Full text

Turn on search term navigation

© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.

Abstract

The internet of things (IoT) is prone to various types of denial of service (DoS) attacks due to their resource-constrained nature. Extensive research efforts have been dedicated to securing these systems, but various vulnerabilities remain. Notably, it is challenging to maintain the confidentiality, integrity, and availability of mobile ad hoc networks due to limited connectivity and dynamic topology. As critical infrastructure including smart grids, industrial control, and intelligent transportation systems is reliant on WSNs and IoT, research efforts that forensically investigate and analyze the cybercrimes in IoT and WSNs are imperative. When a security failure occurs, the causes, vulnerabilities, and facts behind the failure need to be revealed and examined to improve the security of these systems. This research forensically investigates the performance of the ad hoc IoT networks using the ad hoc on-demand distance vector (AODV) routing protocol under the blackhole attack, which is a type of denial of service attack detrimental to IoT networks. This work also examines the traffic patterns in the network and nodes to assess the attack damage and conducts vulnerability analysis of the protocol to carry out digital forensic (DF) investigations. It further reconstructs the networks under different modes and parameters to verify the analysis and provide suggestions to design roubust routing protocols.

Details

Title
Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things
Author
Ahmad, Hasan 1   VIAFID ORCID Logo  ; Khan, Muazzam A 2   VIAFID ORCID Logo  ; Balawal Shabir 3 ; Arslan Munir 4   VIAFID ORCID Logo  ; Asad Waqar Malik 5   VIAFID ORCID Logo  ; Anwar, Zahid 6   VIAFID ORCID Logo  ; Ahmad, Jawad 7   VIAFID ORCID Logo 

 Department of Computing, School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology (NUST), Islamabad 44000, Pakistan; Faculty of Computing, The Islamia University of Bahawalpur, Bahawalpur 63100, Pakistan 
 Department of Computer Science, Quaid-i-Azam University, Islamabad 15320, Pakistan 
 Department of Computing, School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology (NUST), Islamabad 44000, Pakistan; Department of Cyber Security, Air University, Islamabad 44000, Pakistan 
 Department of Computer Science, Kansas State University, Manhattan, KS 66506, USA 
 Department of Computing, School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology (NUST), Islamabad 44000, Pakistan 
 Department of Computer Science, North Dakota State University, Fargo, ND 58105, USA 
 School of Computing, Edinburgh Napier University, Edinburgh EH10 5DT, UK 
First page
11442
Publication year
2022
Publication date
2022
Publisher
MDPI AG
e-ISSN
20763417
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
2739425701
Copyright
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.