Securing Low-Power Blockchain-Enabled IoT Devices Against Energy Depletion Attack

نویسندگان

چکیده

Blockchain-enabled Internet of Things (IoT) envisions a world with rapid development and implementations to change our everyday lives based on smart devices. These devices are attached the internet that can communicate each other without human interference. A well-known wireless network in blockchain-enabled IoT frameworks is Low Power Lossy Network (LLN) uses novel protocol known as Routing for low power lossy networks (RPL) provide effective energy-efficient routing. LLNs run RPL inherently prone multiple Denial Service (DoS) attacks due cost, shared medium resource-constrained nature Spam DODAG Information Solicitation (DIS) attack one drain energy source legitimate nodes ends up causing suffer from DoS. To address this problem, mitigation scheme named DIS Attack Mitigation (DISAM) proposed. The proposed effectively mitigates effects network’s performance. experimental results show DISAM detects quickly efficiently.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Monitoring in IOT enabled devices

---------------------------------------------------------------ABSTRACT-----------------------------------------------------------------As network size continues to grow exponentially, there has been a proportionate increase in the number of nodes in the corresponding network. With the advent of Internet of things (IOT), it is assumed that many more devices will be connected to the existing net...

متن کامل

Securing Heterogeneous IoT with Intelligent DDoS Attack Behavior Learning

The rapid increase of diverse Internet of things (IoT) services and devices has raised numerous challenges in terms of connectivity, computation, and security, which networks must face in order to provide satisfactory support. This has led to networks evolving into heterogeneous IoT networking infrastructures characterized by multiple access technologies and mobile edge computing (MEC) capabili...

متن کامل

Securing On-Body IoT Devices By Exploiting Creeping Wave Propagation

On-body devices are an intrinsic part of the Internet-of-Things (IoT) vision to provide human-centric services. These on-body IoT devices are largely embedded devices that lack a sophisticated user interface to facilitate traditional PreShared Key based security protocols. Motivated by this realworld security vulnerability, this paper proposes SecureTag, a system designed to add defense in dept...

متن کامل

Securing Speaker Verification System Against Replay Attack

In this paper, we present a framework to combat replay attack (RA) in a speaker verification (SV) system. Although the problem of SV system vulnerabilities is not new, however, dramatic improvements in both SV systems and attack models have renewed interest in this area. We have shown that the replay attack can be modeled using a nonlinear transfer function. Higher-order spectral analysis is co...

متن کامل

Securing RSA algorithm against timing attack

Security plays an important role in many embedded systems. All security based algorithms are implemented in hardware or software, and on physical devices which interact with the systems and influenced by their environments. The attacker extracts, investigate and monitor these physical interactions and extracts side channel information which is used in cryptanalysis. This type of cryptanalysis i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions on Internet Technology

سال: 2022

ISSN: ['1533-5399', '1557-6051']

DOI: https://doi.org/10.1145/3511903