Next Article in Journal
Improved Command Filtered Backstepping Control for Uncertain Nonlinear Systems with Time-Delay
Previous Article in Journal
An Analog MP3 Compression Psychoacoustic Model Implemented on a Field-Programmable Analog Array
Previous Article in Special Issue
A Novel Dataset and Approach for Adversarial Attack Detection in Connected and Automated Vehicles
 
 
Article
Peer-Review Record

Denial of Service Attack Prevention and Mitigation for Secure Access in IoT GPS-based Intelligent Transportation Systems

Electronics 2024, 13(14), 2693; https://doi.org/10.3390/electronics13142693
by Gheorghe Romeo Andreica 1,2, George Lucian Tabacar 2, Daniel Zinca 1, Iustin Alexandru Ivanciu 1 and Virgil Dobrota 1,*
Reviewer 1: Anonymous
Reviewer 2: Anonymous
Electronics 2024, 13(14), 2693; https://doi.org/10.3390/electronics13142693
Submission received: 4 June 2024 / Revised: 27 June 2024 / Accepted: 4 July 2024 / Published: 10 July 2024
(This article belongs to the Special Issue Automotive Cyber Security)

Round 1

Reviewer 1 Report

Comments and Suggestions for Authors

Algorithm Details: Section 1.1: Provide pseudocode or flowcharts to better explain the IDS/IPS mechanisms integrated into the firmware.

Performance Metrics: Chapter 3: Include a comprehensive set of performance metrics such as detection rate, false positives, response time, and resource utilization. Cross-ref this: doi: 10.1109/HONET59747.2023.10374608

Experimental Setup: Section 2: Expand on the specifics of the DoS attack scenarios, including the tools and techniques used, and the configuration of the test environment. Cross-ref with this: doi: 10.1109/TCE.2024.3410536 

Scalability Analysis: Conclusion: Discuss how the proposed solution can be scaled for broader IoT deployments and address any potential challenges.

Case Studies: Add a new section or appendix with real-world applications and scenarios where the proposed solution has been or could be implemented.

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 2 Report

Comments and Suggestions for Authors

The proposed work has a contemporary theme. The work is of a practical nature and applicability. The authors propose a way to secure against DoS attacks on GPS devices, by integrating their developed IPS/IDS algorithm embedded in the firmware of a specific GPS device. The work is written comprehensibly without using complex expressions.
Work strengths:
1. The authors have developed their own IPS/IDS algorithm. The same is described in detail in the work;
2. Multiple simulations were carried out to prove the applicability of the developed algorithm;
Recommendations and remarks:
1. To add a new section with number 2 under the name "State of the problem" or another, more appropriate title according to the authors. The present subsections 1.1 and 1.2 shall be included in this section;
2. Subsection 1.1 to be renamed subsection 2.1 with another title, such as “DoS and DDoS attacks into IoT tracking devices” or another, more appropriate title according to the authors. In this subsection, describe in detail the principle of DoS and DDoS attacks directed against GPS devices: principle of execution of the attack (how it is carried out through the GPS network or through the mobile data network); whether or not they differ from standard DoS and DDoS attacks, in IP networks (Internet); what happens to the GPS devices when they are subjected to these attacks and more;
3. Subsection 1.1 to be renamed subsection 2.2 with the same title;
4. To add subsection 2.3 with the title "proposed IDS/IPS mechanism", including lines 147 - 164 in this section;
5. The present section 2 to be divided into two subsections. In the first subsection, describe the test device used, and in the second subsection, include the developed algorithm;
6. In the "Discussion" section, describe in more detail the advantages and disadvantages of the proposed algorithm; where it can additionally be applied and for what; are there any restrictions in its application, etc.

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Round 2

Reviewer 1 Report

Comments and Suggestions for Authors

I appreciate the authors' thorough responses and substantial updates to the manuscript. They have addressed all the points raised in my initial review, including:

  1. Adding pseudocode and a flowchart for the IDS/IPS mechanism
  2. Incorporating comprehensive performance metrics and analysis
  3. Expanding on the experimental setup and DoS attack scenarios
  4. Discussing scalability considerations for broader IoT deployments
  5. Including real-world applications and scenarios

The additions and clarifications have significantly improved the paper. The expanded methodology, detailed results, and new sections on scalability and real-world applications provide valuable insights. Overall, the revisions have enhanced the manuscript's quality and relevance to the field.

Reviewer 2 Report

Comments and Suggestions for Authors

Everything is fine. I do not have any other remarks or suggestions.

Back to TopTop