Abstract
The internet of things (IoT) is prone to various types of denial of service (DoS) attacks due to their resource-constrained nature. Extensive research efforts have been dedicated to securing these systems, but various vulnerabilities remain. Notably, it is challenging to maintain the confidentiality, integrity, and availability of mobile ad hoc networks due to limited connectivity and dynamic topology. As critical infrastructure including smart grids, industrial control, and intelligent transportation systems is reliant on WSNs and IoT, research efforts that forensically investigate and analyze the cybercrimes in IoT and WSNs are imperative. When a security failure occurs, the causes, vulnerabilities, and facts behind the failure need to be revealed and examined to improve the security of these systems. This research forensically investigates the performance of the ad hoc IoT networks using the ad hoc on-demand distance vector (AODV) routing protocol under the blackhole attack, which is a type of denial of service attack detrimental to IoT networks. This work also examines the traffic patterns in the network and nodes to assess the attack damage and conducts vulnerability analysis of the protocol to carry out digital forensic (DF) investigations. It further reconstructs the networks under different modes and parameters to verify the analysis and provide suggestions to design roubust routing protocols.
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference44 articles.
1. Kansakar, P., and Munir, A. A Two-Tiered Heterogeneous and Reconfigurable Application Processor for Future Internet of Things. Proceedings of the IEEE Computer Society Annual Symposium on VLSI (ISVLSI).
2. Multi-core Embedded Wireless Sensor Networks: Architecture and Applications;Munir;IEEE Transactions on Parallel and Distributed Systems (TPDS),2014
3. Karakaya, A., and Akleylek, S. A survey on security threats and authentication approaches in wireless sensor networks. Proceedings of the 2018 6th International Symposium on Digital Forensic and Security (ISDFS).
4. Gurunath, R., Agarwal, M., Nandi, A., and Samanta, D. An Overview: Security Issue in IoT Network. Proceedings of the 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).
5. Sezer, S. T1C: IoT Security:-Threats, Security Challenges and IoT Security Research and Technology Trends. Proceedings of the 2018 31st IEEE International System-on-Chip Conference (SOCC).
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献