A Survey on Layer-Wise Security Attacks in IoT: Attacks, Countermeasures, and Open-Issues
View/ Open
Author
Sharma, Gaurav
Vidalis, Stilianos
Anand, Niharika
Menon, Catherine
Kumar, Somesh
Attention
2299/25094
Abstract
Security is a mandatory issue in any network, where sensitive data are transferred safely in the required direction. Wireless sensor networks (WSNs) are the networks formed in hostile areas for different applications. Whatever the application, the WSNs must gather a large amount of sensitive data and send them to an authorized body, generally a sink. WSN has integrated with Internet-of-Things (IoT) via internet access in sensor nodes along with internet-connected devices. The data gathered with IoT are enormous, which are eventually collected by WSN over the Internet. Due to several resource constraints, it is challenging to design a secure sensor network, and for a secure IoT it is essential to have a secure WSN. Most of the traditional security techniques do not work well for WSN. The merger of IoT and WSN has opened new challenges in designing a secure network. In this paper, we have discussed the challenges of creating a secure WSN. This research reviews the layer-wise security protocols for WSN and IoT in the literature. There are several issues and challenges for a secure WSN and IoT, which we have addressed in this research. This research pinpoints the new research opportunities in the security issues of both WSN and IoT. This survey climaxes in abstruse psychoanalysis of the network layer attacks. Finally, various attacks on the network using Cooja, a simulator of ContikiOS, are simulated.
Publication date
2021-10-01Published in
ElectronicsPublished version
https://doi.org/10.3390/electronics10192365Other links
http://hdl.handle.net/2299/25094Metadata
Show full item recordRelated items
Showing items related by title, author, creator and subject.
-
AALLA: Attack-Aware Logical Link Assignment Cost-Minimization Model for Protecting Software-Defined Networks against DDoS Attacks
Ali, Sameer; Tan, Saw Chin; Lee, Ching Kwang; Yusoff, Zulfadzli; Haque, Muhammad Reazul; Mylonas, Alexios; Pitropakis, Nikolaos (2023-11-02)Software-Defined Networking (SDN), which is used in Industrial Internet of Things, uses a controller as its “network brain” located at the control plane. This uniquely distinguishes it from the traditional networking ... -
Narrative Accounts of Family Caregivers of Adults Diagnosed with Non-Epileptic Attack Disorder
Davies, Rebecca Lara (2012-06-07)The experiences of family caregivers of adults diagnosed with Non-Epileptic Attack Disorder (NEAD) are under-researched. To address this lack of research and the Department of Health’s (DOH) aim to focus on the experiences ... -
Analysis of Jamming Attacks on Wireless Sensor Networks
Saif, SAEED (2016-04-14)Wireless Sensor Network (WSN) is a wireless-oriented form of communication largely used for outdoor applications, such as environmental monitoring and military surveillance. Therefore, a jamming attack is one of the denial ...