A Survey on Layer-Wise Security Attacks in IoT: Attacks, Countermeasures, and Open-Issues
Abstract
:1. Introduction
- A sensor network has a higher amount of sensor nodes present in the network than the traditional ad-hoc network, with limited nodes.
- Nodes in the sensor network are deployed very densely to provide better coverage of the target area.
- A sensor network has many resource constraints and is more prone to failure due to the harsh environment.
- There are no global ids of the sensing nodes; the local ids that are valid only for that sensor network are responsible for identifying the nodes.
2. IoT History and Technical Issues
- Communication: In IoT, wired and wireless communication is used, such as LPWAN, ZigBee, etc.
- Scalability: IoT network comprises many nodes, and naming addressing, and managing many such devices is challenging.
- Heterogeneity: IoT is a network of various devices from assorted families like actuators, sensors, switches, gateways, mobiles, etc. Different devices engage different algorithms, protocols, and circuitry.
- Energy Consumption: In the case of both WSN and IoT, energy is a most challenging constraint. Thus, the researchers always struggle to design the algorithm for IoT and WSN with minimum processing requirements.
- Interoperability: IoT network consists of various devices, which exchange data and collaborate among themselves. Thus, there is always a need for a predefined standard for data exchange.
- Self-Awareness: IoT devices should automate autonomously in such a way that there is minimum human intervention required.
3. Security Characteristics in IoT and WSN
- Organization: Sensors do not possess any fixed structure, and the location of the sensors is random. The solution to the failures in the network is the self-organizing behavior of WSN and IoT network by discovering the nearest neighbour [18].
- Resource Constraints: IoT and WSN have many resource constraints like restricted communication bandwidth, storage capacity, and processing powers, which permit the utilization of whippersnapper security methods only. These security methods offer security from external attacks only [19].
- Central Control: The central system, the base station, control the sensing nodes. The data gathered by the nodes flow in the network depending upon the routing algorithm applied. The major problem in this approach is that most routing algorithms’ development is without any conquer thoughtfulness of security measures.
- Flow Control: The transmission flow is acquainted with enhancing network performance degradation by analyzing the number of transmission errors and quality of flow [20].
- Environmental Issues: Sensor nodes are deployed in an open environment, accessible to the antagonists; this may result in introducing one or many compromised nodes, which disturbs the network externally and may take the network’s total control, leading to the complete fallout of the network.
3.1. Security Requirements
3.1.1. Data Confidentiality
3.1.2. Data Integrity and Data Freshness
3.1.3. Self-Organization
3.1.4. Time Synchronization
- For power conservation, the radio of the individual sensing node is turned off.
- Sensors compute an end-to-end delay of packets, as the packets are transferred between a pair of sensor nodes.
- Group synchronization is required for the tracking application.
3.1.5. Authentication
3.2. Security Vulnerabilities
- Physical Layer Attacks: In the physical layer, which is the lowest layer in the sack, the physical characteristics of the network are stipulated. The wireless communication medium has a broadcast nature, making this layer vulnerable to node tampering, hardware hacking, jamming, and even eavesdropping.
- Data Link Layer (DLL) Attacks: The DLL facilitates the nodes with shared resource usage, error control, and data flow control. The attacks in DLL are more likely to have pertained within the medium access control (MAC) sublayer of DLL. The standard attacks in this layer are collision and jamming.
- Network Layer Attacks: This layer caters to the routing of the data packets within the network. The presence of any malicious node can hamper the normal functioning of the network and initiates attacks like hello flood, replication attack, black hole, wormhole, and selective forwarding.
- Transport Layer Attacks: This layer leads to reliable transportation in the network. Due to attacks, the connection between the nodes can be compromised, giving rise to energy drain attacks, desynchronize attacks, and data integrity attacks.
- Application Layer Attacks: The application layer interacts directly with the end-user and performs data aggregations. This layer is prone to attacks that can affect the application programs.
3.3. Security Structure
3.3.1. Key Establishment
3.3.2. Defense against DoS Attacks
3.3.3. Secure Broadcasting and Multicasting
3.3.4. Defense against Attacks on Routing Protocols
4. WSN and IoT Standards and Protocols
4.1. IEEE 802.15.4 for Physical Layer Communication
- IEEE 802.15.4 (Physical Layer): This standard patronizes 16 channels in the industrial, scientific, and medical (ISM) band and 11 channels in 868/915 MHz, low-frequency band. The various modulation schemes are used to lower down the co-channel interferences [72].
- IEEE 802.15.4 (MAC Layer): This standard utilizes carrier sense multiple access-collision avoidances (CSMA- CD) and supervises the admittance to time slots and physical channels. The network topologies used here are cluster, peer-to-peer, and star [73]. The IEEE 802.15.4 MAC layer has a security model that meets the four security prerequisites, i.e., data encryption, access control, sequential freshness, and frame integrity [74]. Several security suits endure these security prerequisites, like the Advanced Encryption Standard (AES) [72]. AES has different modes of operations, namely counter mode (CTR), cypher block chaining (CBC-MAC), and authentication and encrypts block cypher mode (CCM). CTR, CBC-MAC, and CCM support the length of 32,64 and 128 bits [74]. Table 5 shows the comparison of security by a piece security suite.
- IEEE 802.15.4e (MAC Layer): This standard supports multi-hopping by using a time-synchronized mesh protocol. The devices are also synchronized to choose the correct nearest neighbour along with the channel. IEEE 802.15.4e provides security against reactive jamming and sweep [75].
4.2. B-MAC
4.3. LoWPAN
4.4. RPL
4.5. BCP
4.6. CTP
4.7. CoAP
5. Open Issues of Cybersecurity in IoT
- Wireless Communication Security: Wireless communication cannot ensure secure communication on its own [97]. Also, the protection of the physical layer cannot entirely prevent security infringement. Secure higher-order layers can provide the safety of the physical layer. A primary authentication mechanism is necessary for any wireless communication. The key size should be long enough to beat the attackers, and the key updating should be done frequently to protect the key identity from the attackers [98,99].
- Sensor-Based Threats: Authors in [100] have pinpointed the issues of sensor-based threats in the IoT network. There is a lack of Security available at the sensor nodes, which makes them vulnerable to attackers. The attackers can extract information from the sensor nodes and inject malware to the nodes without being noticed.
- Defence against Botnet: QBot botnets were discovered in 2014, eventually infected about 1 million IoT devices. Like a computer virus, QBot botnets have precursors named Mirai botnet and Torii botnet. Botnets result from weaknesses of IoT like bad user habits and lack of rigid security precautions [101].
- Integration with cloud/fog: IoT is a heterogeneous network consisting of various sensing modes. These different nodes collect massive data, which has to be stored and processed from time to time. The data communication techniques used in IoT have to be robust enough to avoid the management issues in handling the diverse data collection done by the different nodes. These situations make it difficult for cloud computing to cope effectively and efficiently with data handling and processing in IoT. The sole use of cloud computing in data handling can result in high bandwidth consumption and high communication cost. It is crucial to take care of the cloud data while handling and securing sensitive data. Due to these problems, the fog computing paradigm and cloud computing in IoT [12]. Integrating fog computing and cloud computing is a substantial open issue for designing a secure IoT network.
- Other Concerns: The Internet of Drones is a recent application of IoT in both research and industry. Authors in [102] have been concerned that drones are commonly designed without considering the basic security concepts, making it a security issue in IoT. The number of IoT vendors is increasing with the day-by-day increase in users of IoT, but the lack of a security framework for the vendors makes the IoT network more prone to cyber-attacks. Authors in [103,104] have analysed this growing concern in their research and have stressed that this security issue must be considered in the upcoming study.
6. Security Attacks Evaluation in ContikiOS
6.1. Network Model
6.2. Execution of Attacks
- Hello Flood Attack: Here, It broadcasts the hello packet every 15 M.S. and causes the collision.
- Selective Forwarding Attack: This deliberately fails to forward data packets from neighbours, and a set of neighbour’s changes every 50 s.
- Replay Attack: Here overhears traffic from the nearest neighbour and transmission in the replay.
- Blackhole Attack: The infected node xa miscarries the packets received from its one-hop neighbour.
- Sybil Attacks: Here, xa will copy the identity of the neighbouring node and thus, the packet to be sent to y will also be sent to xa.
- Sinkhole Attack: The node xa publicise that it is a sink node.
6.3. Valuation of Attacks
- Packet Delivery Ratio (PDR): PDR is the ratio of packets successfully received by the sink and the number of nodes sent by the source node. Figure 8 shows the PDR vs. number of attackers. According to the graph, the attacks that reduce PDR are selective forwarding, blackhole, sinkhole, replay, and hello flood attacks. At the same time, the Sybil attack does not affect the PDR with an increase in the number of attackers.
- End-to-end Delay (E2E): E2E is the time taken by the data packet to reach the destination or sink from the source. Figure 9 shows the effect on E2E with the increase in attackers. The attacks that increase E2E are replay attacks, hello flood attacks. On the other hand, the attacks that reduce the E2E are selective forwarding, sinkhole, and blackhole. The attack that does not change either PDR or E2E is the Sybil attack.
- Blackhole, selective forwarding and sinkhole attacks reduce PDR and E2E delay and faster delivery as the malicious node drops data.
- Hello flood and replay attack increase E2E but decreases PDR as the total number of packets increase.
- Sybil attacks do not affect any matrix drastically, as some other matrices are required.
6.4. Endorsement for Using ContikiOS in Designing Countermeasures
7. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Basagni, S.; Conti, M.; Giordano, S.; Stojmenovic, I. Mobile ad Hoc Networking; John Wiley & Sons: Hoboken, NJ, USA, 2004. [Google Scholar]
- Akyildiz, I.F.; Melodia, T.; Chowdhury, K.R. Wireless multimedia sensor networks: A survey. IEEE Wirel. Commun. 2007, 14, 32–39. [Google Scholar] [CrossRef]
- Lin, J.; Yu, W.; Zhang, N.; Yang, X.; Zhang, H.; Zhao, W. A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 2017, 4, 1125–1142. [Google Scholar] [CrossRef]
- Kocakulak, M.; Butun, I. An overview of Wireless Sensor Networks towards the internet of things. In Proceedings of the 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 9–11 January 2017; pp. 1–6. [Google Scholar]
- Fang, S.; Da Xu, L.; Zhu, Y.; Ahati, J.; Pei, H.; Yan, J.; Liu, Z. An integrated system for regional environmental monitoring and management based on internet of things. IEEE Trans. Ind. Inform. 2014, 10, 1596–1605. [Google Scholar] [CrossRef]
- Gope, P.; Hwang, T. BSN-Care: A secure IoT-based modern healthcare system using body sensor network. IEEE Sens. J. 2015, 16, 1368–1376. [Google Scholar] [CrossRef]
- Li, S.; da Xu, L.; Zhao, S. The internet of things: A survey. Inf. Syst. Front. 2015, 17, 243–259. [Google Scholar] [CrossRef]
- Butun, I.; Morgera, S.D.; Sankar, R. A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 2013, 16, 266–282. [Google Scholar] [CrossRef]
- Rawat, D.B.; Brecher, C.; Song, H.; Jeschke, S. Industrial Internet of Things: Cybermanufacturing Systems; Springer: Cham, Switzerland, 2017. [Google Scholar]
- Forsström, S.; Butun, I.; Eldefrawy, M.; Jennehag, U.; Gidlund, M. Challenges of securing the industrial internet of things value chain. In Proceedings of the 2018 Workshop on Metrology for Industry 4.0 and IoT, Brescia, Italy, 16–18 April 2018; pp. 218–223. [Google Scholar]
- Rani, S.; Ahmed, S.H.; Talwar, R.; Malhotra, J.; Song, H. IoMT: A reliable cross-layer protocol for internet of multimedia things. IEEE Internet Things J. 2017, 4, 832–839. [Google Scholar] [CrossRef]
- Butun, I.; Sari, A.; Österberg, P. Security implications of fog computing on the internet of things. In Proceedings of the 2019 IEEE International Conference on Consumer Electronics (ICCE), Berlin, Germany, 8–11 September 2019; pp. 1–6. [Google Scholar]
- Song, H.; Fink, G.A.; Jeschke, S. Security and Privacy in Cyber-Physical Systems: Foundations, Principles, and Applications; John Wiley & Sons: Hoboken, NJ, USA, 2021. [Google Scholar]
- Song, H.; Srinivasan, R.; Sookoor, T.; Jeschke, S. Smart Cities: Foundations, Principles, and Applications; John Wiley & Sons: Hoboken, NJ, USA, 2017. [Google Scholar]
- Balte, A.; Kashid, A.; Patil, B. Security Issues in the Internet of things (IoT): A survey. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2015, 5, 450–455. [Google Scholar]
- Butun, I.; Gidlund, M. Location Privacy Assured Internet of Things. ICISSP 2019, 19, 1–8. [Google Scholar]
- Butun, I.; Österberg, P.; Gidlund, M. Preserving location privacy in cyber-physical systems. In Proceedings of the 2019 IEEE Conference on Communications and Network Security (CNS), Washington, DC, USA, 10–12 June 2019; pp. 1–6. [Google Scholar]
- Sohrabi, K.; Gao, J.; Ailawadhi, V.; Pottie, G.J. Protocols for self-organization of a wireless sensor network. IEEE Pers. Commun. 2000, 7, 16–27. [Google Scholar] [CrossRef] [Green Version]
- Hossain, M.M.; Fotouhi, M.; Hasan, R. Towards an analysis of security issues, challenges, and open problems in the internet of things. In Proceedings of the 2015 IEEE World Congress on Services, New York, NY, USA, 27 June–2 July 2015; pp. 21–28. [Google Scholar]
- Yinbiao, S.; Lee, K.; Lanctot, P.; Jianbin, F.; Hao, H.; Chow, B.; Desbenoit, J.P. Internet of Things: Wireless Sensor Networks. White Paper, International Electrotechnical Commission. Available online: http://www.iec.ch (accessed on 28 September 2021).
- Whitman, M.E.; Mattord, H.J. Principles of Information Security, 4th ed.; Cengage Learning: Boston, MA, USA, 2011. [Google Scholar]
- Zou, Y.; Zhu, J.; Wang, X.; Hanzo, L. A survey on wireless security: Technical challenges, recent advances, and future trends. Proc. IEEE 2016, 104, 1727–1765. [Google Scholar] [CrossRef] [Green Version]
- Chan, H.; Perrig, A.; Song, D. Random key predistribution schemes for sensor networks. Symp. Secur. Priv. 2003, 2003, 197–213. [Google Scholar]
- Eschenauer, L.; Gligor, V.D. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, 18–22 November 2002; pp. 41–47. [Google Scholar]
- Ganeriwal, S.; Čapkun, S.; Han, C.-C.; Srivastava, M.B. Secure time synchronisation service for sensor networks. In Proceedings of the 4th ACM Workshop on Wireless Security, New York, NY, USA, 2 September 2005; pp. 97–106. [Google Scholar]
- Perrig, A.; Szewczyk, R.; Tygar, J.D.; Wen, V.; Culler, D.E. SPINS Security protocols for sensor networks. Wirel. Netw. 2002, 8, 521–534. [Google Scholar] [CrossRef]
- Di Pietro, R.; Mancini, L.V.; Law, Y.W.; Etalle, S.; Havinga, P. LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks. In Proceedings of the 2003 International Conference on Parallel Processing Workshops, Kaohsiung, Taiwan, 6–9 October 2003; pp. 397–406. [Google Scholar]
- Liu, D.; Ning, P. Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks. North Carolina State University, Department of Computer Science: Raleigh, NC, USA, 2002. [Google Scholar]
- Zhu, S.; Setia, S.; Jajodia, S. LEAP+ Efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sens. Netw. 2006, 2, 500–528. [Google Scholar] [CrossRef]
- Wood, A.D.; Stankovic, J.A.; Son, S.H. JAM: A jammed-area mapping service for sensor networks. In Proceedings of the RTSS 2003, 24th IEEE Real-Time Systems Symposium, Cancun, Mexico, 3–5 December 2003; pp. 286–297. [Google Scholar]
- Cagalj, M.; Capkun, S.; Hubaux, J.-P. Wormhole-based antijamming techniques in sensor networks. IEEE Trans. Mob. Comput. 2006, 6, 100–114. [Google Scholar] [CrossRef] [Green Version]
- Ye, F.; Luo, H.; Lu, S.; Zhang, L. Statistical en-route filtering of injected false data in sensor networks. IEEE J. Sel. Areas Commun. 2005, 23, 839–850. [Google Scholar]
- Newsome, J.; Shi, E.; Song, D.; Perrig, A. The Sybil attack in sensor networks: Analysis & defences. In Proceedings of the Third International Symposium on Information Processing in Sensor Networks, Berkeley, CA, USA, 26–27 April 2004; pp. 259–268. [Google Scholar]
- Hamid, M.A.; Rashid, M.O.; Hong, C.S. Routing Security in sensor network: Hello flood attack and defence. IEEE NEWS 2006, 2, 2–4. [Google Scholar]
- Slijepcevic, S.; Potkonjak, M.; Tsiatsis, V.; Zimbeck, S.; Srivastava, M.B. On communication security in wireless ad-hoc sensor networks. In Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Linz, Austria, 12 June 2002; pp. 139–144. [Google Scholar]
- Hu, Y.-C.; Perrig, A.; Johnson, D.B. Packet leashes: A defence against wormhole attacks in wireless networks. In Proceedings of the IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428), San Francisco, CA, USA, 30 March–3 April 2003; Volume 3, pp. 1976–1986. [Google Scholar]
- Du, W.; Deng, J.; Han, Y.S.; Varshney, P.K.; Katz, J.; Khalili, A. A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secure. 2005, 8, 228–258. [Google Scholar] [CrossRef] [Green Version]
- Karakehayov, Z. Using REWARD to detect team blackhole attacks in wireless sensor networks. Wksp. Real-World Wirel. Sens. Netw. 2005, 20–21. [Google Scholar]
- Anand, N.; Ranjan, R.; Varma, S. MSVR based range-free localisation technique for 3-D sensor networks. Wirel. Pers. Commun. 2017, 97, 6221–6238. [Google Scholar] [CrossRef]
- Lai, B.; Kim, S.; Verbauwhede, I. Scalable session key construction protocol for wireless sensor networks. In Proceedings of the IEEE Workshop on Large Scale RealTime and Embedded Systems (LARTES), Los Angeles, CA, USA, December 2002; Volume 7. [Google Scholar]
- Aura, T.; Nikander, P.; Leiwo, J. DOS-resistant authentication with client puzzles. In Proceedings of the International Workshop on Security Protocols, Cambridge, UK, 10–12 April 2000; pp. 170–177. [Google Scholar]
- Agah, A.; Das, S.K. Preventing DoS attacks in wireless sensor networks: A repeated game theory approach. Int. J. Netw. Secure. 2007, 5, 145–153. [Google Scholar]
- Muraleedharan, R.; Osadciw, L.A. Cross-layer denial of service attacks in wireless sensor network using swarm intelligence. In Proceedings of the 2006 40th Annual Conference on Information Sciences and Systems, Princeton, NJ, USA, 22–24 March 2006; pp. 1653–1658. [Google Scholar]
- Li, K.; Wang, C.; Lei, M.; Zhao, M.-M.; Zhao, M.-J. A Local Reaction Anti-Jamming Scheme for UAV Swarms. In Proceedings of the 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), Victoria, BC, Canada, 18 November–16 December 2020; pp. 1–6. [Google Scholar]
- Vasilyev, V.; Shamsutdinov, R. Security analysis of wireless sensor networks using SIEM and multi-agent approach. In Proceedings of the 2020 Global Smart Industry Conference (GloSIC), Chelyabinsk, Russia, 17–19 November 2020; pp. 291–296. [Google Scholar]
- Boubiche, D.E.; Athmani, S.; Boubiche, S.; Toral-Cruz, H. Cybersecurity Issues in Wireless Sensor Networks: Current Challenges and Solutions. Wirel. Pers. Commun. 2021, 117, 177–213. [Google Scholar] [CrossRef]
- Karthigha, M.; Latha, L.; Sripriyan, K. A comprehensive survey of routing attacks in wireless mobile ad hoc networks. In Proceedings of the 2020 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, 26–28 February 2020; pp. 396–402. [Google Scholar]
- Accettura, N.; Piro, G. Optimal and secure protocols in the IETF 6TiSCH communication stack. In Proceedings of the 2014 IEEE 23rd International Symposium on Industrial Electronics (ISIE), Istanbul, Turkey, 1–4 June 2014; pp. 1469–1474. [Google Scholar]
- Glissa, G.; Meddeb, A. 6LowPSec: An end-to-end security protocol for 6LoWPAN. Ad Hoc Netw. 2019, 82, 100–112. [Google Scholar] [CrossRef]
- Salau, A.O.; Marriwala, N.; Athaee, M. Data Security in Wireless Sensor Networks: Attacks and Countermeasures. In Mobile Radio Communications and 5G Networks; Springer: Singapore, 2021; pp. 173–186. [Google Scholar]
- Kanthuru, V.A.; Kumar, K.A. Black Hole Detection and Mitigation Using Active Trust in Wireless Sensor Networks. In Advances in Distributed Computing and Machine Learning; Springer: Singapore, 2021; pp. 25–34. [Google Scholar]
- Kaushik, I.; Sharma, N. Blackhole attack and its security measure in wireless sensors networks. In Handbook of Wireless Sensor Networks: Issues and Challenges in Current Scenario’s; Springer: Cham, Switzerland, 2020; pp. 401–416. ISBN 978-3-030-40305-8. [Google Scholar]
- Gurung, S.; Chauhan, S. A survey of black hole attack mitigation techniques in MANET: Merits, drawbacks, and suitability. Wirel. Netw. 2020, 26, 1981–2011. [Google Scholar] [CrossRef]
- Lim, J.; Keum, D.; Ko, Y.-B. A stepwise and hybrid trust evaluation scheme for tactical wireless sensor networks. Sens. Vol. 2020, 20, 1108. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Teng, L.; Zhang, Y. SeRA: A secure routing algorithm against sinkhole attacks for mobile wireless sensor networks. Second. Int. Conf. Comput. Modeling Simul. 2010, 4, 79–82. [Google Scholar]
- Butun, I.; Ra, I.-H.; Sankar, R. An intrusion detection system based on multilevel clustering for hierarchical wireless sensor networks. Sensors 2015, 15, 28960–28978. [Google Scholar] [CrossRef] [Green Version]
- Zhang, Y.; Liu, W.; Lou, W.; Fang, Y. Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE J. Sel. Areas Commun. 2006, 24, 247–260. [Google Scholar] [CrossRef]
- Duan, M.; Xu, J. An efficient location-based compromise-tolerant key management scheme for sensor networks. Inf. Process. Lett. 2011, 111, 503–507. [Google Scholar] [CrossRef]
- Dvir, A.; Buttyan, L. VeRA-version number and rank authentication in RPL. In Proceedings of the 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, Valencia, Spain, 17–22 October 2011; pp. 709–714. [Google Scholar]
- Perrey, H.; Landsmann, M.; Ugus, O.; Schmidt, T.C.; Wählisch, M. TRAIL: Topology authentication in RPL. arXiv 2013, arXiv:1312.0984. [Google Scholar]
- Mayzaud, A.; Sehgal, A.; Badonnel, R.; Chrisment, I.; Schönwälder, J. A study of RPL DODAG version attacks. In Proceedings of the IFIP international conference on autonomous infrastructure, management and security, Zurich, Switzerland, 10–13 July 2014; pp. 92–104. [Google Scholar]
- Song, S.; Choi, H.-K.; Kim, J.-Y. A secure and lightweight approach for routing optimisation in mobile IPv6. EURASIP J. Wirel. Commun. Netw. 2009, 2009, 1–10. [Google Scholar] [CrossRef] [Green Version]
- Singh, M.; Rajan, M.A.; Shivraj, V.L.; Balamuralidhar, P. Secure MQTT for the internet of things (IoT). In Proceedings of the 2015 Fifth International Conference on Communication Systems and Network Technologies, Gwalior, India, 4–6 April 2015; pp. 746–751. [Google Scholar]
- Neisse, R.; Steri, G.; Baldini, G. Enforcement of security policy rules for the internet of things. In Proceedings of the 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Larnaca, Cyprus, 8–10 October 2014; pp. 165–172. [Google Scholar]
- Rahman, R.A.; Shah, B. Security analysis of IoT protocols: A focus in CoAP. In Proceedings of the 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), Muscat, Oman, 15–16 March 2016; pp. 1–7. [Google Scholar]
- Karlof, C.; Wagner, D. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Netw. 2003, 1, 293–315. [Google Scholar] [CrossRef]
- Rafaeli, S.; Hutchison, D. A survey of key management for secure group communication. ACM Comput. Surv. 2003, 35, 309–329. [Google Scholar] [CrossRef]
- Deering, S.; Hinden, R. Internet Protocol, Version 6 (IPv6) Specification, RFC 2460; Pub.: RFC Editor. 1998.
- Howitt, I.; Gutierrez, J.A. IEEE 802.15. 4 low rate-wireless personal area network coexistence issues. In Proceedings of the 2003 IEEE Wireless Communications and Networking, New Orleans, LA, USA, 16–20 March 2003; Volume 3, pp. 1481–1486. [Google Scholar]
- Chen, F.; Talanis, T.; German, R.; Dressler, F. Real-time enabled IEEE 802.15. 4 sensor networks in industrial automation. In Proceedings of the 2009 IEEE International Symposium on Industrial Embedded Systems, Lausanne, Switzerland, 8–10 July 2009; pp. 136–139. [Google Scholar]
- Han, D.-M.; Lim, J.-H. Smart home energy management system using IEEE 802.15. 4 and ZigBee. IEEE Trans. Consum. Electron. 2010, 56, 1403–1410. [Google Scholar] [CrossRef]
- Granjal, J.; Monteiro, E.; Silva, J.S. Security for the internet of things: A survey of existing protocols and open research issues. IEEE Commun. Surv. Tutor. 2015, 17, 1294–1312. [Google Scholar] [CrossRef]
- Daidone, R.; Dini, G.; Tiloca, M. On experimentally evaluating the impact of security on IEEE 802.15. 4 networks. In Proceedings of the 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), Barcelona, Spain, 27–29 June 2011; pp. 1–6. [Google Scholar]
- Xiao, Y.; Sethi, S.; Chen, H.-H.; Sun, B. Security services and enhancements in the IEEE 802.15. 4 wireless sensor networks. In Proceedings of the GLOBECOM’05. IEEE Global Telecommunications Conference, St. Louis, MO, USA, 28 November–2 December 2004; Volume 3, p. 5. [Google Scholar]
- O’Flynn, C.P. Message denial and alteration on IEEE 802.15. 4 low-power radio networks. In Proceedings of the 2011 4th IFIP International Conference on New Technologies, Mobility and Security, Paris, France, 7–10 February 2011; pp. 1–5. [Google Scholar]
- Polastre, J.; Hill, J.; Culler, D. Versatile, low power media access for wireless sensor networks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, MD, USA, 3–5 November 2004; pp. 95–107. [Google Scholar]
- Law, Y.W.; Palaniswami, M.; van Hoesel, L.; Doumen, J.; Hartel, P.; Havinga, P. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. ACM Trans. Sens. Netw. 2009, 5, 1–38. [Google Scholar] [CrossRef] [Green Version]
- Palattella, M.R.; Accettura, N.; Vilajosana, X.; Watteyne, T.; Alfredo Grieco, L.; Boggia, G.; Dohler, M. Standardised protocol stack for the internet of (important) things. IEEE Commun. Surv. Tutor. 2012, 15, 1389–1406. [Google Scholar] [CrossRef] [Green Version]
- Winter, T.; Thubert, P.; Brandt, A.; Hui, J.; Kelsey, R.; Levis, P.; Pister, K.; Struik, R.; Vasseur, J.P.; Alexander, R.; et al. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. RFC 2012, 6550, 1–157. [Google Scholar]
- Le, A.; Loo, J.; Lasebae, A.; Aiash, M.; Luo, Y. 6LoWPAN: A study on QoS security threats and countermeasures using intrusion detection system approach. Int. J. Commun. Syst. 2012, 25, 1189–1212. [Google Scholar] [CrossRef]
- Moeller, S.; Sridharan, A.; Krishnamachari, B.; Gnawali, O. Routing without routes: The backpressure collection protocol. In Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, Stockholm, Sweden, 12–16 April 2010; pp. 279–290. [Google Scholar]
- Gnawali, O.; Fonseca, R.; Jamieson, K.; Moss, D.; Levis, P. Collection tree protocol. In Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems, Barkeley, CA, USA, 4–6 November 2009; pp. 1–14. [Google Scholar]
- Bormann, C.; Castellani, A.P.; Shelby, Z. Coap: An application protocol for billions of tiny internet nodes. IEEE Internet Comput. 2012, 16, 62–67. [Google Scholar] [CrossRef]
- Raymond, D.R.; Marchany, R.C.; Brownfield, M.I.; Midkiff, S.F. Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. IEEE Trans. Veh. Technol. 2008, 58, 367–380. [Google Scholar] [CrossRef] [Green Version]
- Oliveira, L.M.L.; Rodrigues, J.J.P.C.; de Sousa, A.F.; Lloret, J. A network access control framework for 6LoWPAN networks. Sensors 2013, 13, 1210–1230. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Raza, S.; Duquennoy, S.; Chung, T.; Yazar, D.; Voigt, T.; Roedig, U. Securing Communication in 6LoWPAN with Compressed IPsec. In Proceedings of the 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), Barcelona, Spain, 27–29 June 2011; pp. 1–8. [Google Scholar]
- Kim, H. Protection against packet fragmentation attacks at 6LoWPAN adaptation layer. In Proceedings of the 2008 International Conference on Convergence and Hybrid Information Technology, Daejeon, Korea, 28–30 August 2008; pp. 796–801. [Google Scholar]
- Hummen, R.; Hiller, J.; Wirtz, H.; Henze, M.; Shafagh, H.; Wehrle, K. 6LoWPAN fragmentation attacks and mitigation mechanisms. In Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, Budapest, Hungary, 17–19 April 2013; pp. 55–66. [Google Scholar]
- Wallgren, L.; Raza, S.; Voigt, T. Routing attacks and countermeasures in the RPL-based internet of things. Int. J. Distrib. Sens. Netw. 2013, 9. [Google Scholar] [CrossRef]
- Heurtefeux, K.; Erdene-Ochir, O.; Mohsin, N.; Menouar, H. Enhancing RPL resilience against routing layer insider attacks. In Proceedings of the 2015 IEEE 29th International Conference on Advanced Information Networking and Applications, Gwangiu, Korea, 24 March 2015; pp. 802–807. [Google Scholar]
- Raza, S.; Wallgren, L.; Voigt, T. SVELTE: Real-time intrusion detection in the Internet of Things. Ad Hoc Netw. 2013, 11, 2661–2674. [Google Scholar] [CrossRef]
- Lu, Z.; Sagduyu, Y.E.; Li, J.H. Securing the backpressure algorithm for wireless networks. IEEE Trans. Mob. Comput. 2016, 16, 1136–1148. [Google Scholar] [CrossRef]
- Venkataraman, R.; Moeller, S.; Krishnamachari, B.; Rao, T.R. Trust-based backpressure routing in wireless sensor networks. Int. J. Sens. Netw. 2015, 17, 27–39. [Google Scholar] [CrossRef]
- Sultana, S.; Midi, D.; Bertino, E. Kinesis: A security incident response and prevention system for wireless sensor networks. In Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems, New York, NY, USA, 3–6 November 2014; pp. 148–162. [Google Scholar]
- Sharma, G.; Vidalis, S.; Menon, C.; Anand, N.; Kumar, S. Analysis and Implementation of Threat Agents Profiles in Semi-Automated Manner for a Network Traffic in Real-Time Information Environment. Electronics 2021, 10, 1849. [Google Scholar] [CrossRef]
- Korzun, D.; Balandina, E.; Kashevnik, A.; Balandin, S.; Viola, F. Ambient Intelligence Services in IoT Environments: Emerging Research and Opportunities: Emerging Research and Opportunities; IGI Global: Hershey, PA, USA, 2019. [Google Scholar]
- Gurtov, A.; Liyanage, M.; Korzun, D. Secure communication and data processing challenges in the Industrial Internet. Balt. J. Mod. Comput. 2016, 4, 1058–1073. [Google Scholar] [CrossRef]
- Burg, A.; Chattopadhyay, A.; Lam, K.-Y. Wireless communication and security issues for cyber-physical systems and the Internet-of-Things. Proc. IEEE 2017, 106, 38–60. [Google Scholar] [CrossRef]
- Fagan, M.; Megas, K.; Scarfone, K.; Smith, M. Recommendations for IoT Device Manufacturers: Foundational Activities and Core Device Cybersecurity Capability Baseline (2nd Draft); National Institute of Standards and Technology, CSRC: Gaithersburg, MA, USA, 2019. [Google Scholar]
- Sikder, A.K.; Petracca, G.; Aksu, H.; Jaeger, T.; Uluagac, A.S. A survey on sensor-based threats to internet-of-things (IoT) devices and applications. arXiv 2018, arXiv:1802.02041. [Google Scholar]
- Osborne, C. Meet Torii, a New Iot Botnet Far More Sophisticated than Mirai Variants. Available online: https//www.zdnet.com/article/meet-torii-a-new-iot-botnet-far-more-sophisticated-than-mirai (accessed on 28 September 2018).
- Lin, C.; He, D.; Kumar, N.; Choo, K.-K.R.; Vinel, A.; Huang, X. Security and privacy for the internet of drones: Challenges and solutions. IEEE Commun. Mag. 2018, 56, 64–69. [Google Scholar] [CrossRef]
- 103. Zhang, N.; Demetriou, S.; Mi, X.; Diao, W.; Yuan, K.; Zong, P.; Qian, F.; Wang, X.; Chen, K.; Tian, Y. Understanding IoT security through the data crystal ball: Where we are now and where we are going to be. arXiv 2017, arXiv:1703.09809. [Google Scholar]
- Yahuza, M.; Yamani Idna Idris, M.; Bin Ahmedy, I.; Wahid Abdul Wahab, A.; Nandy, T.; Mohamed Noor, N.; Bala, A. Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges. IEEE Access 2021, 9, 57243–57270. [Google Scholar]
- Paredes, C.M.; Martínez-Castro, D.; Ibarra-Junquera, V.; González-Potes, A. Detection and Isolation of DoS and Integrity Cyber Attacks in Cyber-Physical Systems with a Neural Network-Based Architecture. Electronics 2021, 10, 2238. [Google Scholar] [CrossRef]
- Dunkels, A.; Gronvall, B.; Voigt, T. Contiki-a lightweight and flexible operating system for tiny networked sensors. In Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks, Tampa, FL, USA, 16–18 November 2004; pp. 455–462. [Google Scholar]
Protocols | Routing | Confidentiality | Broadcast Authentication |
---|---|---|---|
SNEP [26] | Flat | Yes | No |
LKHW [27] | Flat/Hierarchical | Yes | No |
µTESLA [26] | Flat/Hierarchical | Yes | Yes |
Multilevel Key Chains [28] | Flat/Hierarchical | No | Yes |
LEAP Hierarchy [29] | Flat/Hierarchical | Yes | Yes |
Security Scheme | Attacks Prohibited |
---|---|
JAM [30] | DoS Attack |
Wormhole [31] | DoS Attack |
Statistical En-Route Filtering [32] | Information Spoofing |
Random Key Pre-distribution [33] | Sybil Attack |
Bidirectional Verification [34] | Hello, Flood Attack, |
On Communication Security [35] | Data Spoofing |
TIK [36] | Wormhole Attack and Data Spoofing |
Random Key Distribution [37] | Data Spoofing, Attacks in Transmitting information |
REWARD [38] | Blackhole attacks |
µTESLA [26] | Data Spoofing and Attacks on reply to messages |
Range Based Secure Localisation [39] | Malicious anchors |
Layer | Attacks | Outcomes of Network operation’s | Proposed Solutions for Mitigation |
---|---|---|---|
Physical Layer | Basic Jammer | Congestion, signal distortion, draining of nodes’ energy Admittance to the sensitive data. | Spread Spectrum [42], JAM [30], Swarm intelligence [43], Wormhole technique [44] |
Node Tapering | Tampering sensitive information like routing tables and cryptographic keys. | JTAG [45], Camouflaging [46] | |
Data Link Layer | Hardware Hacking | Nodes become vulnerable to attacks. | Error correction codes [46] |
Collision | Increasing congestion | Irregular detection of motes [47] | |
Denial of sleep | Interference | TDM | |
De-Synchronization | Packet Loss | 6TiSCH [48] | |
6LoWPAN | No end-to end security | 6LowPseC [49] | |
Network Layer | Jamming | Congestion, signal distortion, draining of node’s energy | Multipath routing [50], Active trust routing [51], REWARD routing [52], MOADV [53], BAMBi [54] |
Replay Attack | Increase in congestion and interference, route disturbance and fake error messages, data loss, and traffic reduction | Source authorisation [42], Multipath routing [47] | |
Black-hole | Routing loops, repulsing network traffic Data loss, and reduction of traffic | Source routing algorithm [55] | |
Spoofed Selective Forwarding | Data loss and reduction of traffic, conciliatory of transmission routes | Identity verification, Isolation, [33], Indirect validation [47] | |
Sinkhole Wormhole | Transmission of data to the wrong destinations | Multi-level clustering [56], ID-based public keys [57], Location-based key management [58] | |
Sybil Attack Hello Flood | Hello Flood | ID-based public keys [56] | |
Node Replication | Hello Flood | ID-based public keys [56] | |
RPL rank | Disturbance in the transmission routes Collision, false transmission routes, and energy degradation | VeRA [59], TRAIL [60] | |
RPL DODAG | Eavesdropping, disturbance in the transmission route. | VeRA [59], Integrity check [61] | |
Transport Layer | Desynchronization attack | Failed communication links and disturbed transmission routes | Authentication via header [30] |
Energy Drain | False messages can tamper with the overall functioning of the network. | Light-weighted algorithm for authentication [62] | |
MQTT exploit | Draining energy resources | SMQTT [63], Enforcement of security policies [64] | |
Application Layer | Malicious Code Attacks | Extinguishes the capacity of the network to perform the expected Collision and energy draining | Collective secret [32] |
Attacks on Reliability Path-based DoS | Extinguishes the capacity of the network to perform the expected Collision and energy draining | One-Way hash chains [37] | |
CoAP exploit | Extinguishes the capacity of the network to perform the expected Collision and energy draining | Employment of DTLS [65] | |
Multi-Layer | Man in the middle | Admittance to the sensitive data Rules out the capacity of the network | Key pre-distribution [23,37] |
Denial of Service | Admittance to the sensitive data Rules out the capacity of the network | Link Layer encryption [26,66] | |
Eavesdropping | Admittance to the sensitive data Rules out the capacity of the network | Sensor-Wave communication [26] |
DoS Attacks | Possible Defense Approach |
---|---|
Physical tampering | Using tamper-resistant nodes |
Radio Interference | Using Spread-Spectrum communication |
Black-hole | Using Multiple routing paths |
Misdirection | Using source authorization |
Denying Channel | Using error correction codes |
Flooding | Restraining total connections |
Security Suite | Data Encryption | Access Control | Seq. Fresh. | Frame Integration |
---|---|---|---|---|
None | No | No | No | No |
CTR | Yes | Yes | Yes | No |
CBC-MAC-128 | No | Yes | No | Yes |
CBC-MAC-64 | No | Yes | No | Yes |
CBC-MAC-32 | No | Yes | No | Yes |
CCM-128 | Yes | Yes | Yes | Yes |
CCM-64 | Yes | Yes | Yes | Yes |
CCM-32 | Yes | Yes | Yes | Yes |
Protocol | Significant Attacks | Proposed Defensive Measures | Comments |
---|---|---|---|
IEEE 802.15.4 | Eavesdropping and faking Acknowledgement (ACK)frame | Message Integrity Code (MIC) [74] | MIC has built-in CBC-MAC suits, which increases the overhead and delays the frame transmission. |
Reactive jamming and sweep | IEEE802.15.4e [75] | Channel hopping and secured ACK. Do not ensure defence for wideband jamming | |
Denying of data through physical and MAC header | Encrypted data payload [75] | It Covers MAC payloads, not the headers. | |
B-MAC | Denial of sleep attack | Broadcast attack defense, anti-replay protection and link-layer authentication [84] | Attackers are awake most of the time in the case of B-MAC protocol. |
Statistical Jamming | Reduction in preamble size [77] | Reducing the preamble size too much overcomes its function. | |
6LoWPAN | Authentication Attack | Framework for network access control [85] | Enables one border router and provides identification to nodes |
Eavesdropping and spoofing, Man in the middle | IPsec [86] | The end-to-end secure mechanism, the key mechanism, is pre-shared but not very flexible. | |
Fragmentation attack | Timestamps are given to bidi reactional and unidirectional fragmented packets [87]. Use of split buffer scheme [88] | Redefinition of fragmented packets. | |
RPL | Sybil Attack | To store graphical locationof sensor nodes, a distributed hash table (DHT) is used [89] | Non-scalable and challenging to identify the node location securely. |
Wormhole Attack | The separate key for each segment of the network [89]. | End-to-end delay and high jitter | |
Selective forwarding attack | Lightweight Heartbeat [89] | No defence after attack detection. The delivery ratio is improved, but energy consumption increases. | |
Rank attack selective forwarding altered information | RPL resilient technique [90] TRAIL [59] and VeRa [59] SVELTE [91] | Dependent on network size and do not require cryptography.Overhead is small, but the positive rate is not 100% due to false alarms | |
BCP | Selective forwarding, black-hole and multiple attacks | Secure backpressure algorithm [92] | The throughput performance is maintained under attacks. |
Data Modifications, False routes and data modification | VAR trust model [93] | Overhead increased | |
CTP | Data alteration, data loss, sinkhole and selective for warding | Kinesis [94,95] | An automated reaction scheme for attacks and abnormalities. Segmentation of neighbourhoods gives rise to redundant data. |
Open Issues | Source | Layer |
---|---|---|
Wireless Communication security | Burg et.al [99] | Physical and MAC |
Sensor-based threats | Sikder et.al [100] | Physical and MAC |
Defence against botnet attacks | Torii botnet [101] | Application |
Lack of security framework | Zhang et.al [103] | Application |
Integration with cloud/fog | Butun et.al [12] | All Layers |
Security of Internet of drones | Lin et.al [102] | All Layers |
Parameters | Values |
---|---|
Simulator | Cooja, simulator of Contiki O.S. |
Radio Environment | Unit Disk Graph (UDG) |
Type of nodes | Arago system, Wismote mote |
Number of nodes | 300 (Contiki MAC) and 1 sink node Malicious Nodes |
Physical Layer | IEEE802.15.4 |
MAC Layer | ContikiMAC |
Network Layer | Contiki RPL |
Transport Layer | UDP Simulation duration |
Sending rate | One packet every 5 sec |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sharma, G.; Vidalis, S.; Anand, N.; Menon, C.; Kumar, S. A Survey on Layer-Wise Security Attacks in IoT: Attacks, Countermeasures, and Open-Issues. Electronics 2021, 10, 2365. https://doi.org/10.3390/electronics10192365
Sharma G, Vidalis S, Anand N, Menon C, Kumar S. A Survey on Layer-Wise Security Attacks in IoT: Attacks, Countermeasures, and Open-Issues. Electronics. 2021; 10(19):2365. https://doi.org/10.3390/electronics10192365
Chicago/Turabian StyleSharma, Gaurav, Stilianos Vidalis, Niharika Anand, Catherine Menon, and Somesh Kumar. 2021. "A Survey on Layer-Wise Security Attacks in IoT: Attacks, Countermeasures, and Open-Issues" Electronics 10, no. 19: 2365. https://doi.org/10.3390/electronics10192365
APA StyleSharma, G., Vidalis, S., Anand, N., Menon, C., & Kumar, S. (2021). A Survey on Layer-Wise Security Attacks in IoT: Attacks, Countermeasures, and Open-Issues. Electronics, 10(19), 2365. https://doi.org/10.3390/electronics10192365