Exploiting the Remote Server Access Support of CoAP Protocol

被引:11
|
作者
Roselin, Annie Gilda [1 ,2 ]
Nanda, Priyadarsi [3 ]
Nepal, Surya [2 ]
He, Xiangjian [3 ]
Wright, Jarod [4 ]
机构
[1] Univ Technol Sydney, Dept Elect & Data Engn, Ultimo, NSW 2007, Australia
[2] Commonwealth Sci & Ind Res Org, Data61, Marsfield, NSW 2122, Australia
[3] Univ Technol Sydney, Dept Elect & Data Engn, Ultimo, NSW 2007, Australia
[4] Univ Wollongong, Wollongong, NSW 2522, Australia
关键词
6LoWPAN; constrained application protocol (CoAP); Internet of Things (IoT) security; machine Learning (ML) model; off-path attack; INTERNET;
D O I
10.1109/JIOT.2019.2942085
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The constrained application protocol (CoAP) is a specially designed Web transfer protocol for use with constrained nodes and low-power networks. The widely available CoAP implementations have failed to validate the remote CoAP clients. Each CoAP client generates a random source port number when communicating with the CoAP server. However, we observe that in such implementations it is difficult to distinguish the regular packet and the malicious packet, opening a door for a potential off-path attack. The off-path attack is considered a weak attack on a constrained network and has received a less attention from the research community. However, the consequences resulting from such an attack cannot be ignored in practice. In this article, we exploit the combination of IP spoofing vulnerability and the remote server access support of CoAP is to be launch an off-path attack. The attacker injects a fake request message to change the credentials of the 6LoWPAN smart door keypad lock system. This creates a request spoofing vulnerability in CoAP, and the attacker exploits this vulnerability to gain full access to the system. Through our implementation, we demonstrated the feasibility of the attack scenario on the 6LoWPAN-CoAP network using smart door keypad lock. We proposed a machine learning (ML)-based approach to mitigate such attacks. To the best of our knowledge, we believe that this is the first article to analyze the remote CoAP server access support and request spoofing vulnerability of CoAP to launch an off-path attack and demonstrate how an ML-based approach can be deployed to prevent such attacks.
引用
收藏
页码:9338 / 9349
页数:12
相关论文
共 50 条
  • [41] GDS-B: A Protocol to Support HAIPE® Peer Discovery Server Communication
    Berger, Louis I.
    Ziemba, G. Paul
    Hawkins, William H.
    Decina, Basil A.
    MILITARY COMMUNICATIONS CONFERENCE, 2010 (MILCOM 2010), 2010, : 1098 - 1103
  • [42] Decision support framework ExtraPlanT with remote access and telephony interface
    Becvár, P
    Pechoucek, M
    Smídl, L
    2004 2ND IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS: COLLABORATIVE AUTOMATION - ONE KEY FOR INTELLIGENT INDUSTRIAL ENVIRONMENTS, 2004, : 95 - 100
  • [43] Web platform to support the share and remote access to medical images
    Lima, Sergio
    Sousa, Natercia
    Costa, Carlos
    Silva, Augusto
    ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: SOFTWARE AGENTS AND INTERNET COMPUTING, 2007, : 291 - 294
  • [44] SUGGESTIONS FOR EXPLOITING POTENTIAL OF ON-LINE REMOTE ACCESS INFORMATION RETRIEVAL AND DISPLAY SYSTEMS
    WOLFE, T
    JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE, 1971, 22 (03): : 149 - &
  • [45] Enabling Remote Access to a Wireless Sensor Network by Exploiting IPv6 Capabilities
    Leonardi, A.
    Palazzo, S.
    Scoto, F.
    Signorello, S.
    2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 285 - 290
  • [46] Design, Implementation, and Evaluation of an Embedded CoAP Proxy Server for 6LoWPAN
    Valdovinos, Ismael Amezcua
    Millan, Patricia Elizabeth Figueroa
    Guerrero-Ibanez, Juan Antonio
    Valdez, Ramona Evelia Chavez
    IEEE ACCESS, 2024, 12 : 15594 - 15608
  • [47] A multiple-beam antenna protocol at a wireless access point for exploiting spatial parallelism
    Lal, D
    Agrawal, DP
    2004 IEEE/SARNOFF SYMPOSIUM ON ADVANCES IN WIRED AND WIRELESS COMMUNICATION, 2004, : 23 - 26
  • [48] Remote Three-Factor Authentication Protocol with Strong Robustness for Multi-Server Environment
    Zhang, Min
    Zhang, Jiashu
    Tan, Wenrong
    CHINA COMMUNICATIONS, 2017, 14 (06) : 126 - 136
  • [49] Remote access VPNs performance comparison between windows server 2003 and fedora core 6
    Joha, Ahmed A.
    Shatwan, Fathi Ben
    Ashibani, Majdi
    IFIP Advances in Information and Communication Technology, 2007, 256 : 329 - 343
  • [50] A Cross-Protocol Proxy for Sensor Networks Based on CoAP
    Pierleoni, Paola
    Belli, Alberto
    Palma, Lorenzo
    Incipini, Lorenzo
    Raggiunto, Sara
    Mercuri, Marco
    Concetti, Roberto
    Sabbatini, Luisiana
    2019 IEEE 23RD INTERNATIONAL SYMPOSIUM ON CONSUMER TECHNOLOGIES (ISCT), 2019, : 251 - 255