Security threats for Internet of Things

 ATTACKS IN IOT: 1.Black Hole Attack: In this, the attacker node publicizes itself for having the shortest route to any desired node in the network.

Gray Hole Attack: It is a special case of Black hole attack by dropping a few packets with a set of probability

Rushing Attack: A malicious node rising the speed (Rush) of the routing process. . It accepts the Route Request packet and forwards to its neighbours sooner as compared to others.

Wormhole Attack: Wormhole attack catches the packet from one location; send it over the tunnel to the other location.

Sybil Attack: In this attacker node controls multiple identities by assuming arbitrary identities or may spoof legitimate nodes.

SECURITY COUNTER MEASURES IN IOT: 

A) Cryptography (Hard security): Cryptography is just an art of hiding information. It works as an important security tool to provide authentication, confidentiality and other services.

B) Trust evaluation (Soft Security): Various cryptographic algorithms are proposed to provide secure solutions but often seem unfeasible because they assume that nodes are cooperative and trust worthy. The importance of trust management is realized and followed by society to design better security protocols. It is an approved tool to mitigate attacks and filter out misbehaving nodes based on social properties, each node is going to be assessed with the threshold value and the isolation of node is performed by trust value. Any trust based security solution aims to provide a performance guarantee through the evaluation of node behaviour. Current routing algorithms aim only to find optimal routes but not cover performance guarantee. Widespread use of IoT  creates the need for a system to rank out the behaviour of the network. Here, multidimensional trust evaluation scheme is designed by including current attributes (direct Trust) of node and the past behaviour (Indirect Trust) with others to improve Quality of service (QoS).

TRUST BASED SECURITY RELATED WORK: 

In ad hoc networks, routing protocols include two processes- route discovery and route maintenance. All previous routing protocols assume that nodes are trustworthy and cooperative. This thought opens the door for vulnerability in the routing protocols. Because the nodes are not so powerful in terms of resources and infrastructure are barriers for high power-consuming cryptographic algorithms. So many crypto-based schemes are proposed to protect routing information but these approaches may not be suitable for real IoT. The power capacity of a mobile node affects network survivability in IOT since nodes will be disconnected if the battery is exhausted. An energy-efficient security should guarantee the long life of the network. An energy-efficient security protocol avoids downloading huge tables and limited calculations are preferred. We need a balanced approach that must be developed for secure computation and lifetime of the node. Hard security protocols are not easy to implement and light security protocols can be easily attacked. Various mechanisms and protocols have already been advised for preserving energy and securing ad-hoc networks. Researchers introduced Trust aware Security for gaining confidentiality and authentication with Attack-tolerance, Compatibility, and Scalability. 

Meena Sachdeva

Comments

Popular posts from this blog

Teacher As: Critical Pedagogue

ROLE CONFLICT PROBLEM AMONG WORKING WOMEN

Rights and obligations of Issuer, Participant and Beneficial owner under the Depository Act, 1996