VI. CONCLUSIONS
The paper has presented a method, named REATO, for detecting and counteracting a DoS attack against the IoT middleware, named NOS. The work started from the need to find a solution able to defend an IoT system towards DoS attacks, considering all the possible situations that can occur (i.e., attacks to the data sources and attacks to the IoT platform itself). The designed solution, tailored to NOS architecture, has been validated by means of a real test-bed, composed by a NOS prototype installed on a Raspberry Pi that receives open data feeds in real time by a variable set of sources. Performance indices like computing effort, latency, and recovery time have been evaluated in presence of malicious nodes. As a future development of the presented work, we aim at testing the described scenario in a more complex environment, composed of multiple NOSs and a huge number of data sources and malicious entities, in order to carry out further experiments about the performance of REATO into the whole system.