41

Security Issues in Blockchained IoT

TABLE 3.3 (CONTINUED)

Counteracting Actions on Common Security Challenges and Their Effect on Layers and Security Principles

Challenges

Description

Layer Affected

Security

Principle Affected

Security Counteract Actions

P

NT

AM

C

I

A

Replay Attack

This attack is based on the mechanism whereby a

malicious node starts professing to be an authorized

node and senses data communication. The

malicious node brings on its transmission or

interruption into the network, misleading the

receiver nodes.

×

×

×

Timestamping, hash chain-based verification of

fragments (Vidgren et al., 2013; Xiao et al., 2007)

Spoofing

The forging of the MAC-Media Access Control

(MAC) or Internet Protocol (IP) address of any

valid node on the network by any malicious nodes

may be considered as IoT spoofing. On controlling

the identity of the legitimate node, the malicious

node starts pretending to be the legitimate node

itself and obtains unauthorized access to the IoT

network.

×

×

x

Estimating the channel of propagation, signal

potency measurement, encryption techniques,

authentication of message, and Secure Socket

Layer (SSL) and message filtering

(Tay et al., 2016)

Sybil Attack

The IoT network may encounter a Sybil attack which

enables the malicious nodes to focus their

characteristics and propagate junk mail phishing

over the network.

×

×

Classification-based Sybil detection (BCSD), user

behaviour analysis, trusted and untrusted user list

maintenance, random walk on social graphs

(Alvisi et al., 2013; Cao & Yang, 2013; Mohaisen

et al., 2011; Wang et al., 2012; Zhang et al.,

2014); Douceur’s approach – Trusted certification

(Continued)