Technology architectures are rapidly undergoing fundamental changes to become compatible with IoT requirements. Technologies which aim to eliminate the centralized trust factor in transfer of data or value, such as the above example, often use Distributed Ledger Technology (DLT) to store data. In these systems, third party intermediaries become obsolete because they are replaced by a protocol and cryptography, which results in decentralized and distributed trust. An initial shift towards trustless systems of data and value transfer is made in the rise of blockchain-driven decentralized cryptocurrencies, such as Bitcoin. Next to the trust aspect, new technologies for data and value transfer should aim to achieve security, a sufficient level of privacy and low cost to be suitable for IoT applications. Such delegated and unverifiable trust is posing a major obstacle for an inclusive and permissionless economy. For example, existing banks’ ledgers used by private or government banks, which include financial records are trusted without any transparency nor the ability to verify the data or insight in how it is secured. Currently, value transfer depends largely on centralized technologies. Moreover, centralized technologies themselves face security and trust challenges like “central point of failure” and “third party involvement”. Traditional centralized technologies are challenged to meet the rapidly increasing demands of IoT and to respond to concerns such as mentioned above. IoT devices are required to transfer data and value in a sufficiently private and secure manner. Such an increase can raise questions regarding transparency, liability, privacy, trust and security. The increase in data generation is directly proportional to the increase in number of IoT devices. Moreover, the relevance and importance of big data is growing fast, data is constantly being collected and analyzed, leading to innovation and economic growth. The amount of data IoT devices generate is rapidly increasing. In the current era of Internet of Things (IoT) revolution, the overwhelming applications of IoT are evolving in many domains. We used Common Vulnerability Scoring System (CVSS v3.0) to further categorize these vulnerabilities on the basis of their feasibility and impact. In total we have identified six vulnerabilities. As far as we know IOTA has barely been addressed in the traditional journals, conferences and books.
![sentinel hl max replay attack sentinel hl max replay attack](https://img.alicdn.com/i1/2354678592/TB2tTWIbFXXXXXgXpXXXXXXXXXX_!!2354678592.jpg)
Literature available on this topic is very limited so far. To identify IOTA vulnerabilities, we have examined existing literature and online blogs. IOTA vulnerabilities are scrutinized in terms of feasibility and impact and we have also presented prevention techniques where applicable. The purpose of this study is to explore and highlight security vulnerabilities of IOTA and simultaneously demonstrate the value of threat modeling in evaluating security vulnerabilities of distributed ledger technology. Like any other technology, IOTA unfortunately also encounters security vulnerabilities.
![sentinel hl max replay attack sentinel hl max replay attack](https://img.alicdn.com/imgextra/i2/253522989/TB2Mij0XbwrBKNjSZPcXXXpapXa_!!253522989.jpg)
IOTA has already been implemented in many applications and has clearly demonstrated its significance in real-world applications. Alternatively, IOTA is a distributed ledger technology that offers resilient security and trust mechanisms and a decentralized architecture to overcome IoT impediments.
![sentinel hl max replay attack sentinel hl max replay attack](https://live.staticflickr.com/7431/15850597983_7b0f1d760b.jpg)
Furthermore, the contemporaneous centralized technology is posing significant challenges viz scalability, transparency and efficiency to wide range of IoT applications such as smart logistics, where millions of IoT devices need to be connected simultaneously. However, with the expansion of IoT applications, the number of security and privacy breaches has also increased, which brings into question the resilience of existing security and trust mechanisms. Internet of Things (IoT) has been deployed in a vast number of smart applications with the aim to bring ease and comfort into our lives.