42
Blockchain Technology
TABLE 3.3 (CONTINUED)
Counteracting Actions on Common Security Challenges and Their Effect on Layers and Security Principles
Challenges
Description
Layer Affected
Security
Principle Affected
Security Counteract Actions
P
NT
AM
C
I
A
Sinkhole Attack
IoT networks that operate mostly in aggressive
environments are typically left unattended with
devices that have minimal battery power, computing
capacities and contactability. These are typically
more vulnerable to sinkhole attack, in which a node
in the network is breached by an invader, and
depending on the routing metrics, it can continue to
create contact with adjacent nodes.
×
√
×
√
√
√
Parent fail-over, Intrusion Detection System (IDS)
solution, generating identity certificates and rank
authentication techniques (Raza et al., 2013;
Weekly & Pister, 2012), message digest algorithm
(Kibirige & Sanga, 2015)
Denial of Service
Detecting an aggressive atmosphere with battery-
operated equipment such as wireless sensor
networks renders the system more susceptible to
events such as battery leakage, since battery change
in these conditions is not feasible due to the lack of
infrastructure.
×
×
×
×
×
√
Suspicious devices list maintenance, access control
lists, policies provided by providers (Chandna
et al., 2014; Haataja, 2005; Ongtang et al., 2012),
load balancing (Gupta et al., n.d.)
Sleep Deprivation
Attack
Sleep deprivation is one of the most destructive
attacks of this nature, where challengers attempt to
increase the power usage of nodes in the network to
reduce the nodes’ wakeup time.
×
√
×
√
√
√
Content chaining approach, multi-layer-based
intrusion detection, split buffer approach, target
IPv6 defence movement in 6LoWPAN (Bhattasali
& Chaki, 2011; Hummen et al., 2013; Sherburne
et al., 2014), Random vote, Round Robin scheme
(Pirretti et al., 2006)
(Continued)