Exploiting the Remote Server Access Support of CoAP Protocol

被引:11
|
作者
Roselin, Annie Gilda [1 ,2 ]
Nanda, Priyadarsi [3 ]
Nepal, Surya [2 ]
He, Xiangjian [3 ]
Wright, Jarod [4 ]
机构
[1] Univ Technol Sydney, Dept Elect & Data Engn, Ultimo, NSW 2007, Australia
[2] Commonwealth Sci & Ind Res Org, Data61, Marsfield, NSW 2122, Australia
[3] Univ Technol Sydney, Dept Elect & Data Engn, Ultimo, NSW 2007, Australia
[4] Univ Wollongong, Wollongong, NSW 2522, Australia
关键词
6LoWPAN; constrained application protocol (CoAP); Internet of Things (IoT) security; machine Learning (ML) model; off-path attack; INTERNET;
D O I
10.1109/JIOT.2019.2942085
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The constrained application protocol (CoAP) is a specially designed Web transfer protocol for use with constrained nodes and low-power networks. The widely available CoAP implementations have failed to validate the remote CoAP clients. Each CoAP client generates a random source port number when communicating with the CoAP server. However, we observe that in such implementations it is difficult to distinguish the regular packet and the malicious packet, opening a door for a potential off-path attack. The off-path attack is considered a weak attack on a constrained network and has received a less attention from the research community. However, the consequences resulting from such an attack cannot be ignored in practice. In this article, we exploit the combination of IP spoofing vulnerability and the remote server access support of CoAP is to be launch an off-path attack. The attacker injects a fake request message to change the credentials of the 6LoWPAN smart door keypad lock system. This creates a request spoofing vulnerability in CoAP, and the attacker exploits this vulnerability to gain full access to the system. Through our implementation, we demonstrated the feasibility of the attack scenario on the 6LoWPAN-CoAP network using smart door keypad lock. We proposed a machine learning (ML)-based approach to mitigate such attacks. To the best of our knowledge, we believe that this is the first article to analyze the remote CoAP server access support and request spoofing vulnerability of CoAP to launch an off-path attack and demonstrate how an ML-based approach can be deployed to prevent such attacks.
引用
收藏
页码:9338 / 9349
页数:12
相关论文
共 50 条
  • [11] Performance Evaluation for Remote Access VPNs on Windows Server 2003
    Jaha, Ahmed A.
    Ben Shatwan, Fathi
    Ashibani, Majdi
    NGMAST 2008: SECOND INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES, AND TECHNOLOGIES, PROCEEDINGS, 2008, : 582 - 587
  • [12] TMRAP - Topic maps remote access protocol
    Garshol, Lars Marius
    CHARTING THE TOPIC MAPS RESEARCH AND APPLICATIONS LANDSCAPE, 2006, 3873 : 53 - 68
  • [13] Analysis of Dual-server Polling Access Control Protocol
    Yang, Zhijun
    Mao, Lei
    Ding, Hongwei
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 2607 - 2612
  • [14] A Security Protocol for Access to Sensitive Data in Trusted Cloud Server
    Yao, Mengmeng
    Zhou, Dongsheng
    Deng, Rui
    Liu, Mingda
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 531 - 542
  • [15] Remote-Access-Server sind weiter auf dem Vormarsch
    NTZ, Telekommunikation und Informationstechnik, 1997, 50 (12):
  • [16] Hardware Implementation of GPRS Enabled Embedded Server for Remote Access Terminal
    Tripathi, Abhishek N.
    Sharma, Utkarsh
    Simaiya, Deepak
    2013 TENTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS (WOCN), 2013,
  • [17] Providing easier access to remote objects in client-server systems
    Aldrich, J
    Dooley, J
    Mandelsohn, S
    Rifkin, A
    PROCEEDINGS OF THE THIRTY-FIRST HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, VOL VII: SOFTWARE TECHNOLOGY TRACK, 1998, : 366 - 375
  • [18] Practical Comparison between COAP and MQTT - Sensor to Server level
    van der Westhuizen, Henri W.
    Hancke, Gerhard P.
    2018 WIRELESS ADVANCED (WIAD), 2018, : 25 - 30
  • [19] A Distributed Time Server for the Real-Time Extension of CoAP
    Konieczek, Bjoern
    Rethfeldt, Michael
    Golatowski, Frank
    Timmermann, Dirk
    2016 IEEE 19TH INTERNATIONAL SYMPOSIUM ON REAL-TIME DISTRIBUTED COMPUTING (ISORC 2016), 2016, : 84 - 91
  • [20] Comparison between COAP and MQTT - Server to Business System level
    van der Westhuizen, Henri W.
    Hancke, Gerhard P.
    2018 WIRELESS ADVANCED (WIAD), 2018, : 31 - 35