Nesnelerin İnterneti (IoT) ve Kablosuz Algılayıcı Ağların Güvenliğine Yapılan Saldırıların Tespit Edilmesi ve Önlenmesi

IoT (Internet of Things) ya da diğer adıyla Nesnelerin İnterneti kavramı, internete bağlanan ve diğer cihazlarla iletişimde olan her nesneyi kapsamaktadır. Artık hayatımızın bir parçası haline gelecek otonom araçlar, akıllı buzdolabılar, akıllı çamaşır makineleri, akıllı tost makineleri, akıllı saatler gibi birçok IoT cihazı birbiriyle farklı kablosuz ağ teknolojilerini kullanarak haberleşebilirler.  IoT cihazların birçok kritik alanda kullanılmasıyla birlikte IoT güveniğine karşı yapılan saldırılar artmıştır. Bu saldırılar IoT katmanlarına yapılarak veri gizliliği, veri bütünlüğü, veri tazeliği, veri erişilebilirliği, kimlik doğrulama gibi kriterler ihlal edilebilmektedir. Bu saldırıları önlemek amacıyla birçok güvenlik çözümü önerilmiştir, fakat sınırlı enerji,  kısıtlı batarya süresi, zayıf işlemci gücü ve sınırlı hafıza gibi sınırlamalardan dolayı düşük güçlü IoT cihazlar üzerinde geleneksel güvenlik yöntemlerinin uygulanması mümkün değildir. Bu çalışmada, IoT cihazların güvenliğini tehdit eden saldırılar incelenerek, ağ katmanlarına göre detaylı şekilde  sınıflandırılmış ve savunma teknikleri önerilmiştir.

Detection and Prevention of Attacks on the Internet of Things (IoT) and Wireless Sensor Networks

Internet of Things (IoT) covers every object that connects to the Internet and communicates with other devices. Many IoT devices, such as autonomous vehicles, smart refrigerators, smart washing machines, smart toasters, smart watches that can become part of our lives and they can communicate with each other using different wireless network technologies. Because of using IoT devices in many critical areas, attacks against IoT security have increased. By making these attacks on IoT layers, criteria such as data privacy, data integrity, data freshness, data accessibility and authentication can be violated. Some security solutions have been proposed to prevent these attacks, but it is not possible to apply traditional security methods on low-power IoT devices due to some constraints such as limited energy, limited battery time, limited computational power and limited memory. In this paper, attacks that threaten the security of IoT devices are examined and classified according to network layers and defense techniques are proposed.

___

  • I. Yaqoob, E. Ahmed, I. Hashem, A. Ahmed, A. Gani, M. Imran, M. Guizani, “Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges”, IEEE Wireless Communications, 10-16, 2017.
  • J. Granjal, E. Monteiro, J.S. Silva, “Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues”, IEEE Communication Surveys & Tutorials”, 7(3), 1294-1312, 2015.
  • İnternet: Gartner, “Gartner Identifies Top 10 Strategic IoT Technologies and Trends” https://www.gartner.com/en/newsroom/press-releases/2018-11-07-gartner-identifies-top-10-strategic-iot-technologies-and-trends. [Erişim Tarihi: 10.08.2019]
  • İnternet: Cisco,” Cisco Visual Networking Index: Forecast and Trends, 2017–2022 White Paper” https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white-paper-c11-741490.html, [Erişim Tarihi: 10.08.2019]
  • I. Tomic, J. A. McCann, “A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols”, IEEE Internet of Things Journal, 1-13, 2017.
  • V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, B. Sikdar, “A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures”, IEEE Access, 82721-82740, 2019.
  • İnternet: A.K. Sikder, G. Petracca, H. Aksu, T. Jaeger, A. S. Uluagac, “A Survey on Sensor-Based Threats to Internet-of-Things (IoT) Devices and Applications”, ArXiv Preprint, https://arxiv.org/abs/1802.02041, 2018.
  • K. Chelli, “Security Issues in Wireless Sensor Networks: Attacks and Countermeasures”, Proceedings of the World Congress on Engineering, 2015.
  • S. Bisvas, S. Adhikari, “A Survey of Security Attacks, Defenses and Security Mechanisms in Wireless Sensor Network”, International Journal of Computer Applications, 2015.
  • I. Korkmaz, O. Dagdeviren, F. Tekbacak, M. Emin Dalkilic, “A Survey on Security in Wireless Sensor Networks:Attacks and Defense Mechanisms”, 223-251, Theory and Practice of Cryptography Solutions for Secure Information Systems, IGI Global, 2013.
  • C. Yadav, Raksha K., S.S. Hegde, Anjana N.C, Sandeep Kumar E, “Security Techniques in Wireless Sensor Networks : A Survey”, International Journal of Advanced Research in Computer and Communication Engineering, 2015.
  • J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, “Wireless Sensor Network Security: A Survey”, Security in Distributed, Grid and Pervasive Computing, CRC Press, 2006.
  • Y.Wang, G.Attebury, B.Ramamurthy, “A Survey of Security Issues In Wireless Sensor Networks”, IEEE Communications Survey&Tutorials, 2006.
  • X. Chen, K. Makki, K. Yen, and N. Pissinou, “Sensor Network Security: A Survey”, IEEE Communication Survey&Tutorials, 2009.
  • W. Xu, K. Ma, W. Trappe, ve Y. Zhang “Jamming Sensor Networks:Attack and Defense Strategies”, Rutgers University, IEEE Network, 2006.
  • A. Mpitziopoulos, D. Gavalas, G. Pantziou, C. Konstantopoulos, “Defending Wireless Sensor Networks from Jamming Attacks”, 2007.
  • Y. Ettouijri, Y. Salij-Alj,"Countermeasures against Energy-Efficient Jamming on Wireless Sensor Networks",IEEE, 2014.
  • C. Karlof, D.Wagner, “Security Wireless Sensor Networks Security”, Ad hoc networks, 2004.
  • S. Babar, A.Stango, N. R. Prasad, J. Sen, R. Prasad, “Proposed Embedded Security Framework for Internet of Things (IoT)”, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011.
  • İnternet: R.Pacalet, “Hardware Security: Probing Attacks”, Telecom ParisTech, 2019,http://soc.eurecom.fr/HWSec/lectures/probing/main.pdf [Erişim Tarihi: 22.08.2019]
  • W. Hu, J. Hider, D. Williams, A. Filipi, J. W. Davidson, D. Evans, J. C. Knight, A. N. Tuong, J. Rowanhill, “Secure and Practical Defense Against Code-injection Attacks using Software Dynamic Translation”, VEE '06 Proceedings of the 2nd international conference on Virtual Execution Environments, 2006.
  • O. Acıiçmez, J.-P. Seifert, Ç. K. Koç, “Predicting Secret Keys via Branch Prediction",CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology, pp. 225-242, 2006.
  • İnternet: T. Bhattasali, R. Chaki, S. Sanyal, “Sleep Deprivation Attack Detection in Wireless Sensor Network”, ArXiv Preprint, https://arxiv.org/ftp/arxiv/papers/1203/1203.0231.pdf, 2012
  • V.-L. Nguyen, P. Lin, R. Hwang, “Energy Depletion Attacks in Low Power Wireless Networks”, IEEE Access Journal(Open Access), 7, 51915-51932, 2019
  • A. Hosamsoleman, A. Payandeh, N. Mozayyani, SaeedSedighianKashi “Detection Collision Attacks In Wireless Sensor Network Usingrule-Based Packet Flow Rate”, International Journal of Engineering Research and Applications (IJERA), 2013.
  • M. Chowdhury, M. F. Kader and Asaduzzaman, “Security Issues in Wireless Sensor Networks: A Survey”, International Journal of Future Generation Communication and Networking, 2013.
  • Y. W. Law, L. v. Hoesel, J. Doumen, P. Hartel, and P. Havinga, "Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols," presented at the Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, Alexandria, VA, USA, 2005.
  • T. F. Abdelzaher, S. Prabh, R. Kiran, “On Real-time Capacity Limits of Multihop Wireless Sensor Networks”, IEEE Computer Society, 2004.
  • S. Radosavac, A.A. Crdenas, J.S. Baras, and G.V. Moustakides, ”Detecting IEEE 802.11 MAC Layer Misbehavior in Ad Hoc Networks: Robust Strategies against Individual and Colluding Attackers”, Journal of Computer Security, Security of Ad Hoc and Sensor Networks, vol.15, no.1, pp. 103-128, 2007.
  • R. Sokullu, I. Korkmaz, O. Dagdeviren, “GTS Attack: An IEEE 802.15.4 MAC Layer Attack in Wireless Sensor Networks”, International Journal On Advances in Internet Technology, 2009.
  • S. M. Sajjad, M. Yousaf, "Security Analysis of IEEE 802.15.4 MAC in the context of Internet of Things (IoT)", 2014 Conference on Information Assurance and Cyber Security (CIACS), 2014
  • Y.Xiao, S. Sethi, H. Chen, “Security services and enhancements in the IEEE 802.15.4 wireless sensor networks”, Global Telecommunications Conference, 2005. GLOBECOM '05. IEEE, 2005.
  • P. M. Pawar, R. H. Nielsen, N. R. Prasad, S. Ohmori and R. Prasad, “Behavioural Modelling of WSN MAC Layer Security Attacks: A Sequential UML Approach”, Journal of Cyber Security and Mobility, 2012.
  • D.R.Raymond, “Denial-of-Sleep Vulnerabilities and Defenses in Wireless Sensor Network MAC Protocols”, Phd Dissertation, Virginia Polytechnic Institute and State University, 2008.
  • Manju.V.C, Sasikumar. “Mitigation Of Replay Attack In Wireless Sensor Network”, Int. J. on Information Technology 2014.
  • M. Kamarei, A. Patoogy, M.Fazeli, M.J. Salehi, AT2A: Defending Unauthenticated Broadcast Attacks in Mobile Wireless Sensor Networks, International Journal of Electronics Communication and Computer Engineering, 2014.
  • A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. D. Tygar, “SPINS: Security Protocols for Sensor Networks”, Mobile Computing and Networking 2001.
  • A. Tayebi, S. Berber, A.Swain, "Wireless Sensor Network Attacks:An Overview and Critical Analysis", Seventh International Conference on Sensing Technology, 2013.
  • K. Saghar, D. Kendall, A. Bouridane, “RAEED: A solution for HELLO flood attack”, 12th International Bhurban Conference on Applied Sciences & Technology (IBCAST), 2015.
  • Deng, R. Han, and S. Mishra. “INSENS: Intrusion-tolerant routing for wireless sensor networks”, Elsevier Journal on Computer Communications, Special Issue on Dependable Wireless Sensor Networks, v.29, 216–230, 2005.
  • S. Zhu, S.Setia, S. Sajodia, “LEAP: Efficient Security Mechanisms for LargeScale Distributed Sensor Networks”, ACM, 2004.
  • S. Magotra, K.Kumar, "Detection of HELLO flood Attack on LEACH Protocol", 2014 IEEE International Advance Computing Conference (IACC), 2014.
  • R. Lakhanpal, S. Sharma , Detection & Prevention of Sybil Attack in Ad hoc Network using Hybrid MAP & MAC Technique, 2016 International Conference on Computation of Power, Energy Information and Communication, 2016.
  • E. C. H. Ngai, J. Liu and M. R. Lyu, “On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks”, IEEE 2006.
  • G.Kibirige, C. Sanga, "A Survey on Detection of Sinkhole Attack in Wireless Sensor Network", International Journal of Computer Science and Information Security, Vol:13(5),pp:1-9, 2015.
  • D. M. Shila, T. Anjali, Defending selective forwarding attacks in WMNs, Electro/Information Technology, 2008.
  • D.Martins, H. Guyennet, “Wireless Sensor Network Attacks and Security Mechanisms - A short survey”, 2009.
  • S. Ali, M.A. Khan, J. Ahmad, A.W. Malik, A. Rehman, “Detection and Prevention of Black Hole Attacks in IoT & WSN”, 2018 Third International Conference on Fog and Mobile Edge Computing, 2018.
  • Y. Hu, A. Perrig, D.B. Johnson, “Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks”, Proceedings of IEEE INFOCOM, 2003
  • H. Chiu, K. Lui, “DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks”, Proceedings of Wireless Pervasive Computing, 2006.
  • I. Khalil, S. Bagchi, N.B. Shroff, “LiteWorp: Detection and Isolation of the Wormhole Attack in Static Multihop Wireless Networks”, Computer Networks, Vol.51(13), pp: 3750‐3772, 2007.
  • I. Khalil, S. Bagchi, N.B. Shroff, “MobiWorp: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks”, Proceedings of International Conference on Security and Privacy in Communication Networks, 2006.
  • J. Seo, G. Lee, “An Effective Wormhole Attack Defence Method for a Smart Meter Mesh Network in an Intelligent Power Grid”, Sage OpenSource Articles 2012, http://journals.sagepub.com/doi/full/10.5772/45995, Erişim Tarihi: 14.09.2018.
  • B. Parno, A. Perrig, and V. Gligor, “Distributed detection of node replication attacks in sensor networks”, 26th IEEE Symposium on Security and Privacy, 2005.
  • M. Conti, R. Di Pietro, L. V. Mancini, A. Mei, “A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks”, 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2007.
  • M. Zhang, V. Khanapure, S. Chen, and X. Xiao, “Memory efficient protocols for detecting node replication attacks in wireless sensor networks,” 17th IEEE International Conference on Network Protocols, 2009.
  • L. C. Ko, H. Y. Chen, G. R. Lin, “A neighbor-based detection scheme for wireless sensor networks against node replication attacks”, International Conference on Ultra Modern Telecommunications and Workshops, 2009.
  • W. T. Zhu, "Node Replication Attacks in Wireless Sensor Networks: Bypassing the Neighbor-Based Detection Scheme", IEEE 2011 International Conference on Network Computing and Information Security, 2011.
  • S. Abbas, M. Merabti, D. L. Jones, "Deterring Whitewashing Attacks in Reputation Based Schemes for Mobile Ad hoc Networks", IEEE 2010 IFIP Wireless Days Conference, 2010.
  • Y. L. Sun, Z. Han, W. Yu, K.J. R. Liu, "Attacks on Trust Evaluation in Distributed Networks", 2006 40th Annual Conference on Information Sciences and Systems IEEE, 2006.
  • S. Samreen, M.A. Jabbar, "Countermeasures for Conflicting Behavior Attack in a Trust Management Framework for a Mobile Ad hoc Network", 2017 IEEE International Conference on Computational Intelligence and Computing Research, 2017.
  • David R. Raymond, Scott F. Midkiff, “Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses”, IEEE CS Pervasive Computing pp. 74-79, 2008.
  • R. Sathish, D.R. Kumar, "Dynamic Detection of Clone Attack in Wireless Sensor Networks", IEEE 2013 International Conference on Communication Systems and Network Technologies, 2013.
  • A. Nasridinov, J.Y. Byun, Y.H. Park, "UNWRAP: An Approach on Wrapping-Attack Tolerant SOAP Messages", IEEE Second International Conference on Cloud and Green Computing, 2012.
  • L. Bossi, E. Bertino, S. R. Hussain, "A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection", 43(5), IEEE Transactions on Software Engineering, 2017.
  • S. O. Uwagbole, W. J. Buchanan, L. Fan, "Applied Machine Learning Predictive Analytics to SQL Injection Attack Detection and Prevention", 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017.
  • Y. Sun, D. He, “Model checking for the defense against cross-site scripting attacks”, IEEE Proceedings of the Computer Science & Service System (CSSS), 2012.
  • B. A. Khalaf, S. A. Mostafa, M. A. Mohammed, W. M. Abduallah, "Comprehensive Review of Artificial Intelligence and Statistical Approaches in Distributed Denial of Service Attack and Defense Methods", IEEE Access, April 2019.
  • O. Tas, F. Kiani, “A Survey of Attacks on Blockchain Technology”, International Journal of Informatics Technologies, 11(4), 369-382, 2018.
  • R. Spreitzer, “Pin skimming: Exploiting the ambient-light sensor in mobile devices,” in Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014.
  • İnternet: Z. Xu, S. Zhu, “SemaDroid: A Privacy-Aware Sensor Management Framework for Smartphones”, CODASPY (2015). http://www.cse.psu.edu/~sxz16/papers/semadroid.pdf [Erişim Tarihi: 16.08.2019]