Open Access iconOpen Access

ARTICLE

crossmark

Blockchain-Enabled Mitigation Strategies for Distributed Denial of Service Attacks in IoT Sensor Networks: An Experimental Approach

by Kithmini Godewatte Arachchige1, Mohsin Murtaza2, Chi-Tsun Cheng2, Bader M. Albahlal3,*, Cheng-Chi Lee4,5,*

1 Department of Engineering Technologies, School of Science, Computing and Engineering Technologies, Swinburne University, Melbourne, 3122, Australia
2 School of Engineering, Science Technology Engineering and Mathematics College, RMIT University, Melbourne, VIC 3001, Australia
3 Department of Information Technology, College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh, 11432, Saudi Arabia
4 Department of Library and Information Science, Fu Jen Catholic University, New Taipei City, 24205, Taiwan
5 Department of Computer Science and Information Engineering, Asia University, Taichung City, 41354, Taiwan

* Corresponding Authors: Bader M. Albahlal. Email: email; Cheng-Chi Lee. Email: email

(This article belongs to the Special Issue: Security and Privacy in IoT and Smart City: Current Challenges and Future Directions)

Computers, Materials & Continua 2024, 81(3), 3679-3705. https://doi.org/10.32604/cmc.2024.059378

Abstract

Information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats, with Internet of Things (IoT) security gaining particular attention due to its role in data communication across various industries. However, IoT devices, typically low-powered, are susceptible to cyber threats. Conversely, blockchain has emerged as a robust solution to secure these devices due to its decentralised nature. Nevertheless, the fusion of blockchain and IoT technologies is challenging due to performance bottlenecks, network scalability limitations, and blockchain-specific security vulnerabilities. Blockchain, on the other hand, is a recently emerged information security solution that has great potential to secure low-powered IoT devices. This study aims to identify blockchain-specific vulnerabilities through changes in network behaviour, addressing a significant research gap and aiming to mitigate future cybersecurity threats. Integrating blockchain and IoT technologies presents challenges, including performance bottlenecks, network scalability issues, and unique security vulnerabilities. This paper analyses potential security weaknesses in blockchain and their impact on network operations. We developed a real IoT test system utilising three prevalent blockchain applications to conduct experiments. The results indicate that Distributed Denial of Service (DDoS) attacks on low-powered, blockchain-enabled IoT sensor networks cause measurable anomalies in network and device performance, specifically: (1) an average increase in CPU core usage to 34.32%, (2) a reduction in hash rates by up to 66%, (3) an increase in batch timeout by up to 14.28%, and (4) an increase in block latency by up to 11.1%. These findings suggest potential strategies to counter future DDoS attacks on IoT networks.

Keywords


Cite This Article

APA Style
Arachchige, K.G., Murtaza, M., Cheng, C., Albahlal, B.M., Lee, C. (2024). Blockchain-enabled mitigation strategies for distributed denial of service attacks in iot sensor networks: an experimental approach. Computers, Materials & Continua, 81(3), 3679–3705. https://doi.org/10.32604/cmc.2024.059378
Vancouver Style
Arachchige KG, Murtaza M, Cheng C, Albahlal BM, Lee C. Blockchain-enabled mitigation strategies for distributed denial of service attacks in iot sensor networks: an experimental approach. Comput Mater Contin. 2024;81(3):3679–3705. https://doi.org/10.32604/cmc.2024.059378
IEEE Style
K. G. Arachchige, M. Murtaza, C. Cheng, B. M. Albahlal, and C. Lee, “Blockchain-Enabled Mitigation Strategies for Distributed Denial of Service Attacks in IoT Sensor Networks: An Experimental Approach,” Comput. Mater. Contin., vol. 81, no. 3, pp. 3679–3705, 2024. https://doi.org/10.32604/cmc.2024.059378



cc Copyright © 2024 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 683

    View

  • 262

    Download

  • 0

    Like

Share Link