Exploiting the Remote Server Access Support of CoAP Protocol

被引:11
|
作者
Roselin, Annie Gilda [1 ,2 ]
Nanda, Priyadarsi [3 ]
Nepal, Surya [2 ]
He, Xiangjian [3 ]
Wright, Jarod [4 ]
机构
[1] Univ Technol Sydney, Dept Elect & Data Engn, Ultimo, NSW 2007, Australia
[2] Commonwealth Sci & Ind Res Org, Data61, Marsfield, NSW 2122, Australia
[3] Univ Technol Sydney, Dept Elect & Data Engn, Ultimo, NSW 2007, Australia
[4] Univ Wollongong, Wollongong, NSW 2522, Australia
关键词
6LoWPAN; constrained application protocol (CoAP); Internet of Things (IoT) security; machine Learning (ML) model; off-path attack; INTERNET;
D O I
10.1109/JIOT.2019.2942085
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The constrained application protocol (CoAP) is a specially designed Web transfer protocol for use with constrained nodes and low-power networks. The widely available CoAP implementations have failed to validate the remote CoAP clients. Each CoAP client generates a random source port number when communicating with the CoAP server. However, we observe that in such implementations it is difficult to distinguish the regular packet and the malicious packet, opening a door for a potential off-path attack. The off-path attack is considered a weak attack on a constrained network and has received a less attention from the research community. However, the consequences resulting from such an attack cannot be ignored in practice. In this article, we exploit the combination of IP spoofing vulnerability and the remote server access support of CoAP is to be launch an off-path attack. The attacker injects a fake request message to change the credentials of the 6LoWPAN smart door keypad lock system. This creates a request spoofing vulnerability in CoAP, and the attacker exploits this vulnerability to gain full access to the system. Through our implementation, we demonstrated the feasibility of the attack scenario on the 6LoWPAN-CoAP network using smart door keypad lock. We proposed a machine learning (ML)-based approach to mitigate such attacks. To the best of our knowledge, we believe that this is the first article to analyze the remote CoAP server access support and request spoofing vulnerability of CoAP to launch an off-path attack and demonstrate how an ML-based approach can be deployed to prevent such attacks.
引用
收藏
页码:9338 / 9349
页数:12
相关论文
共 50 条
  • [31] Remote Variable Access Protocol for Data-Centric TeleRobotics
    Kang, Jeong Seok
    Kim, Jong Whan
    Park, Hong Seong
    2012 12TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS (ICCAS), 2012, : 1985 - 1989
  • [32] An Efficient Hardware Design of CoAP Protocol for The Internet of Things
    Khalil, Kasem
    Mohaidat, Tamador
    Darwich, Mahmoud
    Kumar, Ashok
    Bayoumi, Magdy
    17TH IEEE DALLAS CIRCUITS AND SYSTEMS CONFERENCE, DCAS 2024, 2024,
  • [33] CoAP: An Application Protocol for Billions of Tiny Internet Nodes
    Bormann, Carsten
    Castellani, Angelo P.
    Shelby, Zach
    IEEE INTERNET COMPUTING, 2012, 16 (02) : 62 - 67
  • [34] Performance evaluation for remote access VPN on windows server 2003 and fedora core 6
    Joha, Ahmed A.
    Ben Shatwan, Fathi
    Ashibani, Majdi
    TELSIKS 2007: 8TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICES, VOLS 1 AND 2, 2007, : 587 - +
  • [35] Remote access to a symbolic computation system for algebraic topology:: A client-server approach
    Andrés, M
    Pascual, V
    Romero, A
    Rubio, J
    COMPUTATIONAL SCIENCE - ICCS 2005, PT 3, 2005, 3516 : 635 - 642
  • [36] Remote Authentication Scheme for Multi-Server Environment Based on Biometrics with Access Control
    Zhang, Min
    Tan, Wen-rong
    2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, : 1447 - 1451
  • [37] Advanced remote user authentication protocol for multi-server architecture based on ECC
    Kalra, Sheetal
    Sood, Sandeep
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2013, 18 (2-3) : 98 - 107
  • [38] Mobile RMI: Supporting remote access to Java']Java server objects on mobile hosts
    Wall, T
    Cahill, V
    DOA'01: 3RD INTERNATIONAL SYMPOSIUM ON DISTRIBUTED OBJECTS & APPLICATIONS, PROCEEDINGS, 2001, : 41 - 51
  • [39] Embedded web server for remote laboratory access for undergraduate students studying electronic engineering
    Otoakhia, E.
    Jenmanachaiyakun, T.
    Afaneh, A.
    Alzebda, S.
    Mani, M.
    Sonbul, O.
    Kalashnikov, A. N.
    2011 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2011, : 337 - 340
  • [40] Web server for instruments mounts on DIN rail, allows remote access to process measurements
    Anon
    Control Solutions, 2001, 74 (04):