Abstract

The Internet of Things (IoT) is changing the way consumers, businesses, and governments interact with the physical and cyber worlds. More often than not, IoT devices are designed for specific functional requirements or use cases without paying too much attention to security. Consequently, attackers usually compromise IoT devices with lax security to retrieve sensitive information such as encryption keys, user passwords, and sensitive URLs. Moreover, expanding IoT use cases and the exponential growth in connected smart devices significantly widen the attack surface. Despite efforts to deal with security problems, the security of IoT devices and the privacy of the data they collect and process are still areas of concern in research. Whenever vulnerabilities are discovered, device manufacturers are expected to release patches or new firmware to fix the vulnerabilities. There is a need to prioritize firmware attacks, because they enable the most high-impact threats that go beyond what is possible with traditional attacks. In IoT, delivering and deploying new firmware securely to affected devices remains a challenge. This study aims to develop a security model that employs Blockchain and the InterPlanentary File System (IPFS) to secure firmware transmission over a low data rate, constrained Long-Range Wide Area Network (LoRaWAN). The proposed security model ensures integrity, confidentiality, availability, and authentication and focuses on resource-constrained low-powered devices. To demonstrate the utility and applicability of the proposed model, a proof of concept was implemented and evaluated using low-powered devices. The experimental results show that the proposed model is feasible for constrained and low-powered LoRaWAN devices.

Highlights

  • Published: 7 January 2022The Internet of Things (IoT) is a growing system of connected devices with the ability to sense, collect, and transmit data over the internet

  • The results show that the CMAC consumes more Random-Access Memory (RAM) than the HMACSHA256 and does not verify faster than the HMAC-SHA256, this is because hash functions are usually faster than block ciphers

  • Most of the bugs and vulnerabilities are found while these devices are in the field, it is required that security measures are taken to mitigate the vulnerabilities

Read more

Summary

Introduction

Published: 7 January 2022The Internet of Things (IoT) is a growing system of connected devices with the ability to sense, collect, and transmit data over the internet. To participate in communication networks to send and receive data, IoT devices are usually equipped with either Short-Range or Long-Range communication technologies [2]. Attacks against devices stand asFirmware some ofUpdates the highest impact threats facing modern organizations. Attacks against deshows that firmware attacks are onare thenecessary rise, and in businesses are not stand as some of the highest impact threats facing modern organizations. And September 2021, health sciences sectors accounted for the highest numbers of security incidents followed which accounted for [16]

Objectives
Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call