Blockchain solutions for IoT devices against DDoS attacks: a review
By: Mahalaxmi, G.
Contributor(s): Varaprasad, R.
Publisher: Hyderabad IUP Publications 2022Edition: Vol.18(4), Dec.Description: 25-46p.Subject(s): Computer EngineeringOnline resources: Click here In: IUP journal of information technologySummary: Internet of Things (IoT)-connected devices are used in a wide range of applications, including smart cities, agriculture, healthcare, logistics, etc. However, the rise in the number of attacks utilizing Distributed Denial of Service (DDoS) protocols is a cause for concern. IoT devices have security holes that make it easier for fraudsters to take control of them and use them as part of botnets to launch DDoS assaults. The processing and storage capabilities of the vast majority of IoT-connected devices are quite constrained. Blockchain technology, which is still in its early stages, may be used to address concerns over the security of IoT devices. It is crucial to consider many blockchain-based defence techniques that are currently available for IoT devices in order to prevent DDoS attacks.Item type | Current location | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
Articles Abstract Database | School of Engineering & Technology Archieval Section | Not for loan | 2023-0997 |
Internet of Things (IoT)-connected devices are used in a wide range of applications, including smart cities, agriculture, healthcare, logistics, etc. However, the rise in the number of attacks utilizing Distributed Denial of Service (DDoS) protocols is a cause for concern. IoT devices have security holes that make it easier for fraudsters to take control of them and use them as part of botnets to launch DDoS assaults. The processing and storage capabilities of the vast majority of IoT-connected devices are quite constrained. Blockchain technology, which is still in its early stages, may be used to address concerns over the security of IoT devices. It is crucial to consider many blockchain-based defence techniques that are currently available for IoT devices in order to prevent DDoS attacks.
There are no comments for this item.