38

Blockchain Technology

TABLE 3.3

Counteracting Actions on Common Security Challenges and Their Effect on Layers and Security Principles

Challenges

Description

Layer Affected

Security

Principle Affected

Security Counteract Actions

P

NT

AM

C

I

A

Physical Damage by

Unauthorized

Access

Active attackers may have unauthorized connections

to physical sensing instruments, their control

systems or their IoT network activities, and owing

to lack of technological expertise, attackers can

only impact IoT resources by tampering with the

physical devices that relate to the network.

×

×

Self-destruction, physical design security, tamper

proofing (Mosenia & Jha, 2016), hardware-based

Trusted Platform Module (TPM) modules,

firmware access to USB prevention

(OWASP, 2016)

Physical Node

Capture

Instead of causing physical harm, an aggressive

intruder could seek to access information that the

device may add to the network. Instead of directly

influencing items, the individual may also target

data storage or processing units that ultimately

affect the network.

×

×

Minimizing leakage by shielding, adding noise,

random delays, hamming weights, improving

cache architecture (Nia et al., 2015), integration of

PUF (physically unclonable function) into objects

(Wachsmann & Sadeghi, 2014)

Tag Cloning

Tags are usually mounted on many items and are

distributed in open access environments, which

presents issues like replication of data, sniffing,

authentication and authorization.

×

×

Tag seclusion, aloofness approximation, tag

hindering, instigating authentication procedures,

hash-based arrangements, encryption techniques

(Khedr, 2013), One Time Password (OTP)

harmonization between tag and back end

Privacy Leak

Data privacy is one of the main concerns, since a

broad variety of IoT devices are engaged in data

harnessing and transferring it to other network

nodes, thus collecting, processing and disposing of

data that is no longer required.

×

×

×

Homomorphic encryption, digital signatures,

fragmentation redundancy scattering (Smart &

Vercauteren, 2010)

(Continued)