Next-Gen DNS and Security Challenges in IoT Ecosystems
DOI:
https://doi.org/10.63282/3050-922X.IJERET-V3I2P110Keywords:
DNS, IoT Security, DNSSEC, DoH, DoT, DDoS, Blockchain DNS, Edge Computing, Anomaly Detection, IoT ScalabilityAbstract
The meteoric growth of Internet of Things (IoT) has transformed the networking sector by connecting billions of heterogeneous devices to the Net. The benefits created by this digital revolution are unprecedented in relation to automation, monitoring, and decision making. Nevertheless, it also brings significant security flaws as well as questions of scalability, especially across legacy Domain Name System (DNS) infrastructure. DNS is a very important Internet component, which translates human-readable names into IP addresses that can be understood by machine. As the number of IoT devices grows, the question of supporting performance, security, and reliability of traditional DNS becomes difficult. DNS-based attack supports such as cache poisoning, DDoS, DNS tunnelling, and spoofing are easy to launch against IoT devices, since IoT devices often have weak security capabilities, at least by comparison with a PC or other managed device. Moreover, these problems are complicated by the fact that, unlike with popular protocols (HTTP, HTTPS, FTP, TCP), the tools used in IoT are not standardized, thus compounding the problem of adaptation to DNS. The paper explores the future forms of DNS, improvements on security protocols like DNSSEC and DNS over HTTPS (DoH) and DNS over TLS (DoT), and decentralized one like blockchain based DNS. It nulls their contributions in alleviating the security challenges that are IoT-specific, low latency, and facilitating the ability of IoT networks to handle massive scales. The paper encompasses an elaborate literature review, test methodology to assay the resilience of security, and performance tracking in the emulated IoT conditions. Lastly, it suggests an inclusive security mechanism that consists of edge computing, AI-based pattern detection, and safe DNS setup to facilitate future IoT infrastructure
References
[1] Xia, P., Wang, H., Yu, Z., Liu, X., Luo, X., & Xu, G. (2021). Ethereum name service: the good, the bad, and the ugly. arXiv preprint arXiv:2104.05185.
[2] Yi, S., Li, C., & Li, Q. (2015, June). A survey of fog computing: concepts, applications and issues. In Proceedings of the 2015 workshop on mobile big data (pp. 37-42).
[3] Warren Kumari, Rod Rasmussen, Tim April, Lyman Chapin, Merike Kaeo, Jacques Latour, Danny McPherson, Dave Piscitello, Mark Seiden, “SAC105: The DNS and the Internet of Things: Opportunities, Risks, and Challenges,” ICANN SSAC Report SAC105, July 2019.
[4] Peng, S. L., Pal, S., & Huang, L. (Eds.). (2020). Principles of internet of things (IoT) ecosystem: Insight paradigm (Vol. 174, pp. 467-549). Cham: Springer.
[5] Lee, K., Kim, S., Jeong, J. P., Lee, S., Kim, H., & Park, J. S. (2019). A framework for DNS naming services for Internet-of-Things devices. Future Generation Computer Systems, 92, 617-627.
[6] Mockapetris, P. (1987). Domain names-concepts and facilities (No. rfc1034).
[7] Arends, R., Austein, R., Larson, M., Massey, D., & Rose, S. (2005). DNS security introduction and requirements (No. rfc4033).
[8] Arends, R., Austein, R., Larson, M., Massey, D., & Rose, S. (2005). Resource records for the DNS security extensions (No. rfc4034).
[9] Arends, R., Austein, R., Larson, M., Massey, D., & Rose, S. (2005). Protocol modifications for the DNS security extensions (No. rfc4035).
[10] Van Heugten, J. H. C. (2018). Privacy analysis of DNS resolver solutions. Master of System Network Engineering University of Amsterdam, 1-17.
[11] Hoffman, P., & McManus, P. (2018). DNS queries over HTTPS (DoH) (No. rfc8484).
[12] Aucklah, K., Mungur, A., Armoogum, S., & Pudaruth, S. (2021, May). The impact of internet of things on the domain name system. In 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS) (pp. 449-454). IEEE.
[13] Jalalzai, M. H., Shahid, W. B., & Iqbal, M. M. W. (2015, January). DNS security challenges and best practices to deploy secure DNS with digital signatures. In 2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST) (pp. 280-285). IEEE.
[14] Koshy, A. M., Yellur, G., Kammachi, H. J., VP, I., Kumar, R., & Moharir, M. (2021, October). An Insight into Encrypted DNS protocol: DNS over TLS. In 2021 4th International Conference on Recent Developments in Control, Automation & Power Engineering (RDCAPE) (pp. 379-383). IEEE.
[15] Al-Mashhadi, S., & Manickam, S. (2020). A brief review of blockchain-based DNS systems. International Journal of Internet Technology and Secured Transactions, 10(4), 420-432.
[16] Jung, J., Sit, E., Balakrishnan, H., & Morris, R. (2001, November). DNS performance and the effectiveness of caching. In Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement (pp. 153-167).
[17] Sha, K., Yang, T. A., Wei, W., & Davari, S. (2020). A survey of edge computing-based designs for IoT security. Digital Communications and Networks, 6(2), 195-202.
[18] Javeed, D., Gao, T., Khan, M. T., & Ahmad, I. (2021). A hybrid deep learning-driven SDN enabled mechanism for secure communication in Internet of Things (IoT). Sensors, 21(14), 4884.
[19] Ashtiani, M., & Abdollahi Azgomi, M. (2014). A distributed simulation framework for modeling cyber attacks and the evaluation of security measures. Simulation, 90(9), 1071-1102.
[20] Ramdas, A., & Muthukrishnan, R. (2019, May). A survey on dns security issues and mitigation techniques. In 2019 International Conference on Intelligent Computing and Control Systems (ICCS) (pp. 781-784). IEEE.
[21] Pappula, K. K. (2020). Browser-Based Parametric Modeling: Bridging Web Technologies with CAD Kernels. International Journal of Emerging Trends in Computer Science and Information Technology, 1(3), 56-67. https://doi.org/10.63282/3050-9246.IJETCSIT-V1I3P107
[22] Rahul, N. (2020). Vehicle and Property Loss Assessment with AI: Automating Damage Estimations in Claims. International Journal of Emerging Research in Engineering and Technology, 1(4), 38-46. https://doi.org/10.63282/3050-922X.IJERET-V1I4P105
[23] Enjam, G. R., & Chandragowda, S. C. (2020). Role-Based Access and Encryption in Multi-Tenant Insurance Architectures. International Journal of Emerging Trends in Computer Science and Information Technology, 1(4), 58-66. https://doi.org/10.63282/3050-9246.IJETCSIT-V1I4P107
[24] Pappula, K. K. (2021). Modern CI/CD in Full-Stack Environments: Lessons from Source Control Migrations. International Journal of Artificial Intelligence, Data Science, and Machine Learning, 2(4), 51-59. https://doi.org/10.63282/3050-9262.IJAIDSML-V2I4P106
[25] Pedda Muntala, P. S. R. (2021). Prescriptive AI in Procurement: Using Oracle AI to Recommend Optimal Supplier Decisions. International Journal of AI, BigData, Computational and Management Studies, 2(1), 76-87. https://doi.org/10.63282/3050-9416.IJAIBDCMS-V2I1P108
[26] Rahul, N. (2021). AI-Enhanced API Integrations: Advancing Guidewire Ecosystems with Real-Time Data. International Journal of Emerging Research in Engineering and Technology, 2(1), 57-66. https://doi.org/10.63282/3050-922X.IJERET-V2I1P107
[27] Enjam, G. R., Chandragowda, S. C., & Tekale, K. M. (2021). Loss Ratio Optimization using Data-Driven Portfolio Segmentation. International Journal of Artificial Intelligence, Data Science, and Machine Learning, 2(1), 54-62. https://doi.org/10.63282/3050-9262.IJAIDSML-V2I1P107