Advertisement

Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems

  • Luca ArnaboldiEmail author
  • Charles Morisset
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10547)

Abstract

Denial of Service (DoS) attacks constitute a major security threat to today’s Internet. This challenge is especially pertinent to the Internet of Things (IoT) as devices have less computing power, memory and security mechanisms to mitigate DoS attacks. This paper presents a model that mimics the unique characteristics of a network of IoT devices, including components of the system implementing ‘Crypto Puzzles’ - a DoS mitigation technique. We created an imitation of a DoS attack on the system, and conducted a quantitative analysis to simulate the impact such an attack may potentially exert upon the system, assessing the trade off between security and throughput in the IoT system. We model this through stochastic model checking in PRISM and provide evidence that supports this as a valuable method to compare the efficiency of different implementations of IoT systems, exemplified by a case study.

References

  1. 1.
    Abdelhakim, M., Ren, J., Li, T.: Throughput analysis and routing security discussions of mobile access coordinated wireless sensor networks. In: 2014 IEEE Global Communications Conference (GLOBECOM), pp. 4616–4621. IEEE (2014)Google Scholar
  2. 2.
    Aura, T., Nikander, P., Leiwo, J.: DOS-resistant authentication with client puzzles. In: Christianson, B., Malcolm, J.A., Crispo, B., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 2133, pp. 170–177. Springer, Heidelberg (2001). doi: 10.1007/3-540-44810-1_22 CrossRefGoogle Scholar
  3. 3.
    Aziz, B.: A formal model and analysis of an IoT protocol. Ad Hoc Netw. 36, 49–57 (2016)CrossRefGoogle Scholar
  4. 4.
    Baier, C., Katoen, J.P., Larsen, K.G.: Principles of Model Checking. MIT press, Cambridge (2008)zbMATHGoogle Scholar
  5. 5.
    Basagiannis, S., Katsaros, P., Pombortsis, A., Alexiou, N.: Probabilistic model checking for the quantification of DoS security threats. Comput. Secur. 28(6), 450–465 (2009). http://www.sciencedirect.com/science/article/pii/S0167404809000042 CrossRefGoogle Scholar
  6. 6.
    Fruth, M.: Formal methods for the analysis of wireless network protocols. Oxford University (2011)Google Scholar
  7. 7.
    Hummen, R., Wirtz, H., Ziegeldorf, J.H., Hiller, J., Wehrle, K.: Tailoring end-to-end IP security protocols to the internet of things. In: 2013 21st IEEE International Conference on Network Protocols (ICNP), pp. 1–10, October 2013Google Scholar
  8. 8.
    Kwiatkowska, M., Norman, G., Parker, D.: PRISM: probabilistic symbolic model checker. In: Field, T., Harrison, P.G., Bradley, J., Harder, U. (eds.) TOOLS 2002. LNCS, vol. 2324, pp. 200–204. Springer, Heidelberg (2002). doi: 10.1007/3-540-46029-2_13 CrossRefGoogle Scholar
  9. 9.
    Long, N., Thomas, R.: Trends in denial of service attack technology. CERT Coordination Center (2001)Google Scholar
  10. 10.
    Mirkovic, J., Dietrich, S., Dittrich, D., Reiher, P.: Internet Denial of Service: Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security). Prentice Hall PTR, Upper Saddle River (2004)Google Scholar
  11. 11.
    Nimal, V.: Statistical approaches for probabilistic model checking. Ph.D. thesis, University of Oxford (2010)Google Scholar
  12. 12.
    Kumar, G.S.: Modelling and verification of CoAP over routing layer using spin model checker (2016)Google Scholar
  13. 13.
    Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 3, pp. 648–651. IEEE (2012)Google Scholar
  14. 14.
    Talpade, R., Madhani, S., Mouchtaris, P., Wong, L.: Mitigating denial of service attacks. US Patent Ap. 10/353,527, 29 Jan 2003Google Scholar
  15. 15.
    Tritilanunt, S., Boyd, C., Foo, E., Nieto, J.M.G.: Examining the DoS resistance of HIP. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006. LNCS, vol. 4277, pp. 616–625. Springer, Heidelberg (2006). doi: 10.1007/11915034_85 CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.School of ComputingNewcastle UniversityNewcastle upon TyneUK

Personalised recommendations