4.6 Article

Threat Modeling-How to Visualize Attacks on IOTA?

Journal

SENSORS
Volume 21, Issue 5, Pages -

Publisher

MDPI
DOI: 10.3390/s21051834

Keywords

IoT; blockchain; IOTA; decentralization; vulnerabilities; CVSS v3; 0

Funding

  1. EFRO, OP Oost program in the context of Countdown project

Ask authors/readers for more resources

The Internet of Things (IoT) has been widely deployed in smart applications, but the increasing number of security and privacy breaches poses challenges to existing security mechanisms. IOTA, as a distributed ledger technology, provides robust security mechanisms and decentralized architecture to overcome IoT obstacles, despite encountering security vulnerabilities. Preventive measures can be taken to address these vulnerabilities.
Internet of Things (IoT) has been deployed in a vast number of smart applications with the aim to bring ease and comfort into our lives. However, with the expansion of IoT applications, the number of security and privacy breaches has also increased, which brings into question the resilience of existing security and trust mechanisms. Furthermore, the contemporaneous centralized technology is posing significant challenges viz scalability, transparency and efficiency to wide range of IoT applications such as smart logistics, where millions of IoT devices need to be connected simultaneously. Alternatively, IOTA is a distributed ledger technology that offers resilient security and trust mechanisms and a decentralized architecture to overcome IoT impediments. IOTA has already been implemented in many applications and has clearly demonstrated its significance in real-world applications. Like any other technology, IOTA unfortunately also encounters security vulnerabilities. The purpose of this study is to explore and highlight security vulnerabilities of IOTA and simultaneously demonstrate the value of threat modeling in evaluating security vulnerabilities of distributed ledger technology. IOTA vulnerabilities are scrutinized in terms of feasibility and impact and we have also presented prevention techniques where applicable. To identify IOTA vulnerabilities, we have examined existing literature and online blogs. Literature available on this topic is very limited so far. As far as we know IOTA has barely been addressed in the traditional journals, conferences and books. In total we have identified six vulnerabilities. We used Common Vulnerability Scoring System (CVSS v3.0) to further categorize these vulnerabilities on the basis of their feasibility and impact.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available