40

Blockchain Technology

TABLE 3.3 (CONTINUED)

Counteracting Actions on Common Security Challenges and Their Effect on Layers and Security Principles

Challenges

Description

Layer Affected

Security

Principle Affected

Security Counteract Actions

P

NT

AM

C

I

A

Flooding Attack

Flooding is a mechanism based on spreading the

initial messages over the network internally or

externally. It is accountable for maximizing the

amount of traffic in the network to make services

inaccessible to those who consume them. In the

worst cases, this could be by way of accessing

certain machines or connections. One of the big

attacks in this group is the “Hello” flooding attack.

×

×

The security actions may include the computation

of the signal strength over the network, packet

delivery ratio, encoding of those packets with

misplayed amendment codes, changing the

incidence and whereabouts, implementation of the

firewalls and abysmal packet interception (Noubir

& Lin, 2003; What is a UDP Flood DDoS Attack

Glossary, n.d.; Xu et al., 2005, 2004)

Wormhole Attack

This influences both the direction of network traffic

and the topology of a network. The attack starts

with the transmission of all the available packets

and establishing a tunnel between two nodes over

two different networks.

×

×

×

Conviction administration, supervision of the keys,

measurement of the strength of the signal,

topographical data fastening and graph traversal

(Ahmed & Ko, 2016; Hu et al., 2005; Jang et al.,

2007; Krontiris et al., 2007; Lazos et al., 2005;

Ngai et al., 2006; Pirzada & McDonald, 2005;

Poovendran & Lazos, 2007; Raju & Parwekar,

2016; Salehi et al., 2013; Sharmila &

Umamaheswari, 2011; Wang et al., 2008; Wazid

et al., 2016; Weekly & Pister, 2012)

(Continued)