Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things

被引:4
|
作者
Hasan, Ahmad [1 ,2 ]
Khan, Muazzam A. [3 ]
Shabir, Balawal [1 ,4 ]
Munir, Arslan [5 ]
Malik, Asad Waqar [1 ]
Anwar, Zahid [6 ]
Ahmad, Jawad [7 ]
机构
[1] Natl Univ Sci & Technol NUST, Sch Elect Engn & Comp Sci SEECS, Dept Comp, Islamabad 44000, Pakistan
[2] Islamia Univ Bahawalpur, Fac Comp, Bahawalpur 63100, Pakistan
[3] Quaid I Azam Univ, Dept Comp Sci, Islamabad 15320, Pakistan
[4] Air Univ, Dept Cyber Secur, Islamabad 44000, Pakistan
[5] Kansas State Univ, Dept Comp Sci, Manhattan, KS 66506 USA
[6] North Dakota State Univ, Dept Comp Sci, Fargo, ND 58105 USA
[7] Edinburgh Napier Univ, Sch Comp, Edinburgh EH10 5DT, Midlothian, Scotland
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 22期
关键词
digital forensics; computer forensics; blackhole attack; wireless sensor network; forensic analysis; internet of things; network simulator (NS3); INTERNET;
D O I
10.3390/app122211442
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The internet of things (IoT) is prone to various types of denial of service (DoS) attacks due to their resource-constrained nature. Extensive research efforts have been dedicated to securing these systems, but various vulnerabilities remain. Notably, it is challenging to maintain the confidentiality, integrity, and availability of mobile ad hoc networks due to limited connectivity and dynamic topology. As critical infrastructure including smart grids, industrial control, and intelligent transportation systems is reliant on WSNs and IoT, research efforts that forensically investigate and analyze the cybercrimes in IoT and WSNs are imperative. When a security failure occurs, the causes, vulnerabilities, and facts behind the failure need to be revealed and examined to improve the security of these systems. This research forensically investigates the performance of the ad hoc IoT networks using the ad hoc on-demand distance vector (AODV) routing protocol under the blackhole attack, which is a type of denial of service attack detrimental to IoT networks. This work also examines the traffic patterns in the network and nodes to assess the attack damage and conducts vulnerability analysis of the protocol to carry out digital forensic (DF) investigations. It further reconstructs the networks under different modes and parameters to verify the analysis and provide suggestions to design roubust routing protocols.
引用
收藏
页数:23
相关论文
共 50 条
  • [1] Wireless sensor networks and the Internet of Things
    Cama, Alejandro
    De la Hoz, Emiro
    Cama, Dora
    [J]. INGE CUC, 2012, 8 (01) : 163 - 172
  • [2] Wireless Sensor Networks and the Internet of Things
    Jiang, Yingtao
    Zhang, Lei
    Wang, Ling
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [3] Wireless Sensor Networks for the Internet of Things
    Zhan, Yongzhao
    Liu, Lu
    Wang, Liangmin
    Shen, Yulong
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [4] Blackhole attack Detection based on Trust Calculation Mechanism in Wireless Sensor Networks
    Revathi, A.
    Santhi, S. G.
    [J]. 2022 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL, COMPUTING, COMMUNICATION AND SUSTAINABLE TECHNOLOGIES (ICAECT), 2022,
  • [5] Analysis of dynamic topology wireless sensor networks for the internet of things (IoT)
    Kumar, Praveen R.
    Raj, Jennifer S.
    Smys, S.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (17)
  • [6] Coverage and Energy Efficiency Analysis of Wireless Sensor Networks for Internet of Things
    Imani, Amirhosein
    Eslami, Mohsen
    Haghighat, Javad
    [J]. 2022 CPSSI 4TH INTERNATIONAL SYMPOSIUM ON REAL-TIME AND EMBEDDED SYSTEMS AND TECHNOLOGIES (RTEST 2022), 2022,
  • [7] Cognitive Radio Networks for Internet of Things and Wireless Sensor Networks
    Yu, Heejung
    Zikria, Yousaf Bin
    [J]. SENSORS, 2020, 20 (18) : 1 - 6
  • [8] Debugging the Internet of Things The Case of Wireless Sensor Networks
    Eugster, Patrick
    Sundaram, Vinaitheerthan
    Zhang, Xiangyu
    [J]. IEEE SOFTWARE, 2015, 32 (01) : 38 - 49
  • [9] An Integrated Exploration on Internet of Things and Wireless Sensor Networks
    Sharma, Saurabh
    Verma, Vinod Kumar
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (03) : 2735 - 2770
  • [10] An Integrated Exploration on Internet of Things and Wireless Sensor Networks
    Saurabh Sharma
    Vinod Kumar Verma
    [J]. Wireless Personal Communications, 2022, 124 : 2735 - 2770