41
Security Issues in Blockchained IoT
TABLE 3.3 (CONTINUED)
Counteracting Actions on Common Security Challenges and Their Effect on Layers and Security Principles
Challenges
Description
Layer Affected
Security
Principle Affected
Security Counteract Actions
P
NT
AM
C
I
A
Replay Attack
This attack is based on the mechanism whereby a
malicious node starts professing to be an authorized
node and senses data communication. The
malicious node brings on its transmission or
interruption into the network, misleading the
receiver nodes.
×
√
×
√
√
×
Timestamping, hash chain-based verification of
fragments (Vidgren et al., 2013; Xiao et al., 2007)
Spoofing
The forging of the MAC-Media Access Control
(MAC) or Internet Protocol (IP) address of any
valid node on the network by any malicious nodes
may be considered as IoT spoofing. On controlling
the identity of the legitimate node, the malicious
node starts pretending to be the legitimate node
itself and obtains unauthorized access to the IoT
network.
×
√
×
√
√
x
Estimating the channel of propagation, signal
potency measurement, encryption techniques,
authentication of message, and Secure Socket
Layer (SSL) and message filtering
(Tay et al., 2016)
Sybil Attack
The IoT network may encounter a Sybil attack which
enables the malicious nodes to focus their
characteristics and propagate junk mail phishing
over the network.
×
√
×
√
√
√
Classification-based Sybil detection (BCSD), user
behaviour analysis, trusted and untrusted user list
maintenance, random walk on social graphs
(Alvisi et al., 2013; Cao & Yang, 2013; Mohaisen
et al., 2011; Wang et al., 2012; Zhang et al.,
2014); Douceur’s approach – Trusted certification
(Continued)