DDoS cyberattacks in smart home IoT networks and common mitigation techniques

Okporokpo, O, Olajide, F, Ajienka, N ORCID logoORCID: https://orcid.org/0000-0002-8792-282X and Ma, X ORCID logoORCID: https://orcid.org/0000-0003-0074-4192, 2025. DDoS cyberattacks in smart home IoT networks and common mitigation techniques. In: Miraz, MH, Southall, G, Ali, M and Ware, A, eds., Emerging technologies in computing: 7th EAI International Conference, iCETiC 2024, Essex, UK, August 15–16, 2024, proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering . Cham: Springer, pp. 187-206. ISBN 9783031926242

[thumbnail of 2521494_Ma.pdf] Text
2521494_Ma.pdf - Post-print
Full-text access embargoed until 17 July 2026.

Download (582kB)

Abstract

The prevalence of smart home Internet of Things (IoT) devices has led to an increased adoption worldwide. The widespread acceptance and adoption of these smart home devices by both organizations and individuals can be attributed to the numerous advantages facilitated by the advancing Internet of Things (IoT) technologies. These technologies incorporate sensors, cameras, and actuators in devices, enabling them to gather information from the surroundings and perform designated tasks, thereby simplifying users' daily lives and work. However, the emergence of various types of smart home devices has significantly amplified the cyber threat landscape and subsequently this has resulted in a heightened demand for enhanced cybersecurity measures. The escalation and evolution of digital threats targeting smart home networks have led to several innovations. However, despite extensive research and investigations, Distributed Denial of Service (DDoS) attacks remain a pervasive and common attack vector targeting smart home IoT networks. This study delves into various existing DDoS attack types targeting smart home IoT networks and the common cybersecurity approaches tailored for mitigating these unique challenges. Additionally, we classified the mitigation techniques into three major categories, namely: Action or Event-based, Location-based & Hybrid-based systems. Finally, the challenges associated with each of these techniques we highlighted and future research directions in this emerging field presented.

Item Type: Chapter in book
Description: Paper presented at 7th EAI International Conference, iCETiC 2024, Essex, UK, August 15–16, 2024.
Creators: Okporokpo, O., Olajide, F., Ajienka, N. and Ma, X.
Publisher: Springer
Place of Publication: Cham
Date: 17 July 2025
ISBN: 9783031926242
Identifiers:
Number
Type
10.1007/978-3-031-92625-9_12
DOI
2521494
Other
Divisions: Schools > School of Science and Technology
Record created by: Laura Borcherds
Date Added: 14 Nov 2025 10:46
Last Modified: 14 Nov 2025 10:46
URI: https://irep.ntu.ac.uk/id/eprint/54731

Actions (login required)

Edit View Edit View

Statistics

Views

Views per month over past year

Downloads

Downloads per month over past year