A Survey on Layer-Wise Security Attacks in IoT: Attacks, Countermeasures, and Open-Issues
Autor: | Gaurav Sharma, Niharika Anand, Catherine Menon, Somesh Kumar, Stilianos Vidalis |
---|---|
Jazyk: | angličtina |
Rok vydání: | 2021 |
Předmět: |
Routing protocol
business.product_category TK7800-8360 Computer Networks and Communications Computer science Denial-of-service attack routing protocol Computer security computer.software_genre denial of service Internet access ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS Electrical and Electronic Engineering low power business.industry ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS Network layer Cryptographic protocol lossy network (RPL) Internet-of-Things Hardware and Architecture Control and Systems Engineering physical attacks Signal Processing The Internet Electronics Internet of Things business Wireless sensor network computer |
Zdroj: | Electronics, Vol 10, Iss 2365, p 2365 (2021) |
ISSN: | 2079-9292 |
Popis: | Security is a mandatory issue in any network, where sensitive data are transferred safely in the required direction. Wireless sensor networks (WSNs) are the networks formed in hostile areas for different applications. Whatever the application, the WSNs must gather a large amount of sensitive data and send them to an authorized body, generally a sink. WSN has integrated with Internet-of-Things (IoT) via internet access in sensor nodes along with internet-connected devices. The data gathered with IoT are enormous, which are eventually collected by WSN over the Internet. Due to several resource constraints, it is challenging to design a secure sensor network, and for a secure IoT it is essential to have a secure WSN. Most of the traditional security techniques do not work well for WSN. The merger of IoT and WSN has opened new challenges in designing a secure network. In this paper, we have discussed the challenges of creating a secure WSN. This research reviews the layer-wise security protocols for WSN and IoT in the literature. There are several issues and challenges for a secure WSN and IoT, which we have addressed in this research. This research pinpoints the new research opportunities in the security issues of both WSN and IoT. This survey climaxes in abstruse psychoanalysis of the network layer attacks. Finally, various attacks on the network using Cooja, a simulator of ContikiOS, are simulated. |
Databáze: | OpenAIRE |
Externí odkaz: |