Exploiting the Remote Server Access Support of CoAP Protocol

被引:11
|
作者
Roselin, Annie Gilda [1 ,2 ]
Nanda, Priyadarsi [3 ]
Nepal, Surya [2 ]
He, Xiangjian [3 ]
Wright, Jarod [4 ]
机构
[1] Univ Technol Sydney, Dept Elect & Data Engn, Ultimo, NSW 2007, Australia
[2] Commonwealth Sci & Ind Res Org, Data61, Marsfield, NSW 2122, Australia
[3] Univ Technol Sydney, Dept Elect & Data Engn, Ultimo, NSW 2007, Australia
[4] Univ Wollongong, Wollongong, NSW 2522, Australia
关键词
6LoWPAN; constrained application protocol (CoAP); Internet of Things (IoT) security; machine Learning (ML) model; off-path attack; INTERNET;
D O I
10.1109/JIOT.2019.2942085
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The constrained application protocol (CoAP) is a specially designed Web transfer protocol for use with constrained nodes and low-power networks. The widely available CoAP implementations have failed to validate the remote CoAP clients. Each CoAP client generates a random source port number when communicating with the CoAP server. However, we observe that in such implementations it is difficult to distinguish the regular packet and the malicious packet, opening a door for a potential off-path attack. The off-path attack is considered a weak attack on a constrained network and has received a less attention from the research community. However, the consequences resulting from such an attack cannot be ignored in practice. In this article, we exploit the combination of IP spoofing vulnerability and the remote server access support of CoAP is to be launch an off-path attack. The attacker injects a fake request message to change the credentials of the 6LoWPAN smart door keypad lock system. This creates a request spoofing vulnerability in CoAP, and the attacker exploits this vulnerability to gain full access to the system. Through our implementation, we demonstrated the feasibility of the attack scenario on the 6LoWPAN-CoAP network using smart door keypad lock. We proposed a machine learning (ML)-based approach to mitigate such attacks. To the best of our knowledge, we believe that this is the first article to analyze the remote CoAP server access support and request spoofing vulnerability of CoAP to launch an off-path attack and demonstrate how an ML-based approach can be deployed to prevent such attacks.
引用
收藏
页码:9338 / 9349
页数:12
相关论文
共 50 条
  • [1] Server-driven-type communication protocol with data segmentation for remote database access
    Yamamoto, Hiroshi
    Tsuji, Hiroshi
    ELECTRICAL ENGINEERING IN JAPAN, 2007, 159 (02) : 64 - 71
  • [2] Secure access to remote server services
    Havranek, Martin
    AGRARIAN PERSPECTIVES XVIII, VOLS 1 AND 2, 2009, : 741 - 744
  • [3] Support Context-Adaptation in the Constrained Application Protocol (CoAP)
    Dong, Yuji
    Wan, Kaiyu
    Yue, Yong
    Huang, Xin
    SERVICE-ORIENTED COMPUTING, ICSOC 2018, 2019, 11434 : 294 - 305
  • [4] Implementation of Centralized Lab of an Embedded Web Server using CoAP Protocol on cloud computing
    Rajurikar, Neha S.
    Kulkarni, Smita V.
    Patane, R. D.
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 2267 - 2272
  • [5] Secure remote access to an internal Web server
    Gilmore, C
    Kormann, D
    Rubin, AD
    IEEE NETWORK, 1999, 13 (06): : 31 - 37
  • [6] Remote access server that can keep secrets
    Cholewka, Kathleen
    Data Communications, 1997, 26 (01):
  • [7] Hybrid Remote Access Protocol
    Kumar, Chanchal
    Singh, Sidharth
    Byrd, Gregory T.
    IEEE COMPUTER ARCHITECTURE LETTERS, 2019, 18 (01) : 30 - 33
  • [8] Analysis of Call Drop Problem for Remote Access Server on Server Side
    ZHOU Wei LIU Hong School of Communication and Information Engineering Shanghai University Shanghai China
    Journal of Shanghai University, 2000, (S1) : 58 - 61
  • [9] Embedded Web Server based NetLab for Remote Access
    Siddiqui, Masarrat Husain
    Purohit, Vijay
    Mane, Satendra
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 157 - 161
  • [10] CoAP Enhancement For a Better IoT Centric Protocol: CoAP 2.0
    Kome, Marco Lobe
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    Frey, Vincent
    2018 FIFTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY, 2018, : 139 - 146