Show simple item record

dc.contributor.authorSharma, Gaurav
dc.contributor.authorVidalis, Stilianos
dc.contributor.authorAnand, Niharika
dc.contributor.authorMenon, Catherine
dc.contributor.authorKumar, Somesh
dc.date.accessioned2021-10-01T09:45:02Z
dc.date.available2021-10-01T09:45:02Z
dc.date.issued2021-10-01
dc.identifier.citationSharma , G , Vidalis , S , Anand , N , Menon , C & Kumar , S 2021 , ' A Survey on Layer-Wise Security Attacks in IoT: Attacks, Countermeasures, and Open-Issues ' , Electronics , vol. 10 , no. 19 , 2365 . https://doi.org/10.3390/electronics10192365
dc.identifier.issn2079-9292
dc.identifier.otherJisc: 2af82f80c09a4e4f92f3a3c3a24265aa
dc.identifier.urihttp://hdl.handle.net/2299/25094
dc.description© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
dc.description.abstractSecurity is a mandatory issue in any network, where sensitive data are transferred safely in the required direction. Wireless sensor networks (WSNs) are the networks formed in hostile areas for different applications. Whatever the application, the WSNs must gather a large amount of sensitive data and send them to an authorized body, generally a sink. WSN has integrated with Internet-of-Things (IoT) via internet access in sensor nodes along with internet-connected devices. The data gathered with IoT are enormous, which are eventually collected by WSN over the Internet. Due to several resource constraints, it is challenging to design a secure sensor network, and for a secure IoT it is essential to have a secure WSN. Most of the traditional security techniques do not work well for WSN. The merger of IoT and WSN has opened new challenges in designing a secure network. In this paper, we have discussed the challenges of creating a secure WSN. This research reviews the layer-wise security protocols for WSN and IoT in the literature. There are several issues and challenges for a secure WSN and IoT, which we have addressed in this research. This research pinpoints the new research opportunities in the security issues of both WSN and IoT. This survey climaxes in abstruse psychoanalysis of the network layer attacks. Finally, various attacks on the network using Cooja, a simulator of ContikiOS, are simulated.en
dc.format.extent23
dc.format.extent1240916
dc.language.isoeng
dc.relation.ispartofElectronics
dc.subjectdenial of service
dc.subjectInternet-of-Things
dc.subjectrouting protocol
dc.subjectlow power
dc.subjectlossy network (RPL), physical attacks
dc.subjectsybil attacks
dc.subjectWireless Sensor Network (WSN)
dc.subjectDenial of service
dc.subjectLow power
dc.subjectSybil attacks
dc.subjectRouting protocol
dc.subjectLossy network (RPL), physical attacks
dc.subjectSignal Processing
dc.subjectElectrical and Electronic Engineering
dc.subjectControl and Systems Engineering
dc.subjectHardware and Architecture
dc.subjectComputer Networks and Communications
dc.titleA Survey on Layer-Wise Security Attacks in IoT: Attacks, Countermeasures, and Open-Issuesen
dc.contributor.institutionDepartment of Computer Science
dc.contributor.institutionSchool of Physics, Engineering & Computer Science
dc.contributor.institutionCentre for Computer Science and Informatics Research
dc.description.statusPeer reviewed
dc.identifier.urlhttp://www.scopus.com/inward/record.url?scp=85115879094&partnerID=8YFLogxK
rioxxterms.versionofrecord10.3390/electronics10192365
rioxxterms.typeOther
herts.preservation.rarelyaccessedtrue


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record