{"id":89,"date":"2021-01-22T07:01:03","date_gmt":"2021-01-22T07:01:03","guid":{"rendered":"http:\/\/blog.rajorshibiswas.com\/?p=89"},"modified":"2021-01-22T07:01:03","modified_gmt":"2021-01-22T07:01:03","slug":"r-biswas-j-wu-and-x-li-a-capacity-aware-distributed-denial-of-service-attack-in-low-power-and-lossy-networks-2019-ieee-40th-sarnoff-symposium-newark-nj-usa-2019-pp-1-6-doi-10-1109-sa","status":"publish","type":"post","link":"https:\/\/www.rajorshibiswas.com\/index.php\/89\/","title":{"rendered":"R. Biswas, J. Wu and X. Li, &#8220;A Capacity-Aware Distributed Denial-of-Service Attack in Low-Power and Lossy Networks,&#8221; 2019 IEEE 40th Sarnoff Symposium, Newark, NJ, USA, 2019, pp. 1-6, doi: 10.1109\/Sarnoff47838.2019.9067822."},"content":{"rendered":"<h1 class=\"document-title\">A Capacity-Aware Distributed Denial-of-Service Attack in Low-Power and Lossy Networks<\/h1>\n<h3><a href=\"http:\/\/blog.rajorshibiswas.com\/wp-content\/uploads\/2021\/01\/09067822.pdf\">Download PDF<\/a>\u00a0 \u00a0<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9067822\">IEEEexplore Link<\/a><\/h3>\n<p>&nbsp;<\/p>\n<div class=\"abstract-text row\">\n<div class=\"col-12\">\n<div class=\"u-mb-1\"><strong>Abstract:<\/strong><\/p>\n<div>Low-Power and Lossy Network (LLN) is composed of embedded devices with limited power, memory, and processing resources. LLN has a wide variety of applications including industrial monitoring, connected home, health care, urban sensor networks and environmental monitoring. LLN uses Routing Protocol for Low-power and lossy networks (RPL) protocol. The RPL maintains directed acyclic graphs for routing packets. By exploiting some features, a Distributed Denial-of-Service (DDoS) attack can be conducted easily. DDoS attacks are very popular and well studied in the context of the Internet, but not in the context of LLNs. In this paper, we propose a powerful DDoS attack framework in LLNs. We formulate the attack as an optimization problem for selecting an optimal set of attackers and their targeted neighbors constrained by a limited link bandwidth. We propose an optimal solution by transforming the optimization problem into a max-flow problem. We provide simulations to support our model.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"u-pb-1 stats-document-abstract-publishedIn\" data-tealium_data=\"{&quot;docType&quot;: &quot;Conference&quot;}\"><strong>Published in:\u00a0<\/strong><a href=\"https:\/\/ieeexplore.ieee.org\/xpl\/conhome\/9055115\/proceeding\">2019 IEEE 40th Sarnoff Symposium<\/a><\/div>\n<div class=\"row u-pt-1\">\n<div class=\"col-6\">\n<div class=\"u-pb-1 doc-abstract-confdate\"><strong>Date of Conference:\u00a0<\/strong>23-24 Sept. 2019<\/div>\n<div class=\"u-pb-1 doc-abstract-dateadded\"><strong>Date Added to IEEE\u00a0<i>Xplore<\/i>:\u00a0<\/strong>16 April 2020<\/div>\n<div class=\"u-pb-1\">\n<div><strong><i class=\"icon-caret-abstract\"><\/i>ISBN Information:<\/strong><\/div>\n<\/div>\n<div class=\"u-pb-1\">\n<div role=\"button\"><strong><i class=\"icon-caret-abstract\"><\/i>ISSN Information:<\/strong><\/div>\n<\/div>\n<\/div>\n<div class=\"col-6\">\n<div class=\"u-pb-1\"><strong>INSPEC Accession Number:\u00a0<\/strong>19534209<\/div>\n<div class=\"u-pb-1 stats-document-abstract-doi\"><strong>DOI:\u00a0<\/strong><a href=\"https:\/\/doi.org\/10.1109\/Sarnoff47838.2019.9067822\" target=\"_blank\" rel=\"noopener\">10.1109\/Sarnoff47838.2019.9067822<\/a><\/div>\n<div class=\"u-pb-1 doc-abstract-publisher\"><span class=\"publisher-info-container black-tooltip\"><span class=\"title\">Publisher:\u00a0<\/span>IEEE<\/span><\/div>\n<div class=\"u-pb-1 doc-abstract-conferenceLoc\"><strong>Conference Location:\u00a0<\/strong>Newark, NJ, USA, USA<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A Capacity-Aware Distributed Denial-of-Service Attack in Low-Power and Lossy Networks Download PDF\u00a0 \u00a0IEEEexplore Link &nbsp; Abstract: Low-Power and Lossy Network (LLN) is composed of embedded devices with limited power, memory, and processing resources. LLN has a wide variety of applications including industrial monitoring, connected home, health care, urban sensor networks and environmental monitoring. LLN uses &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.rajorshibiswas.com\/index.php\/89\/\"> <span class=\"screen-reader-text\">R. Biswas, J. Wu and X. Li, &#8220;A Capacity-Aware Distributed Denial-of-Service Attack in Low-Power and Lossy Networks,&#8221; 2019 IEEE 40th Sarnoff Symposium, Newark, NJ, USA, 2019, pp. 1-6, doi: 10.1109\/Sarnoff47838.2019.9067822.<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6,4],"tags":[11],"_links":{"self":[{"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/posts\/89"}],"collection":[{"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/comments?post=89"}],"version-history":[{"count":1,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/posts\/89\/revisions"}],"predecessor-version":[{"id":91,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/posts\/89\/revisions\/91"}],"wp:attachment":[{"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/media?parent=89"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/categories?post=89"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/tags?post=89"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}