Threat Modeling-How to Visualize Attacks on IOTA?

Sensors (Basel)

Pervasive Systems Group, Department of Computer Science, University of Twente Enschede, 7522 NB Enschede, The Netherlands.

Published: March 2021

Internet of Things (IoT) has been deployed in a vast number of smart applications with the aim to bring ease and comfort into our lives. However, with the expansion of IoT applications, the number of security and privacy breaches has also increased, which brings into question the resilience of existing security and trust mechanisms. Furthermore, the contemporaneous centralized technology is posing significant challenges viz scalability, transparency and efficiency to wide range of IoT applications such as smart logistics, where millions of IoT devices need to be connected simultaneously. Alternatively, IOTA is a distributed ledger technology that offers resilient security and trust mechanisms and a decentralized architecture to overcome IoT impediments. IOTA has already been implemented in many applications and has clearly demonstrated its significance in real-world applications. Like any other technology, IOTA unfortunately also encounters security vulnerabilities. The purpose of this study is to explore and highlight security vulnerabilities of IOTA and simultaneously demonstrate the value of threat modeling in evaluating security vulnerabilities of distributed ledger technology. IOTA vulnerabilities are scrutinized in terms of feasibility and impact and we have also presented prevention techniques where applicable. To identify IOTA vulnerabilities, we have examined existing literature and online blogs. Literature available on this topic is very limited so far. As far as we know IOTA has barely been addressed in the traditional journals, conferences and books. In total we have identified six vulnerabilities. We used Common Vulnerability Scoring System (CVSS v3.0) to further categorize these vulnerabilities on the basis of their feasibility and impact.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC7975986PMC
http://dx.doi.org/10.3390/s21051834DOI Listing

Publication Analysis

Top Keywords

security vulnerabilities
12
iot applications
8
security trust
8
trust mechanisms
8
distributed ledger
8
ledger technology
8
technology iota
8
iota vulnerabilities
8
feasibility impact
8
iota
7

Similar Publications

Community health workers (CHWs) are the backbone of strong primary healthcare systems. If properly supported, they can add significant value to access to healthcare service delivery. Yet, despite their proven effectiveness globally, systemwide support for CHWs remains sub-optimal.

View Article and Find Full Text PDF

Background Women's psychological well-being (PWB) is influenced by various factors, including their occupational status and social roles. In India, where traditional and modern roles often intersect, understanding the PWB of homemakers and employed women is crucial for developing targeted mental health interventions. This study aimed to compare the overall and domain-specific PWB between homemakers and employed women in the Perambalur district, Tamil Nadu, using the 18-item Ryff's PWB Scale (PWBS).

View Article and Find Full Text PDF

This study investigates the feasibility and effectiveness of integrating Attribute-Based Encryption (ABE) into smart healthcare networks, with a particular focus on its role in enhancing anti-corruption mechanisms. The study provides a comprehensive analysis of current vulnerabilities in these networks, identifying potential data security risks. An anti-corruption mechanism is designed to ensure data integrity and reliability.

View Article and Find Full Text PDF

Exposure to multiple heavy metals associated with levels of inflammatory cytokines in workers in vulnerable conditions.

Int Arch Occup Environ Health

January 2025

Coordination for the Innovation and Application of Science and Technology (CIACYT), Autonomous University of San Luis Potosi, Sierra Leona Avenue No. 550, Lomas Second Section, San Luis Potosi, C.P. 78210, SLP, Mexico.

Purpose: Individuals in occupational environments are particularly susceptible to the impacts of pollutants; making it crucial to assess systemic inflammation markers. The study aimed to evaluate the immune response to inflammation through the assessment of a cytokine profile in individuals working in vulnerable conditions exposed to heavy metals.

Methods: A total of 137 adults participated in this study from three work environments: brickyards, waste scavenging and quarries.

View Article and Find Full Text PDF

Mobile Ad Hoc Networks (MANETs) are increasingly replacing conventional communication systems due to their decentralized and dynamic nature. However, their wireless architecture makes them highly vulnerable to flooding attacks, which can disrupt communication, deplete energy resources, and degrade network performance. This study presents a novel hybrid deep learning approach integrating Convolutional Neural Networks (CNN) with Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU) architectures to effectively detect and mitigate flooding attacks in MANETs.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!