42

Blockchain Technology

TABLE 3.3 (CONTINUED)

Counteracting Actions on Common Security Challenges and Their Effect on Layers and Security Principles

Challenges

Description

Layer Affected

Security

Principle Affected

Security Counteract Actions

P

NT

AM

C

I

A

Sinkhole Attack

IoT networks that operate mostly in aggressive

environments are typically left unattended with

devices that have minimal battery power, computing

capacities and contactability. These are typically

more vulnerable to sinkhole attack, in which a node

in the network is breached by an invader, and

depending on the routing metrics, it can continue to

create contact with adjacent nodes.

×

×

Parent fail-over, Intrusion Detection System (IDS)

solution, generating identity certificates and rank

authentication techniques (Raza et al., 2013;

Weekly & Pister, 2012), message digest algorithm

(Kibirige & Sanga, 2015)

Denial of Service

Detecting an aggressive atmosphere with battery-

operated equipment such as wireless sensor

networks renders the system more susceptible to

events such as battery leakage, since battery change

in these conditions is not feasible due to the lack of

infrastructure.

×

×

×

×

×

Suspicious devices list maintenance, access control

lists, policies provided by providers (Chandna

et al., 2014; Haataja, 2005; Ongtang et al., 2012),

load balancing (Gupta et al., n.d.)

Sleep Deprivation

Attack

Sleep deprivation is one of the most destructive

attacks of this nature, where challengers attempt to

increase the power usage of nodes in the network to

reduce the nodes’ wakeup time.

×

×

Content chaining approach, multi-layer-based

intrusion detection, split buffer approach, target

IPv6 defence movement in 6LoWPAN (Bhattasali

& Chaki, 2011; Hummen et al., 2013; Sherburne

et al., 2014), Random vote, Round Robin scheme

(Pirretti et al., 2006)

(Continued)