Preventing Denial of Service Attacks in IoT Networks through Verifiable Delay Functions

  title={Preventing Denial of Service Attacks in IoT Networks through Verifiable Delay Functions},
  author={Vidal Attias and Luigi Vigneri and Vassil S. Dimitrov},
  journal={GLOBECOM 2020 - 2020 IEEE Global Communications Conference},
Permission-less distributed ledgers provide a promising approach to deal with the Internet of Things (IoT) paradigm. Since IoT devices mostly generate data transactions and micro payments, distributed ledgers that use fees to regulate the network access are not an optimal choice. In this paper, we study a feeless architecture developed by IOTA and designed specifically for the IoT. Due to the lack of fees, malicious nodes can exploit this feature to generate an unbounded number of transactions… 

Figures from this paper

Access Control for Distributed Ledgers in the Internet of Things: A Networking Approach
This article considers a class of IoT-friendly DLTs based on directed acyclic graphs, rather than a blockchain, and with a reputation system in the place of Proof of Work (PoW), and model the access control problem and presents an algorithm that is fair, efficient, and secure.
Encrypting Into the Future Exploring Time-Lock Encryption Bachelor Thesis
An overview over TLE is provided based on three selected constructions based on adequate criteria to provide an overview over the strengths and limitations.
Fast Generation of RSA Keys using Smooth Integers
A technique is showcased that will eliminate the first phase of the primality testing algorithms, which can be particularly beneficial in the case of decentralized environments for shared RSA keys as the initial trial division part of the key generation algorithms can be avoided at no cost.
IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques
This treatise identifies three main trends that need to be specifically addressed: security issues of the integration of IoT with cloud and blockchains, the rapid changes in cryptography due to quantum computing, and the rise of artificial intelligence and evolution methods in the scope of security of IoT.


Efficient verifiable delay functions
  • B. Wesolowski
  • Computer Science, Mathematics
    IACR Cryptol. ePrint Arch.
  • 2018
This work constructs a verifiable delay function (VDF) based on groups of unknown order such as an RSA group, or the class group of an imaginary quadratic field, which is very short, and the verification of correctness is very efficient.
A survey on IoT applications, security challenges and counter measures
  • A. Pawar, S. Ghumbre
  • Computer Science
    2016 International Conference on Computing, Analytics and Security Trends (CAST)
  • 2016
The analysis of the various medical services of IoT shows that the use of IoT in the medical field increases the quality of life, user experience, patient outcomes and real-time disease management.
Hashcash - A Denial of Service Counter-Measure
This paper captures in one place the various applications, improvements suggested and related subsequent publications, and describes initial experience from experiments using hashcash.
Simple Verifiable Delay Functions
A statistically sound public-coin protocol to prove that a tuple (N,x,T,y) satisfies y=x2T (mod N) where the prover doesn’t know the factorization of N and its running time is dominated by solving the puzzle, that is, compute x2T, which is conjectured to require T sequential squarings.
Implementation Study of Two Verifiable DelayFunctions
An implementation study of two Verifiable Delay Functions, a new cryptographic primitive achieving Proof of Work goals in an unparallelizable way, and simulation results and an optimization based on a multiexponentiation algorithm are provided.
Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency
This chapter asks the important question whether this approach toProof-of-Work is generally viable by estimating the resource requirements, in terms of operating cost and ecological footprint, of a suitably dimensioned PoW infrastructure and comparing them to three attack scenarios.
Verifiable Delay Functions
The requirements for a verifiable delay function (VDF) are formalized and new candidate constructions are presented that are the first to achieve an exponential gap between evaluation and verification time.
The Sybil Attack
It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
A method for obtaining digital signatures and public-key cryptosystems
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key, soriers or other secure means are not needed to transmit keys.