An overview of DoSL Attacks in IoT Networks (original) (raw)
Related papers
Modeling the impact of jamming attacks in the internet of things
Indonesian Journal of Electrical Engineering and Computer Science, 2022
Security is a key requirement in the context of the internet of things (IoT). The IoT is connecting many objects together via wireless and wired connections with the goal of allowing ubiquitous interaction, where all components may communicate with others without constraints. The wireless sensor network is one of the most essential elements of IoT concepts. Because of their unattended and radio-shared nature for communication, security is becoming an important issue. Wireless sensor nodes are susceptible to different types of attacks. Such attacks can be carried out in several various ways. One of the most commonly utilized methods is jamming. However, there are also some other attack types that we need to be aware of, such as tampering, and wormhole. In this paper, we have provided an analysis of the layered IoT architecture. A detailed study of different types of jamming attacks, in a wireless sensor network, is presented. The packet loss rate, and energy consumption. are calculated, and the performance analysis of the wireless sensor network (WSN) system is achieved. The protocol chosen to evaluate the performance of the WSN is the sensor-medium access control (S-MAC) protocol. Different simulations are realized to evaluate the performance of a network attacked by the different types of jamming attacks.
Investigating Routing Protocol Attacks on Low Power and Lossy IoT Networks
Investigating Routing Protocol Attacks on Low Power and Lossy IoT Networks
Internet-of-things (IoT) networks are distinguished by nodes with limited computational power and storage capacity, making Low Power and Lossy Networks (LLNs) protocols essential for effective communication in resource-constrained environments. One such protocol is the Routing Protocol for Low-Power and Lossy networks (RPL), which establishes and manages routes in RPL-based networks. RPL contributes to optimized routing and reduced network overhead in LLNs. However, the RPL-based protocol is susceptible to various internal and external vulnerabilities that require thorough exploration and mitigation. Experimental results illustrate the impact of several RPL attacks, including the DODAG Information Solicitation (DIS) attack, version number attack, decreased rank attack, and worst parent selection (WPS) attack. For simulation purposes, we employed the Contiki Cooja network simulator. Further, we conduct a comparative analysis of these RPLbased attacks, revealing that the WPS attack has a significant impact on the network performance compared to other attacks mentioned in the paper.
Mitigating Energy Depletion Attacks in IoT via Random Time-Slotted Channel Access
2021 IEEE Conference on Communications and Network Security (CNS), 2021
Energy depletion attacks represent a challenging threat towards the secure and reliable deployment of low-power Internet of Things (IoT) networks. Indeed, by simply transmitting canning standard-compliant packets to a target IoT device, an adversary can quickly exhaust target devices' available energy and reduce network lifetime, leading to extensive Denial-of-Service (DoS). Current solutions to tackle energy depletion attacks mainly rely on ex-post detection of the attack and the adoption of follow-up countermeasures. Still, the cited approaches cannot prevent external adversaries from sending wireless packets to target devices and draining down their energy budget. In this paper, we present RTSCA, a novel countermeasure to energy depletion attacks in IoT networks, that leverages Random Time-Slotted Channel Access. RTSCA randomizes channel access operations executed by a couple of directly-connected IoT devices operating through the IEEE 802.15.4 MAC, significantly reducing the time window of opportunity for the attacker, with littleto-none energy cost on legitimate IoT devices. RTSCA also includes a detection mechanism targeted to the recently-introduced Truncate-after-Preamble (TaP) energy depletion attacks, that leverages the observation of error patterns in the received packets. We carried out an extensive performance assessment campaign on real Openmote-b IoT nodes, showing that RTSCA forces the adversary to behave as a (sub-optimal) reactive jammer to achieve energy depletion attacks. In such a setting, the adversary has to spend between 42.5% and 55% more energy to carry out the attack, while at the same time having no deterministic chances of success.
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using Time Slot-Based Method
Ad-hoc low-power wireless networks are an exciting research direction in sensing and prevalent calculating. Previous secure work in this section has absorbed chiefly on rejection of contact at the routing or average access control levels. This paper explores resource reduction attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes' battery power. These "Vampire" attacks are not specific to any specific protocol, but rather rely on the properties of most popular classes of routing protocols. Find that all examined protocols are susceptible to Vampire attacks, which are devastating, challenging to detect, and are easy to carry out using as few as one malicious insider sending only protocol-compliant messages. In the wickedest case, a single Vampire can increase network-wide energy usage by a factor of O(N ), where N in the number of network nodes. discuss methods to mitigate these types of attacks, with a new proof-of-concept protocol that provably bounds the damage caused by Vampires during the packet forwarding phase. © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 608 malicious action. Second, show simulation results quantifying the performance of several representative protocols in the presence of a single Vampire (insider adversary). Third, modify an existing sensor network routing protocol to provably bound the damage from Vampire attacks during packet forwarding.
A novel countermeasure technique for reactive jamming attack in internet of things
Multimedia Tools and Applications, 2018
In recent years, Internet of Things (IoT) has attracted significant attention because of its wide range of applications in various domains. However, security is a growing concern as users of small devices in an IoT network are unable to defend themselves against reactive jamming attacks. These attacks negatively affect the performance of devices and hinder IoT operations. To address such an issue, this paper presents a novel countermeasure detection and consistency algorithm (CDCA), which aims to fight reactive jamming attacks on IoT networks. The proposed CDCA uses a change in threshold value to detect and treat an attack. The algorithm employs channel signal strength to check packet consistency by determining if the data transmission value contradicts the threshold value. The node that sends the threshold value is periodically checked and the threshold value is compared with the current value after data transmission to find out if an attack has occurred in the network. Based on realistic simulation scenarios (e.g., with varying traffic interval, number of malicious nodes, and random mobility patterns), the performance of the proposed CDCA is evaluated using a Cooja simulator. Simulation results demonstrate the superiority of the proposed technique compared with contemporary schemes in terms of performance metrics such as energy consumption, traffic delay, and network throughput.
2022
The wide-scaled sensing by Wireless Sensor Networks (WSN) has impacted several areas in the modern generation. It has offered the ability to measure, observe and understand the various physical factors from our environment. The rapid increase of WSN devices in an actuating-communicating network has led to the evolution of Internet of Things (IoT), where information is shared seamlessly across platforms by blending the sensors and actuators with our environment. These low cost WSN devices provide automation in medical and environmental monitoring. Evaluating the performance of these sensors using RPL enhances their use in real world applications. The realization of these RPL performances from different nodes focuses our study to utilize WSNs in our day-today applications. The effective sensor nodes (motes) for the appropriate environmental scenarios are analyzed, and we propose a collective view of the metrics for the same, for enhanced throughput in the given field of usage.
Low-power DoS attacks in data wireless LANs and countermeasures
Mobile Computing and Communications Review, 2003
In this paper we investigate the resiliency to jamming of data protocols, such as IP, over Wireless LAN. We show that, on existing WLAN, an adversary can jam this protocol at a very low energy cost. Such attacks enable a set of adversary nodes disseminated over a geographical area to prevent communication, partition an ad hoc network, or force packets to be routed over adversary chosen paths. The ratio of the jamming pulses duration to the transmission duration can be as low as 10 -4 . We investigate and analyze the performance of using various coding schemes to improve the robustness of wireless LANs for IP packets transmission. We propose a concatenated code that is simple to decode and can maintain a low Frame Error Rate (FER) under a jamming effort ratio of 15%. We investigate the theoretical limits by analyzing the performance derived from upper bounds on binary error-control codes. We also propose an efficient anti-jamming technique for IEEE802.11b standard.
Analysis of the WSN MAC Protocols under Jamming DoS Attack-IJNS
Wireless Sensor Network (WSN) is a wireless network consisting of small nodes with sensing, computation, and wireless communications capabilities. The design of wireless sensor networks depends of many factors, such as transmission errors, network topology and power consumption. Many routing protocols, protocols for data transmission, are specifically designed for wireless sensor networks where energy consumption is essential. This paper provides a brief description of the IEEE 802.15.4/ZigBee standard, also surveys the known attacks on wireless sensor networks. WSNs are particularly vulnerable to several key types of attacks. These attacks can be performed in several different ways. One of the commonly used methods is a denial of service (DoS), but there are also other types of attacks from which we should be aware as a traffic analysis, privacy violation, physical attacks etc. Three MAC protocols, such as IEEE 802.15.4 MAC, T-MAC, and S-MAC are proposed to analyse the performance of the WSN under DoS attack using OMNeT++ simulator. Different application scenarios have been evaluated. Performance parameters such as throughput, network delay, energy consumption in the coordinator, and network load are the main considered factors in our study.
HARPAGON: An Energy Management Framework for Attacks in IoT Networks
IEEE Internet of Things Journal
The Internet of Things (IoT) represents an eclectic paradigm that is still growing in popularity. However, security aspects are a major concern for IoT devices due to their applications and the amount of sensitive data they provide. Simultaneously, the energy constraint in IoT networks remains a significant issue due to their limited resources. To reduce their energy consumption, several IoT protocols have integrated the energy-saving mode which offers four operating modes. On the basis of these four states, we derive an analysis framework, named HARPAGON, allowing an attacker to maximize his attack efficiency and minimize his impact in terms of energy consumption. Indeed, the effectiveness of many attacks depends principally on the state of the attacker and the victim at the same time. HARPAGON with the help of Markov Chains Theory allows to model the interaction between the attacker and its victims. In this paper, we demonstrate the effectiveness of the framework coupled to a jamming attack by comparing it to other types of jamming attacks. Experimental results reveal HARPAGON combined with jamming attack drastically reduces the performance of the network, with an impact on the Packet Error Rate (PER), which is around 13% higher than the reactive attack and with a reduced energy budget in respect of other two well-known "green" jamming attacks.
—Wireless platforms are becoming less expensive and more powerful, enabling the promise of widespread use for everything from health monitoring to military sensing. Like other networks, sensor networks are vulnerable to malicious attack. However, the hardware simplicity of these devices makes defense mechanisms designed for traditional networks infeasible. This paper explores the denial-of-sleep attack, in which a sensor node's power supply is targeted. Attacks of this type can reduce the sensor lifetime from years to days and have a devastating impact on a sensor network. This paper classifies sensor network denial-of-sleep attacks in terms of an attacker's knowledge of the medium access control (MAC) layer protocol and ability to bypass authentication and encryption protocols. Attacks from each classification are then modeled to show the impacts on four sensor network MAC protocols, i.e., Sensor MAC (S-MAC), Timeout MAC (T-MAC), Berkeley MAC (B-MAC), and Gateway MAC (G-MAC). Implementations of selected attacks on S-MAC, T-MAC, and B-MAC are described and analyzed in detail to validate their effectiveness and analyze their efficiency. Our analysis shows that the most efficient attack on S-MAC can keep a cluster of nodes awake 100% of the time by an attacker that sleeps 99% of the time. Attacks on T-MAC can keep victims awake 100% of the time while the attacker sleeps 92% of the time. A framework for preventing denial-of-sleep attacks in sensor networks is also introduced. With full protocol knowledge and an ability to penetrate link-layer encryption, all wireless sensor network MAC protocols are susceptible to a full domination attack, which reduces the network lifetime to the minimum possible by maximizing the power consumption of the nodes' radio subsystem. Even without the ability to penetrate encryption, subtle attacks can be launched, which reduce the network lifetime by orders of magnitude. If sensor networks are to meet current expectations, they must be robust in the face of network attacks to include denial-of-sleep.