Abstract
Denial of Service (DoS) attacks constitute a major security threat to today’s Internet. This challenge is especially pertinent to the Internet of Things (IoT) as devices have less computing power, memory and security mechanisms to mitigate DoS attacks. This paper presents a model that mimics the unique characteristics of a network of IoT devices, including components of the system implementing ‘Crypto Puzzles’ - a DoS mitigation technique. We created an imitation of a DoS attack on the system, and conducted a quantitative analysis to simulate the impact such an attack may potentially exert upon the system, assessing the trade off between security and throughput in the IoT system. We model this through stochastic model checking in PRISM and provide evidence that supports this as a valuable method to compare the efficiency of different implementations of IoT systems, exemplified by a case study.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abdelhakim, M., Ren, J., Li, T.: Throughput analysis and routing security discussions of mobile access coordinated wireless sensor networks. In: 2014 IEEE Global Communications Conference (GLOBECOM), pp. 4616–4621. IEEE (2014)
Aura, T., Nikander, P., Leiwo, J.: DOS-resistant authentication with client puzzles. In: Christianson, B., Malcolm, J.A., Crispo, B., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 2133, pp. 170–177. Springer, Heidelberg (2001). doi:10.1007/3-540-44810-1_22
Aziz, B.: A formal model and analysis of an IoT protocol. Ad Hoc Netw. 36, 49–57 (2016)
Baier, C., Katoen, J.P., Larsen, K.G.: Principles of Model Checking. MIT press, Cambridge (2008)
Basagiannis, S., Katsaros, P., Pombortsis, A., Alexiou, N.: Probabilistic model checking for the quantification of DoS security threats. Comput. Secur. 28(6), 450–465 (2009). http://www.sciencedirect.com/science/article/pii/S0167404809000042
Fruth, M.: Formal methods for the analysis of wireless network protocols. Oxford University (2011)
Hummen, R., Wirtz, H., Ziegeldorf, J.H., Hiller, J., Wehrle, K.: Tailoring end-to-end IP security protocols to the internet of things. In: 2013 21st IEEE International Conference on Network Protocols (ICNP), pp. 1–10, October 2013
Kwiatkowska, M., Norman, G., Parker, D.: PRISM: probabilistic symbolic model checker. In: Field, T., Harrison, P.G., Bradley, J., Harder, U. (eds.) TOOLS 2002. LNCS, vol. 2324, pp. 200–204. Springer, Heidelberg (2002). doi:10.1007/3-540-46029-2_13
Long, N., Thomas, R.: Trends in denial of service attack technology. CERT Coordination Center (2001)
Mirkovic, J., Dietrich, S., Dittrich, D., Reiher, P.: Internet Denial of Service: Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security). Prentice Hall PTR, Upper Saddle River (2004)
Nimal, V.: Statistical approaches for probabilistic model checking. Ph.D. thesis, University of Oxford (2010)
Kumar, G.S.: Modelling and verification of CoAP over routing layer using spin model checker (2016)
Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 3, pp. 648–651. IEEE (2012)
Talpade, R., Madhani, S., Mouchtaris, P., Wong, L.: Mitigating denial of service attacks. US Patent Ap. 10/353,527, 29 Jan 2003
Tritilanunt, S., Boyd, C., Foo, E., Nieto, J.M.G.: Examining the DoS resistance of HIP. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006. LNCS, vol. 4277, pp. 616–625. Springer, Heidelberg (2006). doi:10.1007/11915034_85
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Arnaboldi, L., Morisset, C. (2017). Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems. In: Livraga, G., Mitchell, C. (eds) Security and Trust Management. STM 2017. Lecture Notes in Computer Science(), vol 10547. Springer, Cham. https://doi.org/10.1007/978-3-319-68063-7_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-68063-7_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68062-0
Online ISBN: 978-3-319-68063-7
eBook Packages: Computer ScienceComputer Science (R0)