7 research outputs found

    Survey on data aggregation based security attacks in wireless sensor network

    Get PDF
    Wireless sensor network (WSN) has applications in military, health care, environmental monitoring, infrastructure, industrial and commercial applications. The WSN is expected to maintain data integrity in all its network operations. However, due to the nature of wireless connectivity, WSN is prone to various attacks that alter or steal the data exchanged between the nodes. These attacks can disrupt the network processes and also the accuracy of its results. In this survey paper, we have reviewed various attacks available in the literature till date. We have also listed existing methods that focus on data aggregation based security mechanisms in WSN to counter the attacks. We have classified and compared these methods owing to their encryption techniques. This paper intends to support researchers to understand the basic attacks prevalent in WSN and schemes to counter such attacks

    A Smart Contract Blockchain Penetration Testing Framework

    Get PDF
    Likened to old-style contracts smart agreements motorized by blockchain ensure that deal processes are real safe then well-organized Without the need aimed at third-party mediators like lawyers smart contracts enable transparent processes cost-effectiveness time efficiency and trust lessness While old-style cybersecurity attacks on keen agreement requests can be thwarted by blockchain new threats and attack vectors are constantly emerging which affect blockchain in a manner alike toward additional web and application-based systems Organizations can develop and use the technology securely with connected infrastructure by using effective blockchain testing However the authors discovered throughout the sequence of their investigate that Blockchain technology has security issues like permanent dealings insufficient access and ineffective plans Web portals and other applications do not contain attack vectors like these This study introduces a brand new penetration testing framework for decentralized apps and clever contracts Results from the suggested penetration-testing methodology were com-pared by those from automatic diffusion examination scanners by the authors The findings revealed gaps in vulnerabilities that were not disclosed during routine pen testin

    Detecting Sybil Attack in Blockchain and Preventing through Universal Unique Identifier in Health Care Sector for privacy preservation

    Get PDF
    Health care data requires data secrecy, confidentiality, and distribution through public networks. Blockchain is the latest and most secure framework through which health care data can be transferred on the public network. Blockchain has gained attention in recent year’s due to its decentralized, distributed, and immutable ledger framework. However, Blockchain is also susceptible to many attacks in the permission less network, one such attack is known as Sybil attack, where several malicious nodes are created by the single node and gain multiple undue advantages over the network. In this research work, the Blockchain network is created using the smart contract method which gets hampered due to Sybil attack. Thus, a novel method is proposed to prevent Sybil attack in the network for privacy preservation. Universal Unique Identifier code is used for identification and prevention of the Sybil attack in the self-created networks. Results depict that proposed method correctly identifies the chances of attack and the prevention from the attack. The approach has been evaluated on performance metrics namely, true positive rate and accuracy which were attained as 87.5 % and 91% respectively, in the small network. This demonstrates that the proposed work attains improved results as compared to other latest available methods
    corecore