Skip to main content
Log in

CIoTAS protocol: CloudIoT available services protocol through autonomic computing against distributed denial of services attacks

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

In the reliability and security challenges for the Internet of Things (IoT) systems, managing unpredictable events and controlling the abnormal situation automatically are provisioned by the integration of self-healing properties. Despite this, in our knowledge, this integration is not used to repair from malicious behaviors and potential distributed denial of service (DDoS) device attacks, especially in a collaborative way to maximize the quality of service parameters (availability). For that, we propose a diagnosable distributed protocol, in a hybrid-IoT system designed based on Service-Oriented Architecture (SOA) for IoT middleware in the things-oriented vision. The proposed protocol identifies and re-locates the denied service using the contextual recovery or the Sensing as a Service model (\(S^2\)aaS) in the Cloud-IoT platform, as a backup to ensure the service availability. On the basis of this idea, this paper defines the system states under self-healing (in collaboration state) and self-protection autonomic-control loops. Besides, the closure (safety) and the convergence (liveness) properties will be defined and proved satisfied by the proposed protocol. Furthermore, to highlight the interest of the protocol, we present an application in the context of the smart-building (Lab) as an IoT solution.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19

Similar content being viewed by others

Notes

  1. An intermediate unit/node between the IoT devices and the cloud to manage the communication for both sides (e.g., hub or router).

  2. The layer is used to send and receive data according to the chosen protocols, such as MQTT, Zigbee, etc.

  3. Industrial Internet of Things.

  4. An extension of Cloud paradigm to the network edge.

  5. The CIA security threats are Confidentiality, Integrity, and Availability.

  6. A type of DDoS detection approaches based anomaly detection.

  7. Such as: study rooms, desktops, conference sections.

References

  • Abreu DP, Velasquez K, Curado M, Monteiro E (2017) A resilient internet of things architecture for smart cities. Ann Telecommun 72(1–2):19–30

    Google Scholar 

  • Akram OK, Franco DJ, Ismail S (2016) Smart buildings-a new environment (theoretical approach). Int J Eng Technol Manag Appl Sci 4(4):1–5

    Google Scholar 

  • Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surveys Tutor 17(4):2347–2376

    Google Scholar 

  • Alshehri A, Benson J, Patwa F, Sandhu R (2018) Access control model for virtual objects (shadows) communication for aws internet of things. In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, ACM, pp 175–185

  • Angarita R (2015) Responsible objects: towards self-healing internet of things applications. In: 2015 IEEE International Conference on Autonomic Computing, IEEE, pp 307–312

  • Anisetti M, Ardagna CA, Damiani E, Gaudenzi F, Jeon G (2020) Cost-effective deployment of certified cloud composite services. J Parallel Distrib Comput 135:203–218

    Google Scholar 

  • Arora A, Gouda M (1993) Closure and convergence: a foundation of fault-tolerant computing. IEEE Trans Softw Eng 19(11):1015–1027

    Google Scholar 

  • Ashraf QM, Habaebi MH (2015) Autonomic schemes for threat mitigation in internet of things. J Netw Comput Appl 49:112–127

    Google Scholar 

  • Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805

    Google Scholar 

  • Baitiche H, Bouzenada M, Saidouni DE, Berkane Y, Chama H (2018) A context-aware distributed protocol for updating bdi agents abilities. In: International Symposium on modelling and implementation of complex systems, Springer, pp 243–256

  • Bajunaid N (2015) Autonomic iot systems realizing self-* properties in iot systems. https://docplayer.net/18033171-Autonomic-iot-systems-realizing-self-properties-in-iot-systems.html, Accessed 30 Sep 2019

  • Benayache A, Bilami A, Barkat S, Lorenz P, Taleb H (2019) Msm: a microservice middleware for smart wsn-based iot application. J Netw Comput Appl 144:138–154

    Google Scholar 

  • Botta A, De Donato W, Persico V, Pescapé A (2014) On the integration of cloud computing and internet of things. In: 2014 International Conference on Future Internet of Things and Cloud, IEEE, pp 23–30

  • Botta A, De Donato W, Persico V, Pescapé A (2016) Integration of cloud computing and internet of things: a survey. Future Gener Comput Syst 56:684–700

    Google Scholar 

  • Boukharrou R, Chaouche AC, Seghrouchni AEF, Ilié JM, Saïdouni DE (2015) Dealing with temporal failure in ambient systems: a dynamic revision of plans. J Ambient Intell Humaniz Comput 6(3):325–336

    Google Scholar 

  • Carl G, Kesidis G, Brooks RR, Rai S (2006) Denial-of-service attack-detection techniques. IEEE Internet Comput 10(1):82–89

    Google Scholar 

  • Cavalcante E, Pereira J, Alves MP, Maia P, Moura R, Batista T, Delicato FC, Pires PF (2016) On the interplay of internet of things and cloud computing: a systematic mapping study. Comput Commun 89:17–33

    Google Scholar 

  • Chaouche AC, Seghrouchni AEF, Ilié JM, Saïdouni DE (2016) Learning from situated experiences for a contextual planning guidance. J Ambient Intell Hum Comput 7(4):555–566

    Google Scholar 

  • Cirani S, Ferrari G, Mancin M, Picone M (2018) Virtual replication of iot hubs in the cloud: A flexible approach to smart object management. J Sens Actuator Netw 7(2):16

    Google Scholar 

  • Computing A et al (2006) An architectural blueprint for autonomic computing. IBM White Paper 31(2006):1–6

    Google Scholar 

  • Da Xu L, He W, Li S (2014) Internet of things in industries: a survey. IEEE Trans Ind Inf 10(4):2233–2243

    Google Scholar 

  • Das A, Thulasiraman K, Agarwal VK (1994) Diagnosis of t/(t+1)-diagnosable systems. SIAM J Comput 23(5):895–905

    MathSciNet  Google Scholar 

  • Djenna A, Saïdouni DE (2018) Cyber attacks classification in iot-based-healthcare infrastructure. In: 2018 2nd Cyber Security in Networking Conference (CSNet), IEEE, pp 1–4

  • FarlexInc (2016) The free dictionary. https://www.thefreedictionary.com/diagnosable. Accessed 30 Sep 2019

  • Ferdous MS, Hussein R, Alassafi M, Alharthi A, Walters R, Wills G (2016) Threat taxonomy for cloud of things. Internet Things Big Data Anal Recent Trends Chall 1:149–191

    Google Scholar 

  • Friedman AD, Simoncini L (1980) System-level fault diagnosis. Computer 3:47–53

    Google Scholar 

  • Fruhlinger J (2018) The mirai botnet explained: how teen scammers and cctv cameras almost brought down the internet. https://www.csoonline.com/article/3258748/the-mirai-botnet-explained-how-teen-scammers-and-cctv-cameras-almost-brought-down-the-internet.html. Accessed 30 Sep 2019

  • Ghosh D, Sharman R, Rao HR, Upadhyaya S (2007) Self-healing systems–survey and synthesis. Decis Support Syst 42(4):2164–2185

    Google Scholar 

  • Hallman R, Bryan J, Palavicini G, Divita J, Romero-Mariona J (2017) Ioddos-the internet of distributed denial of sevice attacks. In: 2nd International Conference on internet of things, big data and security. SCITEPRESS, pp 47–58

  • Hu P, Indulska J, Robinson R (2008) An autonomic context management system for pervasive computing. In: 2008 Sixth Annual IEEE International Conference on pervasive computing and communications (PerCom), IEEE, pp 213–223

  • IoTSec (2019) The denial of service attack from iot devices. https://its-wiki.no/wiki/IoTSec:The_Denial_of_Service_Attack_from_IoT_devices. Accessed 30 Sep 2019

  • Kaur P, Kumar M, Bhandari A (2017) A review of detection approaches for distributed denial of service attacks. Syst Sci Control Eng 5(1):301–320

    Google Scholar 

  • Kephart J, Chess D (2003) The vision of autonomic computing. Computer 36:41–50

    Google Scholar 

  • Kim H, Kang E, Broman D, Lee EA (2017) An architectural mechanism for resilient iot services. In: Proceedings of the 1st ACM Workshop on the Internet of Safe Things, ACM, pp 8–13

  • Kolias C, Kambourakis G, Stavrou A, Voas J (2017) Ddos in the iot: Mirai and other botnets. Computer 50(7):80–84

    Google Scholar 

  • Kühn F, Hellbrück H, Fischer S (2018) A model-based approach for self-healing iot systems. In: Proceedings of the 7th International Conference on sensor networks, SCITEPRESS-Science and Technology Publications, Lda, pp 135–140

  • Li S, Da Xu L, Zhao S (2015) The internet of things: a survey. Inf Syst Front 17(2):243–259

    Google Scholar 

  • Li Y, Pandis I, Guo Y (2016) Enabling virtual sensing as a service. In: Borne KD (ed) Informatics, vol 3. Multidisciplinary Digital Publishing Institute, p 3

  • Liang L, Zheng K, Sheng Q, Huang X (2016) A denial of service attack method for an iot system. In: 2016 8th International Conference on information technology in medicine and education (ITME), IEEE, pp 360–364

  • Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497–1516

    Google Scholar 

  • Mohanan V, Budiarto R, Aldmour I (2017) Powering the Internet of Things with 5G Networks. IGI Global, Hershey

    Google Scholar 

  • Montoya M, Bacles-Min S, Molnos A, Fournier JJ (2018) Sward: a secure wake-up radio against denial-of-service on iot devices. In: Proceedings of the 11th ACM Conference on security & privacy in wireless and mobile networks, ACM, pp 190–195

  • Parhami B (2015) Dependable computing: a multilevel approach. Draft of book manuscript, available online at: https://web.ece.ucsb.edu/~parhami/text_dep_comp.htm. Accessed 10 Nov 2019

  • Perera C (2017) Sensing as a service for internet of things: a roadmap. Lulu.com, Morrisville

    Google Scholar 

  • Preparata FP, Metze G, Chien RT (1967) On the connection assignment problem of diagnosable systems. IEEE Trans Electron Comput 6:848–854

    Google Scholar 

  • Psaier H, Dustdar S (2011) A survey on self-healing systems: approaches and systems. Computing 91(1):43–73

    Google Scholar 

  • Qureshi KN, Hussain R, Jeon G (2020) A distributed software defined networking model to improve the scalability and quality of services for flexible green energy internet for smart grid systems. Comput Electric Eng 84:106634

    Google Scholar 

  • Ray PP (2016) A survey of iot cloud platforms. Future Comput Inf J 1(1–2):35–46

    Google Scholar 

  • Ray PP (2018) A survey on internet of things architectures. J King Saud Univ Comput Inf Sci 30(3):291–319

    Google Scholar 

  • Roman R, Najera P, Lopez J (2011) Securing the internet of things. Computer 9:51–58

    Google Scholar 

  • Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed internet of things. Comput Netw 57(10):2266–2279

    Google Scholar 

  • Rubio JE, Alcaraz C, Roman R, Lopez J (2019) Current cyber-defense trends in industrial control systems. Comput Secur 87:101561

    Google Scholar 

  • Salehie M, Tahvildari L (2009) Self-adaptive software: landscape and research challenges. ACM Trans Auton Adapt Syst (TAAS) 4(2):1–42

    Google Scholar 

  • Sharma V, Lee K, Kwon S, Kim J, Park H, Yim K, Lee SY (2017) A consensus framework for reliability and mitigation of zero-day attacks in iot. Secur Commun Netw 2017:4749085:1–4749085:24

    Google Scholar 

  • Sterritt R (2005) Autonomic computing. Innov Syst Softw Eng 1(1):79–88

    Google Scholar 

  • Tosi D (2004) Research perspectives in self-healing systems. In: LTA p 06

  • Ullaha H, Islam N, Jan Z, Farman H, Jan B, Jeon G, Ahmad A (2018) Optic disc segmentation and classification in color fundus images: a resource-aware healthcare service in smart cities. J Ambient Intell Human Comput 30:1–13

    Google Scholar 

  • Weber J (2019) Fundamentals of iot device management. http://iotdesign.embedded-computing.com/articles/fundamentals-of-iot-device-management/. Accessed 30 Sep 2019

  • Whitmore A, Agarwal A, Da Xu L (2015) The internet of things–a survey of topics and trends. Inf Syst Front 17(2):261–274

    Google Scholar 

  • WISeKey (2016) Solutions to prevent iot devices to be used for ddos attacks. chrome-extension://cbnaodkpfinfiipjblikofhlhlcickei/src/pdfviewer/web/viewer.html?file=https://docs.wisekey.com/site/justdownload.html?id=62. Accessed 30 Sep 2019

  • Yaseen Q, Aldwairi M, Jararweh Y, Al-Ayyoub M, Gupta B (2018) Collusion attacks mitigation in internet of things: a fog based model. Multimed Tools Appl 77(14):18249–18268

    Google Scholar 

  • Zaslavsky A, Perera C, Georgakopoulos D (2013) Sensing as a service and big data. arXiv preprint arXiv:13010159

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bouchera Maati.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Maati, B., Saidouni, D.E. CIoTAS protocol: CloudIoT available services protocol through autonomic computing against distributed denial of services attacks. J Ambient Intell Human Comput 14, 15175–15204 (2023). https://doi.org/10.1007/s12652-020-02556-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02556-0

Keywords

Navigation