Statistics

    Map

Twitter

An Experiment with DDoS Attack on NodeMCU12e Devices for IoT with T50 Kali Linux
( Vol-6,Issue-1,January 2019 )
Author(s):

Antonio Carlos Bento, Ellen Martins Lopes da Silva, Marcelo Galdino, José Carmino Gomes Júnior

Keywords:

security; IoT; NodeMCU12e; T50; Kali Linux; DDos.

Abstract:

This paper presents the results of an experiment with the Kali Linux operating system and T50 tool to simulate Distributed Denial of Service (DDoS) attacks on the NodeMCU12e controller device used in Internet of Things (IoT) projects. The motivation for the development of this study arose with the creation of different projects that deal with the subject involving the Internet of Things, as a necessity to evaluate the safety and capacity of these devices during an attack simulation, which affects security and exposes the fragility of architecture and construction model. The results showed the types of attacks that can be carried out, as well as the device's lack of ability to avoid these types of attacks, as well as the speed at which it is possible to stop the device services.

ijaers doi crossref DOI:

10.22161/ijaers.6.1.3

Paper Statistics:
  • Total View : 64
  • Downloads : 15
  • Page No: 018-024
Cite this Article:
MLA
Antonio Carlos Bento et al ."An Experiment with DDoS Attack on NodeMCU12e Devices for IoT with T50 Kali Linux". International Journal of Advanced Engineering Research and Science(ISSN : 2349-6495(P) | 2456-1908(O)),vol 6, no. 1, 2019, pp.018-024 AI Publications, doi:10.22161/ijaers.6.1.3
APA
Antonio Carlos Bento, Ellen Martins Lopes da Silva, Marcelo Galdino, José Carmino Gomes Júnior(2019).An Experiment with DDoS Attack on NodeMCU12e Devices for IoT with T50 Kali Linux. International Journal of Advanced Engineering Research and Science(ISSN : 2349-6495(P) | 2456-1908(O)),6(1), 018-024. http://dx.doi.org/10.22161/ijaers.6.1.3
Chicago
Antonio Carlos Bento, Ellen Martins Lopes da Silva, Marcelo Galdino, José Carmino Gomes Júnior. 2019,"An Experiment with DDoS Attack on NodeMCU12e Devices for IoT with T50 Kali Linux". International Journal of Advanced Engineering Research and Science(ISSN : 2349-6495(P) | 2456-1908(O)).6(1):018-024. Doi: 10.22161/ijaers.6.1.3
Harvard
Antonio Carlos Bento, Ellen Martins Lopes da Silva, Marcelo Galdino, José Carmino Gomes Júnior. 2019,An Experiment with DDoS Attack on NodeMCU12e Devices for IoT with T50 Kali Linux, International Journal of Advanced Engineering Research and Science(ISSN : 2349-6495(P) | 2456-1908(O)).6(1), pp:018-024
IEEE
Antonio Carlos Bento, Ellen Martins Lopes da Silva, Marcelo Galdino, José Carmino Gomes Júnior."An Experiment with DDoS Attack on NodeMCU12e Devices for IoT with T50 Kali Linux", International Journal of Advanced Engineering Research and Science(ISSN : 2349-6495(P) | 2456-1908(O)),vol.6,no. 1, pp.018-024,2019.
Bibtex
@article {antoniocarlosbento2019an,
title={An Experiment with DDoS Attack on NodeMCU12e Devices for IoT with T50 Kali Linux},
author={Antonio Carlos Bento, Ellen Martins Lopes da Silva, Marcelo Galdino, José Carmino Gomes Júnior},
journal={International Journal of Advanced Engineering Research and Science},
volume={6},
year= {2019},
}
Share:
References:

[1] A. H. Dar ; B. Habib ; F. Khurshid ; M. T. Banday. (2016). Experimental analysis of DDoS attack and it's detection in Eucalyptus private cloud platform. 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI). pp. 1718-1724.
[2] A. Hussain Dar ; B. Habib ; F. Khurshid ; M. Tariq Banday. (2016). Experimental analysis of DDoS attack and it's detection in Eucalyptus private cloud platform. 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI). pp 1718-1724.
[3] A. P. Murdan ; M. Z. A. Emambocus. (2018). Indoor positioning system simulation for a robot using radio frequency identification. 2018 13th IEEE Conference on Industrial Electronics and Applications (ICIEA). IEEE Conference. pp 986-991.
[4] Arduino. 2018. Official Available at: https://www.arduino.cc
[5] B. Da ; P. P. Esnault ; S. Hu ; C. Wang. Identity/identifier-enabled networks (IDEAS) for Internet of Things (IoT). 2018 IEEE 4th World Forum on Internet of Things (WF-IoT). IEEE Conferences. pp. 412-415.
[6] B. Scott ; J. Xu ; J. Zhang ; A. Brown ; E. Clark ; X. Yuan ; A. Yu ; K. Williams. (2017). An interactive visualization tool for teaching ARP spoofing attack. 2017 IEEE Frontiers in Education Conference (FIE). IEEE Conference. pp. 1-5.
[7] Bento A. C..IoT: NodeMCU 12e X Arduino Uno, Results of an experimental and comparative survey. International Journal of Advance Research in Computer Science and Management Studies, v. 6, p. 46-56, 2018.
[8] CERP. (2009). IoT – Internet of Thinsgs of European Research Cluster. Internet of things: Strategic Reserach Roadmap, Available at: http://www.internet-of-thingsresearch.eu/pdf/IoT_Cluster_Strategic_Research_Agenda_2009.pdf
[9] D. Naranjo ; P. Córdova ; C. Gordon. (2018). Wearable Electrocardiograph. 2018 International Conference on eDemocracy & eGovernment (ICEDEG). IEEE Conference. pp 201-205.
[10] E. R. Naru ; H. Saini ; M. Sharma. (2017). A recent review on lightweight cryptography in IoT. 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). IEEE Conferences. pp. 887-890.
[11] F. Wu ; C. Rüdiger ; J.-M. Redouté ; M. R. Yuce. (2018). W.E-Safe: A wearable IoT sensor node for safety applications via LoRa. 2018 IEEE 4th World Forum on Internet of Things (WF-IoT). IEEE Conferences. pp 144-148.
[12] ITU-T. (2012). Internet of Things Global Standards Initiative. Available at: http://www.itu.int/ITU-T/recommendations/rec.aspx?rec=y.2060.
[13] J. Narayan Goel ; B. M. Mehtre. (2014). Dynamic IPv6 activation based defense for IPv6 router advertisement flooding (DoS) attack. 2014 IEEE International Conference on Computational Intelligence and Computing Research. IEEE COnference. pp 1-5.
[14] L. K. P. Saputra ; Y. Lukito. (2017). Implementation of air conditioning control system using REST protocol based on NodeMCU ESP8266. IEEE Conferences. pp. 126-130.
[15] L. Liang ; K. Zheng ; Q. Sheng ; X. Huang. (2016). A Denial of Service Attack Method for an IoT System. 2016 8th International Conference on Information Technology in Medicine and Education (ITME). IEEE Conferences, pp. 360-364.
[16] M. A. C. Aung ; K. P. Thant. Detection and mitigation of wireless link layer attacks. 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE Conference. pp. 173-178.
[17] M. Denis ; C. Zena ; T. Hayajneh. (2016). Penetration testing: Concepts, attack methods, and defense strategies. 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT). pp. 1-6.
[18] M. Edward ; K. Karyono ; H. Meidia. (2017). Smart fridge design using NodeMCU and home server based on Raspberry Pi 3. 2017 4th International Conference on New Media Studies (CONMEDIA). IEEE COnferences. pp. 148-151.
[19] Marconi, M.; Lakatos, E. (2017). Fundamentos de metodologia científica. 8. ed. São Paulo, Brasil: Ed. Atlas, 2017. pp. 310.
[20] R. Gaddam ; M. Nandhini. (2017). An analysis of various snort based techniques to detect and prevent intrusions in networks proposal with code refactoring snort tool in Kali Linux environment. 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT). IEEE Conferences. pp. 10-15.
[21] S. Arkadii ; C. Vadym. (2017). Research on impact of router critical system resources on traffic routing process. : 2017 2nd International Conference on Advanced Information and Communication Technologies (AICT). IEEE Conference. DOI: 10.1109/AIACT.2017.8020106.
[22] S.P. Kadam ; B. Mahajan ; M. Patanwala ; P. Sanas ; S. Vidyarthi. (2016). Automated Wi-Fi penetration testing. 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT). IEE Conferences. pp. 1092-1096.
[23] T. Shah ; S. Venkatesan. (2018). Authentication of IoT Device and IoT Server Using Secure Vaults. 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE Conferences. pp. 819-834.
[24] V. Visoottiviseth ; P. Akarasiriwong ; S. Chaiyasart ; S. Chotivatunyu. (2017). PENTOS: Penetration testing tool for Internet of Thing devices. TENCON 2017 - 2017 IEEE Region 10 Conference; pp. 2279-2284.