Cargando…

Threat Modeling—How to Visualize Attacks on IOTA?

Internet of Things (IoT) has been deployed in a vast number of smart applications with the aim to bring ease and comfort into our lives. However, with the expansion of IoT applications, the number of security and privacy breaches has also increased, which brings into question the resilience of exist...

Descripción completa

Detalles Bibliográficos
Autores principales: Ullah, Ikram, de Roode, Gerard, Meratnia, Nirvana, Havinga, Paul
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7975986/
https://www.ncbi.nlm.nih.gov/pubmed/33800712
http://dx.doi.org/10.3390/s21051834
_version_ 1783667008463699968
author Ullah, Ikram
de Roode, Gerard
Meratnia, Nirvana
Havinga, Paul
author_facet Ullah, Ikram
de Roode, Gerard
Meratnia, Nirvana
Havinga, Paul
author_sort Ullah, Ikram
collection PubMed
description Internet of Things (IoT) has been deployed in a vast number of smart applications with the aim to bring ease and comfort into our lives. However, with the expansion of IoT applications, the number of security and privacy breaches has also increased, which brings into question the resilience of existing security and trust mechanisms. Furthermore, the contemporaneous centralized technology is posing significant challenges viz scalability, transparency and efficiency to wide range of IoT applications such as smart logistics, where millions of IoT devices need to be connected simultaneously. Alternatively, IOTA is a distributed ledger technology that offers resilient security and trust mechanisms and a decentralized architecture to overcome IoT impediments. IOTA has already been implemented in many applications and has clearly demonstrated its significance in real-world applications. Like any other technology, IOTA unfortunately also encounters security vulnerabilities. The purpose of this study is to explore and highlight security vulnerabilities of IOTA and simultaneously demonstrate the value of threat modeling in evaluating security vulnerabilities of distributed ledger technology. IOTA vulnerabilities are scrutinized in terms of feasibility and impact and we have also presented prevention techniques where applicable. To identify IOTA vulnerabilities, we have examined existing literature and online blogs. Literature available on this topic is very limited so far. As far as we know IOTA has barely been addressed in the traditional journals, conferences and books. In total we have identified six vulnerabilities. We used Common Vulnerability Scoring System (CVSS v3.0) to further categorize these vulnerabilities on the basis of their feasibility and impact.
format Online
Article
Text
id pubmed-7975986
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-79759862021-03-20 Threat Modeling—How to Visualize Attacks on IOTA? Ullah, Ikram de Roode, Gerard Meratnia, Nirvana Havinga, Paul Sensors (Basel) Article Internet of Things (IoT) has been deployed in a vast number of smart applications with the aim to bring ease and comfort into our lives. However, with the expansion of IoT applications, the number of security and privacy breaches has also increased, which brings into question the resilience of existing security and trust mechanisms. Furthermore, the contemporaneous centralized technology is posing significant challenges viz scalability, transparency and efficiency to wide range of IoT applications such as smart logistics, where millions of IoT devices need to be connected simultaneously. Alternatively, IOTA is a distributed ledger technology that offers resilient security and trust mechanisms and a decentralized architecture to overcome IoT impediments. IOTA has already been implemented in many applications and has clearly demonstrated its significance in real-world applications. Like any other technology, IOTA unfortunately also encounters security vulnerabilities. The purpose of this study is to explore and highlight security vulnerabilities of IOTA and simultaneously demonstrate the value of threat modeling in evaluating security vulnerabilities of distributed ledger technology. IOTA vulnerabilities are scrutinized in terms of feasibility and impact and we have also presented prevention techniques where applicable. To identify IOTA vulnerabilities, we have examined existing literature and online blogs. Literature available on this topic is very limited so far. As far as we know IOTA has barely been addressed in the traditional journals, conferences and books. In total we have identified six vulnerabilities. We used Common Vulnerability Scoring System (CVSS v3.0) to further categorize these vulnerabilities on the basis of their feasibility and impact. MDPI 2021-03-06 /pmc/articles/PMC7975986/ /pubmed/33800712 http://dx.doi.org/10.3390/s21051834 Text en © 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Ullah, Ikram
de Roode, Gerard
Meratnia, Nirvana
Havinga, Paul
Threat Modeling—How to Visualize Attacks on IOTA?
title Threat Modeling—How to Visualize Attacks on IOTA?
title_full Threat Modeling—How to Visualize Attacks on IOTA?
title_fullStr Threat Modeling—How to Visualize Attacks on IOTA?
title_full_unstemmed Threat Modeling—How to Visualize Attacks on IOTA?
title_short Threat Modeling—How to Visualize Attacks on IOTA?
title_sort threat modeling—how to visualize attacks on iota?
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7975986/
https://www.ncbi.nlm.nih.gov/pubmed/33800712
http://dx.doi.org/10.3390/s21051834
work_keys_str_mv AT ullahikram threatmodelinghowtovisualizeattacksoniota
AT deroodegerard threatmodelinghowtovisualizeattacksoniota
AT meratnianirvana threatmodelinghowtovisualizeattacksoniota
AT havingapaul threatmodelinghowtovisualizeattacksoniota