39

Security Issues in Blockchained IoT

TABLE 3.3 (CONTINUED)

Counteracting Actions on Common Security Challenges and Their Effect on Layers and Security Principles

Challenges

Description

Layer Affected

Security

Principle Affected

Security Counteract Actions

P

NT

AM

C

I

A

Brute Force Attack

An attack that uses automated software to find the

appropriate encryption key to bring all probable

blends of key sets from the key puddle. However,

with the rise in computational capacity and effective

rate increases to retrieve the keys using brute force

techniques, several other attempts have quickly

started to reduce the search space and recover keys.

×

×

Cryptography techniques, firmware security update

Eavesdropping

An incursion involving the detection of

correspondence between two network points by

snuffling or capturing data packets and therefore

stealing information between them utilizing

cryptographic analysis methods.

×

×

×

Authentication and authorization mechanisms,

route security using the secured channel

technique, encryption of RFID communication

channel (Mitrokotsa et al., 2010), installation of

network key over the devices before initialization

of process (Community, n.d.), mutual

authentication of nodes over the network and data

tamper detection mechanism over the nodes

residing on the network

Routing Attack

Routing Protocol for Low Power and Lossy

Networks, usually denoted as RPL, strongly

monitors an intention-positioned regional anatomy

of Destination Oriented Directed Acyclic Graph

(DODAG). Every node in the network encompasses

its corresponding one-to-one unique IDs and

segregates these IDs into Parent Node IDs and

Neighbor Node IDs.

×

×

The security actions may include the Distributed

Hash Tables (DHT), warehousing and tracing

individualities of each instance over the RPL,

integration of signature-based authentication and

authorization mechanisms (Dvir et al., 2011; Le

et al., 2013; Pongle & Chavan, 2015)

(Continued)