighbor attack detection in internet of things. In: Advanced Computational and Communication Paradigms, Singapore (2018)
Anirudh, M., Thileeban, S.A., Nallathambi, D.J.: Use of honeypots for mitigating DoS attacks targeted on IoT networks. In: 2017 International Conference on Computer, Communication and Signal Processing (ICCCSP), pp. 1–4. Chennai (2017)
Baig, Z.A., Sanguanpong, S., Firdous, S.N., Van Nhan, V., Nguyen, T.G., So-In, C.: Averaged dependence estimators for DoS attack detection in IoT networks. Future Gener. Comput. Syst. 102, 198–209 (2020)
David, J., Thomas, C.: Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic. Comput. Secur. 82, 284–295 (2019)
Shah, T., Venkatesan, S.: Authentication of IoT device and IoT server using secure vaults. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 819–824. IEEE (2018)
Gómez, J.R., Montoya, H.V., Henao, A.V.: Implementing a Wormhole Attack on Wireless Sensor Networks with XBee S2C Devices Revista Colombiana de Computación 20(1), 41–58 (2019)
Edward, M., Karyono, K., Meidia, H.: Smart fridge design using NodeMCU and home server based on Raspberry Pi 3. In: 2017 4th International Conference on New Media Studies (CONMEDIA), pp. 148–151. IEEE (2017)
Gaddam, R., Nandhini, M.: An analysis of various snort-based techniques to detect and prevent intrusions in networks proposal with code refactoring snort tool in Kali Linux environment. In: 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT), pp. 10–15. IEEE (2017)
Deepak, B.D., Al-Turjman, F.: A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Netw. 97, art. no. 102022 (2020)
Shah, T., Venkatesan, S.: A method to secure IoT devices against botnet attacks. In: Issarny, V., Palanisamy, B., Zhang, L.J. (eds.) Internet of Things – ICIOT 2019. ICIOT 2019. Lecture Notes in Computer Science, vol. 11519. Springer, Cham (2019)
Yerlikaya, Ö., Dalkılıç, G.: Authentication and authorization mechanism on message queue telemetry transport protocol. In: 2018 3rd International Conference on Computer Science and Engineering (UBMK), pp. 145–150. Sarajevo (2018)
Jayaraj, P., Jayaraman, B.: DoS attacks on real-time media through indirect contention-in-hosts. IEEE Internet Comput. 13, 22–30 (2009)
Bharot, N., Verma, P., Suraparaju, V., Gupta, S.: Mitigating distributed denial of service attack in cloud computing environment using threshold based technique. Indian J. Sci. Technol. 9 (2016). https://doi.org/10.17485/ijst/2016/v9i38/98811
Anthi, E., Williams, L., Slowinska, M., Theodorakopoulos, G., Burnap, P.: A supervised intrusion detection system for smart home IoT devices. IEEE Internet Things J. 6(5), art. no. 8753563, 9042–9053 (2019)
Asghar, M.R., Hu, Q., Zeadally, S.: Cybersecurity in industrial control systems: issues, technologies, and challenges. Comput. Netw. 165, art. no. 106946 (2019)
Ghani, A., Mansoor, K., Mehmood, S., Chaudhry, S.A., Rahman, A.U., Najmus Saqib, M.: Security and key management in IoT-based wireless sensor networks: an authentication protocol using symmetric key. Int. J. Commun. Syst. 32, (2019)
Buriachok, V., Sokolov, V.: Using 2.4 GHz wireless botnets to implement denial-of-service attacks. 1, 14–21 (2018). https://doi.org/10.31435/rsglobal_wos/12062018/5734
Lalitha, V.K., Mahalakshmi, B., Madhusudan., S., Srinivasaperumal, M., Srikanth, S., Kumar, S.R.: Smart control of home amenities using Google assistant and clap switch circuit. In: 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), pp. 350–352. Coimbatore, India (2019)
Bhushan, D., Agrawal, R.: Security challenges for designing wearable and IoT solutions. Intell. Syst. Ref. Lib. 165, 109–138 (2020)
Aamir, M., Rizvi, S.S.H., Hashmani, M.A., Zubair, M., Ahmed, J.: Machine learning classification of port scanning and DDoS attacks: a comparative analysis. Mehran Univ. Res. J. Eng. Technol. 40(1), 215–229 (2021)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Makhija, J., Anantha Narayanan, V. (2021). RC-Security Mechanism to Prevent Attacks on IoT Smart Switch. In: Chaubey, N., Parikh, S., Amin, K. (eds) Computing Science, Communication and Security. COMS2 2021. Communications in Computer and Information Science, vol 1416. Springer, Cham. https://doi.org/10.1007/978-3-030-76776-1_17
Download citation
DOI: https://doi.org/10.1007/978-3-030-76776-1_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-76775-4
Online ISBN: 978-3-030-76776-1
eBook Packages: Computer ScienceComputer Science (R0)