Securing Low-Power Blockchain-Enabled IoT Devices Against Energy Depletion Attack
نویسندگان
چکیده
Blockchain-enabled Internet of Things (IoT) envisions a world with rapid development and implementations to change our everyday lives based on smart devices. These devices are attached the internet that can communicate each other without human interference. A well-known wireless network in blockchain-enabled IoT frameworks is Low Power Lossy Network (LLN) uses novel protocol known as Routing for low power lossy networks (RPL) provide effective energy-efficient routing. LLNs run RPL inherently prone multiple Denial Service (DoS) attacks due cost, shared medium resource-constrained nature Spam DODAG Information Solicitation (DIS) attack one drain energy source legitimate nodes ends up causing suffer from DoS. To address this problem, mitigation scheme named DIS Attack Mitigation (DISAM) proposed. The proposed effectively mitigates effects network’s performance. experimental results show DISAM detects quickly efficiently.
منابع مشابه
Monitoring in IOT enabled devices
---------------------------------------------------------------ABSTRACT-----------------------------------------------------------------As network size continues to grow exponentially, there has been a proportionate increase in the number of nodes in the corresponding network. With the advent of Internet of things (IOT), it is assumed that many more devices will be connected to the existing net...
متن کاملSecuring Heterogeneous IoT with Intelligent DDoS Attack Behavior Learning
The rapid increase of diverse Internet of things (IoT) services and devices has raised numerous challenges in terms of connectivity, computation, and security, which networks must face in order to provide satisfactory support. This has led to networks evolving into heterogeneous IoT networking infrastructures characterized by multiple access technologies and mobile edge computing (MEC) capabili...
متن کاملSecuring On-Body IoT Devices By Exploiting Creeping Wave Propagation
On-body devices are an intrinsic part of the Internet-of-Things (IoT) vision to provide human-centric services. These on-body IoT devices are largely embedded devices that lack a sophisticated user interface to facilitate traditional PreShared Key based security protocols. Motivated by this realworld security vulnerability, this paper proposes SecureTag, a system designed to add defense in dept...
متن کاملSecuring Speaker Verification System Against Replay Attack
In this paper, we present a framework to combat replay attack (RA) in a speaker verification (SV) system. Although the problem of SV system vulnerabilities is not new, however, dramatic improvements in both SV systems and attack models have renewed interest in this area. We have shown that the replay attack can be modeled using a nonlinear transfer function. Higher-order spectral analysis is co...
متن کاملSecuring RSA algorithm against timing attack
Security plays an important role in many embedded systems. All security based algorithms are implemented in hardware or software, and on physical devices which interact with the systems and influenced by their environments. The attacker extracts, investigate and monitor these physical interactions and extracts side channel information which is used in cryptanalysis. This type of cryptanalysis i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Transactions on Internet Technology
سال: 2022
ISSN: ['1533-5399', '1557-6051']
DOI: https://doi.org/10.1145/3511903