40
Blockchain Technology
TABLE 3.3 (CONTINUED)
Counteracting Actions on Common Security Challenges and Their Effect on Layers and Security Principles
Challenges
Description
Layer Affected
Security
Principle Affected
Security Counteract Actions
P
NT
AM
C
I
A
Flooding Attack
Flooding is a mechanism based on spreading the
initial messages over the network internally or
externally. It is accountable for maximizing the
amount of traffic in the network to make services
inaccessible to those who consume them. In the
worst cases, this could be by way of accessing
certain machines or connections. One of the big
attacks in this group is the “Hello” flooding attack.
√
×
×
√
√
√
The security actions may include the computation
of the signal strength over the network, packet
delivery ratio, encoding of those packets with
misplayed amendment codes, changing the
incidence and whereabouts, implementation of the
firewalls and abysmal packet interception (Noubir
& Lin, 2003; What is a UDP Flood DDoS Attack
Glossary, n.d.; Xu et al., 2005, 2004)
Wormhole Attack
This influences both the direction of network traffic
and the topology of a network. The attack starts
with the transmission of all the available packets
and establishing a tunnel between two nodes over
two different networks.
×
√
×
√
√
×
Conviction administration, supervision of the keys,
measurement of the strength of the signal,
topographical data fastening and graph traversal
(Ahmed & Ko, 2016; Hu et al., 2005; Jang et al.,
2007; Krontiris et al., 2007; Lazos et al., 2005;
Ngai et al., 2006; Pirzada & McDonald, 2005;
Poovendran & Lazos, 2007; Raju & Parwekar,
2016; Salehi et al., 2013; Sharmila &
Umamaheswari, 2011; Wang et al., 2008; Wazid
et al., 2016; Weekly & Pister, 2012)
(Continued)