39
Security Issues in Blockchained IoT
TABLE 3.3 (CONTINUED)
Counteracting Actions on Common Security Challenges and Their Effect on Layers and Security Principles
Challenges
Description
Layer Affected
Security
Principle Affected
Security Counteract Actions
P
NT
AM
C
I
A
Brute Force Attack
An attack that uses automated software to find the
appropriate encryption key to bring all probable
blends of key sets from the key puddle. However,
with the rise in computational capacity and effective
rate increases to retrieve the keys using brute force
techniques, several other attempts have quickly
started to reduce the search space and recover keys.
√
×
×
√
√
√
Cryptography techniques, firmware security update
Eavesdropping
An incursion involving the detection of
correspondence between two network points by
snuffling or capturing data packets and therefore
stealing information between them utilizing
cryptographic analysis methods.
×
√
×
√
√
×
Authentication and authorization mechanisms,
route security using the secured channel
technique, encryption of RFID communication
channel (Mitrokotsa et al., 2010), installation of
network key over the devices before initialization
of process (Community, n.d.), mutual
authentication of nodes over the network and data
tamper detection mechanism over the nodes
residing on the network
Routing Attack
Routing Protocol for Low Power and Lossy
Networks, usually denoted as RPL, strongly
monitors an intention-positioned regional anatomy
of Destination Oriented Directed Acyclic Graph
(DODAG). Every node in the network encompasses
its corresponding one-to-one unique IDs and
segregates these IDs into Parent Node IDs and
Neighbor Node IDs.
×
√
×
√
√
√
The security actions may include the Distributed
Hash Tables (DHT), warehousing and tracing
individualities of each instance over the RPL,
integration of signature-based authentication and
authorization mechanisms (Dvir et al., 2011; Le
et al., 2013; Pongle & Chavan, 2015)
(Continued)