Protection against Packet Fragmentation Attacks at 6LoWPAN Adaptation Layer

被引:33
|
作者
Kim, HyunGon [1 ]
机构
[1] Mokpo Natl Univ, Dept Informat Secur, Muan Gun 534729, Jeonnam, South Korea
关键词
6LoWPAN; Fragmentation; Replay attack; Nonce; Timestamp;
D O I
10.1109/ICHIT.2008.261
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The IPv6 over low-power wireless personal area network (6LoWPAN) typically includes devices that work together to connect the physical environment to real-world applications, e.g., wireless sensors. However, since, in some cases, security may be requested at the application layer as need, and then, security problems should be identified such as security threats model, threats analysis, attack scenarios, and light-weight security algorithms etc. This paper presents an analysis of security threats to the 6LoWPAN adaptation layer from the point of view of IP packet fragmentation attacks. And to protect replay attacks being occurred by IP packet fragmentations and to guarantee packet freshness, we also propose a protection mechanism against packet fragmentation attacks. The mechanism uses Timestamp and Nonce options that are added to the fragmented packets at the 6LoWPAN adaptation layer.
引用
收藏
页码:796 / 801
页数:6
相关论文
共 50 条
  • [1] Development of 6LoWPAN Adaptation Layer with Fragmentation and Reassembly Mechanisms by Using Qualnet Simulator
    Chan, Chiaw Wei
    Ee, Gee Keng
    Chee Kyun Ng
    Hashim, Fazirulhisyam
    Noordin, Nor Kamariah
    [J]. INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT IV, 2011, 254 : 199 - 212
  • [2] OPTIMAL PACKET FRAGMENTATION SCHEME FOR RELIABLE AND ENERGY-EFFICIENT PACKET DELIVERY IN 6LoWPAN
    Peng, Jing
    Chi, Kaikai
    Zhu, Yihua
    Wang, Jing
    [J]. 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 1106 - 1111
  • [3] Fragmentation Attacks and Countermeasures on 6LoWPAN Internet of Things Networks: Survey and Simulation
    Alyami, Sarah
    Alharbi, Randah
    Azzedin, Farag
    [J]. SENSORS, 2022, 22 (24)
  • [4] 6LoWPAN Adaptation Protocol for IPv6 Packet Transmission Over NFC Device
    Park, Junhwan
    Lee, Sungwon
    Bouk, Safdar H.
    Kim, Dongkyun
    Hong, YongGeun
    [J]. 2015 SEVENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, 2015, : 541 - 543
  • [5] SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in 6LoWPAN
    Hossain, Mahmud
    Karim, Yasser
    Hasan, Ragib
    [J]. PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, : 307 - 318
  • [6] A Survey : Attacks on RPL and 6LoWPAN in IoT
    Pongle, Pavan
    Chavan, Gurunath
    [J]. 2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [7] M/I Adaptation Layer Network Protocol for IoT Based on 6LoWPAN
    Qian, Zhihong
    Wang, Yijun
    Wang, Xue
    Zhu, Shuang
    [J]. INTERNET OF THINGS-BK, 2012, 312 : 208 - 215
  • [8] Defragmenting the 6LoWPAN Fragmentation Landscape: A Performance Evaluation
    Bruniaux, Amaury
    Koutsiamanis, Remous-Aris
    Papadopoulos, Georgios Z.
    Montavont, Nicolas
    [J]. SENSORS, 2021, 21 (05) : 1 - 20
  • [9] SIMULATING RPL ATTACKS IN 6LOWPAN FOR DETECTION PURPOSES
    Preda, Marius
    Patriciu, Victor-Valeriu
    [J]. 2020 13TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2020, : 239 - 245
  • [10] Per Packet Flow Anonymization in 6LoWPAN IoT Networks
    Kouachi, Asma Iman
    Sahraoui, Somia
    Bachir, Abdelmalik
    [J]. 2018 6TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2018, : 180 - 186