scholarly journals IoT Hacking Attacks and Countermeasure

IoT (Internet of Things) means the technology of connecting to the Internet by adding communication functions to all objects. IoT is physical constraints and limited resources which means are a vulnerability for hacking attacks. Therefore, IoT needs countermeasures of the hacking attack. These IoT devices are becoming a target of hacking. Hacking attacks on IoT devices are causing privacy and personal information leakage, and hacked devices are also used for DDoS(Distributed DoS) attacks. To overcome IoT physical constraints, various methods on each sensor in a wireless sensor networks are proposed. We analyzed various characteristics of sensor nodes and listed pros & cons. In addition, countermeasures on each IoT attacks were suggested. By analyzing such cases of hacking damage, I have identified the common weaknesses of IoT devices and looked for countermeasures. Therefore, it contributes to secure communication over a wireless sensor networks

Author(s):  
Bahae ABIDI ◽  
Abdelillah JILBAB ◽  
Mohamed EL HAZITI

Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks, although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.


2021 ◽  
Author(s):  
Zohar Naor

Abstract This study suggests using a user-initiated detecting and data gathering from power-limited and even passive wireless devices, such as passive RFID tags, wireless sensor networks (WSNs), and Internet of Things (IoT) devices, that either power limitation or poor cellular coverage prevents them from communicating directly with wireless networks. While previous studies focused on sensors that continuously transmit their data, the focus of this study is on passive devices. The key idea is that instead of receiving the data transmitted by the sensor nodes, an external device (a reader), such as an unnamed aerial vehicle (UAV), or a smartphone is used to detect IoT devices and read the data stored in the sensor nodes, and then to deliver it to the cloud, in which it is stored and processed. While previous studies on UAV-aided data collection from WSNs focused on the UAV path planning, the focus of this study is on the rate at which the passive sensor nodes should be polled. That is, to find the minimal monitoring rate that still guarantees accurate and reliable data collection. The proposed scheme enables us to deploy wireless sensor networks over a large geographic area (e.g., for agricultural applications), in which the cellular coverage is very poor if any. Furthermore, the usage of initiated data collection can enable the deployment of passive WSNs. Thus, can significantly reduce both the operational cost, as well as the deployment cost, of the WSN.


2017 ◽  
Vol 40 (13) ◽  
pp. 3788-3799 ◽  
Author(s):  
Behrouz Vaseghi ◽  
Mohammad Ali Pourmina ◽  
Saleh Mobayen

This paper considers the finite-time chaos synchronization of Chua chaotic oscillators based on the secure communication scheme in wireless sensor networks. The modified Chua oscillators are added to the base station and sensor nodes to generate the chaotic signals. Two methods are proposed for the finite-time synchronization of the modified Chua systems with uncertain parameters. In the first method, by using the Lyapunov stability theory, control law is suggested to achieve finite-time chaos synchronization. In order to increase the robustness of the controller, in the second method, a sliding mode controller is applied to the wireless sensor network. Synchronization between the base station and each of the sensor nodes is realized by multiplying a selection matrix by the specified chaotic signal, which is broadcasted by the base station to the sensor nodes. The mathematical proofs confirm that the proposed control law is correct and finally, the simulation results are presented to show the efficiency of the proposed technique.


Wireless Sensor Networks consist of independent sensor nodes attached to one base station. In wireless sensor networks, nodes are connected to sensing environment and communicate the data to the base station. As WSNs continues to grow, they become vulnerable to attacks and hence the need for operative security techniques. Applications of wireless sensor networks demands for the well-organized and secure communication. For the solution of well-organized and reliable security, we need cryptography algorithms which provide good solutions. For providing reliable security techniques mainly data confidentiality, key management is used. Identification of suitable cryptographic techniques for WSNs is an important challenge due to limitation of energy, computation capability and memory of the sensor nodes. Symmetric cryptography techniques do not act well when the number of sensor nodes increases. Hence asymmetric key cryptographic techniques are widely used. Here we propose an electronic logic gate based symmetric Cryptographic technique which is more suitable for small and medium WSNs.


Author(s):  
G. Jaspher Willsie Kathrine ◽  
C. Willson Joseph

Wireless sensor network (WSN) comprises sensor nodes that have the capability to sense and compute. Due to their availability and minimal cost compared to traditional networks, WSN is used broadly. The need for sensor networks increases quickly as they are more likely to experience security attacks. There are many attacks and vulnerabilities in WSN. The sensor nodes have issues like limited resources of memory and power and undependable communication medium, which is further complicated in unattended environments, secure communication, and data transmission issues. Due to the complexity in establishing and maintaining the wireless sensor networks, the traditional security solutions if implemented will prove to be inefficient for the dynamic nature of the wireless sensor networks. Since recent times, the advance of smart cities and everything smart, wireless sensor nodes have become an integral part of the internet of things and their related paradigms. This chapter discusses the known attacks, vulnerabilities, and countermeasures existing in wireless sensor networks.


2021 ◽  
pp. 2150009
Author(s):  
Monjul Saikia

The security of wireless sensor networks is a significant concern and can be achieved by the application of cryptographic algorithms. The symmetric key encryption techniques are widely used cryptographic mechanisms for the security of sensor networks due to its low computational complexity. A symmetric key encryption technique requires a secret key to be shared between both parties for confidential communication. In a wireless sensor network, it is difficult to know which node is going to be in its communication range at the deployment phase. If prior knowledge of sensor location exists, it is an added advantage and helps in the distribution of secret keys among nodes. Even if with the expected location information, distributing the keys properly among the nodes is a challenging task. A proper algorithm must be used so that it gives the adequate utilization of the distributed keys with a minimal number of keys per sensor node. In this paper, we propose a location-dependent key distribution scheme. We use Delaunay Triangulation for the efficient distribution of keys among sensor nodes. The method gives a high probability of secure communication links among nodes with high resilience to the network.


2017 ◽  
Vol 2017 ◽  
pp. 1-9
Author(s):  
Murat Dener ◽  
Omer Faruk Bay

Wireless sensor networks (WSNs) have become a very popular subject in both industrial and academic fields of study due to the fact that they can operate on their own, do not require extra maintenance, and can be utilized in a wide variety of applications. In addition, the sensor nodes having limited hardware resources and power units cause certain security problems awaiting to be resolved. The Denial-of-Service (DoS) attacks, which cause disrupts in the communication of sensor nodes or abnormal situations, thus resulting in the decrease of the lifespan of the network, constitute a serious threat against the WSN security. Especially in military applications in which security is the most important design criterion, the WSN used in chemical and biological intrusion detection applications must be resistant against all forms of attacks. In this study, an adaptive detection-defense unit has been developed against the DoS attacks (packet collision, exhaustion, and unfairness) which occur in the data link layer. The developed unit has also been implemented on the TelosB nodes. Due to the new unit that was designed the lifespan of the nodes has been extended without the need for additional hardware by making them more secure against DoS attacks in the data link layer of the WSN.


2014 ◽  
Vol 568-570 ◽  
pp. 546-549
Author(s):  
Yan Ling Cui

The communication security problems for wireless sensor networks are exacerbated by the limited power and energy of the sensor devices. The focus of this paper is to design a lightweight group key management scheme to safeguard the data packet passing on the sensor networks. The design of the protocol is motivated by the observation that many sensor nodes in the network play different roles. We describe the design and implementation of establishing different pairwise keys based on LEACH. The protocol contains group communication policies, group membership requirements for secure communication under different types of attacks.


2014 ◽  
Vol 622 ◽  
pp. 191-198
Author(s):  
Devasagayam Jayashree ◽  
V. Uma Rani ◽  
K. Soma Sundaram

Due to emerging technology Wireless Sensor Network (WSN), it is necessary to monitor the behavior of sensor nodes and establish the secure communication in network. Security is a challenging task in wireless environment. Several encryption mechanisms are available to prevent outsider attacks, but no mechanism available for insider attacks. A trust model is a collection of rules used to establish co-operation or collaboration among nodes as well as monitoring misbehavior of wireless sensor networks. Trust model is necessary to enhance secure localization, communication or routing, aggregation, collaboration among nodes. In this paper, proposed a behavior based distributed trust model for wireless sensor network to effectively deal with self-ish or malicious nodes. Here, take multidimensional trust attributes derived from communications and networks to evaluate the overall trust of sensor nodes. It monitors the behavior of nodes and establishes secure communication among networks.


Wireless sensor network research enriched with diverse applications from industry to daily life. Widespread of sensor-based applications mandated for user authentication and secure communication. However, sensor nodes are limited energy and resources and hence secure communication for sensor nodes became a challenging task. This paper presents a fast encryption scheme for secure communication in wireless sensor networks. The proposed scheme consists of three phases namely registration, network deployment, and data transmission. In this work, a Gaussian transposition cipher for the generation of strong key. This cipher uses Gaussian noise, modified rail fence cipher and transposition. Fast encryption has achieved using XOR-based encryption and hence the proposed scheme incurs low computational cost. The proposed scheme resistant to various security attacks.


Sign in / Sign up

Export Citation Format

Share Document