Mimi M Cherian

Work place: Department of Computer Engineering, Pillai College of Engineering, Navi Mumbai, Mumbai University

E-mail: mcherian@mes.ac.in

Website:

Research Interests:

Biography

Mimi Cherian received ME from Pillai College of Engineering under Mumbai University. B.E from K.C College of Engineering Mumbai University. Currently pursuing a Ph.D. from Pillai College of Engineering under Mumbai University. Published paper on Game theory-based network selection in 4G in ICCCCIT-2015 conferences. Firewall Optimization with Traffic Awareness using BDD in IJCIS 2016. Survey of Security Threats in IoT and Emerging Countermeasures”, Springer SSCC 2018. Integration of IoTand SDN to mitigate DDoS attack with RYU Controller”, Springer, ICCBI 2020.

Author Articles
Mitigation of DDOS and MiTM Attacks using Belief Based Secure Correlation Approach in SDN-Based IoT Networks

By Mimi M Cherian Satishkumar L. Varma

DOI: https://doi.org/10.5815/ijcnis.2022.01.05, Pub. Date: 8 Feb. 2022

In recent years the domain of Internet of Things (IoT) has acquired great interest from the ICT community. Environmental observation and collecting information is one of the key reasons that IoT infrastructure facilitates the creation of many varieties of the latest business methods and applications. There are however still issues about security measures to be resolved to ensure adequate operation of devices. Distributed Denial of Service (DDoS) attacks are currently the most severe virtual threats that are causing serious damage to many IoT devices. With this in mind, numerous research projects were carried out to discover new methods and develop Novel techniques and solutions for DDOS attacks prevention. The use of new technology, such as software-defined networking (SDN) along with IoT devices has proven to be an innovative solution to mitigate DDoS attacks. In this article, we are using a novel data sharing system in IoT units that link IoT units with the SDN controller and encrypt information from IoT unit. We use conventional Redstone cryptographic algorithms to encrypt information from IoT devices in this framework. The Proposed Belief Based Secure Correlation methodology supports the prevention of DDOS attacks and other forms of data attacks. The system proposes new routes for transmission through the controller and communicates with approved switches for the safe transmission of data. To simulate our entire scenario, we proposed the algorithm Belief Based Secure Correlation (BBSC) implemented in SDN–IoT Testbed and verified IoT data is secure during transmission in the network.

[...] Read more.
Other Articles