ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

IOT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.10, No. 4)

Publication Date:

Authors : ; ; ;

Page : 17-21

Keywords : Jamming attacks; HTTP; IOT Security;

Source : Downloadexternal Find it from : Google Scholarexternal


Application Layer Distributed Denial of Service (DDoS) attacks are very challenging to detect and mitigate. HTTP jamming, XML attack, DNS attacks, etc, are the various possible application layer attacks. The HTTP jamming is the most common and renowned application layer attack. There are various research solutions proposed by validating against HTTP jamming using tools such as Golden Eye, LOIC, proprietary tools, etc. The similar characteristics of the real Time HTTP jamming attack will not be exhibited by the HTTP jamming attacks. Various methods were used to defend these attacks based on distributed schemes with certain difficulties to count the packets or duplicates sent by a node due to lack of communication infrastructure. In order to mitigate packet flood and replica flood attacks, two limits are used respectively. The claim-carry-and- check will notice the violation of both the limits easily. The inconsistency check against full claims is trivial. This is applicable to work in a distributed system. It will tolerate a little number of attackers for collision.

Last modified: 2021-04-15 21:49:22