Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems

Luca Arnaboldi, Charles Morisset

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Denial of Service (DoS) attacks constitute a major security threat to today's Internet. This challenge is especially pertinent to the Internet of Things (IoT) as devices have less computing power, memory and security mechanisms to mitigate DoS attacks. This paper presents a model that mimics the unique characteristics of a network of IoT devices, including components of the system implementing `Crypto Puzzles' - a DoS mitigation technique. We created an imitation of a DoS attack on the system, and conducted a quantitative analysis to simulate the impact such an attack may potentially exert upon the system, assessing the trade off between security and throughput in the IoT system. We model this through stochastic model checking in PRISM and provide evidence that supports this as a valuable method to compare the efficiency of different implementations of IoT systems, exemplified by a case study.
Original languageEnglish
Title of host publicationSecurity and Trust Management (STM 2013)
EditorsGiovanni Livraga, Chris Mitchell
Place of PublicationCham
PublisherSpringer International Publishing
Pages224-233
Number of pages10
ISBN (Electronic)978-3-319-68063-7
ISBN (Print)978-3-319-68062-0
DOIs
Publication statusPublished - 13 Sep 2017
Event13th International Workshop on Security and Trust Management - Oslo, Norway
Duration: 14 Sep 201715 Sep 2017
http://stm2017.di.unimi.it/

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume10547
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Workshop

Workshop13th International Workshop on Security and Trust Management
Abbreviated titleSTM 2017
CountryNorway
CityOslo
Period14/09/1715/09/17
Internet address

Fingerprint

Dive into the research topics of 'Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems'. Together they form a unique fingerprint.

Cite this