IOT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.10, No. 4)Publication Date: 2021-04-30
Authors : S. E. Viswapriya; S. Dinesh; D. Viswa Ravi Teja;
Page : 17-21
Keywords : Jamming attacks; HTTP; IOT Security;
Abstract
Application Layer Distributed Denial of Service (DDoS) attacks are very challenging to detect and mitigate. HTTP jamming, XML attack, DNS attacks, etc, are the various possible application layer attacks. The HTTP jamming is the most common and renowned application layer attack. There are various research solutions proposed by validating against HTTP jamming using tools such as Golden Eye, LOIC, proprietary tools, etc. The similar characteristics of the real Time HTTP jamming attack will not be exhibited by the HTTP jamming attacks. Various methods were used to defend these attacks based on distributed schemes with certain difficulties to count the packets or duplicates sent by a node due to lack of communication infrastructure. In order to mitigate packet flood and replica flood attacks, two limits are used respectively. The claim-carry-and- check will notice the violation of both the limits easily. The inconsistency check against full claims is trivial. This is applicable to work in a distributed system. It will tolerate a little number of attackers for collision.
Other Latest Articles
- Modern Library as a Center of an Informal Education
- Social Networks as a Means of Promoting Reference and Bibliographic Products and Services in the System of National Communications
- Regulatory and Methodological Base of Libraries in Ukraine: Sources for Study
- Conceptual Basis of Strategic Development of National Scientific Library and Information Complex: History, Principles, Priorities
- Monographic Publications of the National Academy of Sciences of Ukraine (1991–2019): Trends, Publishers, Statistics
Last modified: 2021-04-15 21:49:22