منوی کاربری
  • پشتیبانی: ۴۲۲۷۳۷۸۱ - ۰۴۱
  • سبد خرید

دانلود رایگان مقاله انگلیسی REATO: واکنش به عدم پذیرش حملات سرویسی در اینترنت اشیا - الزویر 2018

عنوان فارسی
REATO: واکنش به عدم پذیرش حملات سرویسی در اینترنت اشیا
عنوان انگلیسی
REATO: REActing TO Denial of Service attacks in the Internet of Things
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
16
سال انتشار
2018
نشریه
الزویر - Elsevier
فرمت مقاله انگلیسی
PDF
کد محصول
E6862
رشته های مرتبط با این مقاله
مهندسی فناوری اطلاعات و کامپیوتر
گرایش های مرتبط با این مقاله
امنیت اطلاعات ، اینترنت و شبکه های گسترده
مجله
شبکه های کامپیوتری - Computer Networks
دانشگاه
Dipartimento di Scienze Teoriche e Applicate - Universita degli Studi dell’Insubria - Italy
کلمات کلیدی
اینترنت اشیا، امنیت، عدم پذیرش سرویس، حملات، میان افزار، نمونه اولیه
۰.۰ (بدون امتیاز)
امتیاز دهید
چکیده

Abstract


Denial of Service (DoS) attack represents until now a relevant problem in Internet-based contexts. In fact, it is both difficult to recognize and to counteract. Along with the adoption and diffusion of Internet of Things (IoT) applications, such an issue has become more urgent to solve, due to the presence of heterogeneous data sources and to the wireless nature of most communications. A DoS attack is even more serious if not only the data sources are under attack, but also the IoT platform itself, which is in charge of acquiring data from multiple data sources and, after data processing, provide useful services to the interested users. In this paper, we present a solution, named REATO, for actively and dynamically detecting and facing DoS attacks within a running IoT middleware. A real prototype has been realized in order to validate the proposed method, by assessing different relevant parameters.

نتیجه گیری

VI. CONCLUSIONS


The paper has presented a method, named REATO, for detecting and counteracting a DoS attack against the IoT middleware, named NOS. The work started from the need to find a solution able to defend an IoT system towards DoS attacks, considering all the possible situations that can occur (i.e., attacks to the data sources and attacks to the IoT platform itself). The designed solution, tailored to NOS architecture, has been validated by means of a real test-bed, composed by a NOS prototype installed on a Raspberry Pi that receives open data feeds in real time by a variable set of sources. Performance indices like computing effort, latency, and recovery time have been evaluated in presence of malicious nodes. As a future development of the presented work, we aim at testing the described scenario in a more complex environment, composed of multiple NOSs and a huge number of data sources and malicious entities, in order to carry out further experiments about the performance of REATO into the whole system.


بدون دیدگاه