Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution by Ziska Fields

Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution by Ziska Fields

Author:Ziska Fields
Language: eng
Format: epub
Publisher: IGI Global


IoT solutions are built with advanced features for degrading cyber threat and safeguarding IoT infrastructure. This method also warrants that IoT devices are properly configured to provide continuous system operability (Marsan, 2015). Vendors often introduce security measures for guarding IoT infrastructure solutions from cyber risks/threats. The next section discusses byzantine fault tolerance and its specifics related to cyber resilience domain. Byzantine Fault Tolerance (BFT) is a method that plays a significant role in cyber resilience capabilities (Olstik, 2014; Schneier, n.d.). This solution stems from security issues: vulnerabilities, methods and techniques applicable to IoT global-scale. The next section aims at byzantine fault tolerance and how this technology may apply to cyber resilience. Besides, BFT is also a process aiming to protect IoT objects against Byzantine’s General (BG) attacks. Distributed systems are complex, autonomous and independently deployed to IoT infrastructure (Geer, 2014; Wind River, 2015). This includes IoT autonomous devices and intelligent systems, which do not interact with each other. Nevertheless, autonomous objects are self-governed and are designed to interact with other IoT devices. Such devices and systems may also lead to accidental malfunctions. Any device or system failures and remediation can be exhibited using the classic BG issues. BG methods form consents for coordinating many actions. These activities may be difficult to implement, if only connected as autonomous and independent systems. Such lack of interoperability may be due to limited technical specifications. (Geer, 2014). BFT attacks may be launched asynchronously or via distributed IoT computing environments. In BFT environment, both ‘hybrid and practical methods’ continue to pose key security challenges. In addition, BFT security issues are based on consensus voting algorithms. The authors conclude that, BFT affects the resilience of IoT security devices. Having the ability to degrade any system redundancy and introduce random hardware or application failures on IoT infrastructure may be one of the BFT challenges affecting organizations.

Lacking best practices and advanced security solutions to protect and mitigate infrastructure security vulnerabilities, would further pose many challenges on the network. The following sections discuss DDoS attacks (Cyber Resilience, 2016). These are methods and techniques that attackers use to send malicious codes, to single/multiple devices or systems (Kim et al, 2012).

Use Case

Decentralized IoT environments are subject to consensus building based on the vulnerability for the BG problems. These activities also cyber-attackers’ opportunities for launching random attacks on IoT systems (Kim et al, 2012). These events may be initiated through Wireless Fidelity platforms (Wi-Fi) or dedicated network solutions. Using these devices hackers may be able to attack single/multiple systems (Cyber Resilience, 2016). For example, attackers can indiscriminately modify password characters (Kim et al, 2012). Through this process attackers are often able to crack passwords by randomly generating/sending out encrypted packets, which would flood the entire network (Geer, 2014). After gaining complete access, the attackers may erase/adjust computer logs and thus, exploiting consensus building. Besides, any attacks against single or multiple targeted computers can be launched via a DoS or DDoS (Kim et al, 2012; UDOSA, 2013).

Denial of Service

DoS attacks are a type of cyber-attack making a system unreachable.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.