6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach

被引:78
作者
Le, Anhtuan [2 ]
Loo, Jonathan [1 ]
Lasebae, Aboubaker [3 ]
Aiash, Mahdi
Luo, Yuan
机构
[1] Middlesex Univ, Sch Engn & Informat Sci, Hendon NW4 4BT, England
[2] Middlesex Univ, Dept Comp Commun, Hendon NW4 4BT, England
[3] Middlesex Univ, Postgrad Programmes, Hendon NW4 4BT, England
关键词
Internet of Things; 6LoWPAN; RPL; IDS; specification-based; anomaly; operation; WIRELESS SENSOR NETWORKS; DETECTION SCHEME; INTERNET; ATTACK;
D O I
10.1002/dac.2356
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Fuelled to bring the Internet of Things concept to real life, the Internet Engineering Task Force is working on 6LoWPAN, in which the standard allows a vast number of smart objects to be deployed in local wireless sensor networks (WSNs) using the huge address space of IPv6 for data and information harvesting through the Internet. From the security point of view, 6LoWPAN/WSN will be open to security threats from the local network itself and the Internet. Cryptography techniques applied as the front line of defence or deterrent can easily be broken because of the weak secure nature of LoWPAN devices and the wireless environment. Compromised nodes could lead to insider attacks without being detected by any cryptography checking. An intrusion detection system (IDS) is, primarily needed as a second line of defence to monitor the network operations and raise an alarm in case of any anomaly. This paper analyses potential security threats in 6LoWPAN and reviews the current countermeasures, in particular, the IDS-based solutions for countering insider/internal threats. Additionally, it discovers three novel QoS-related security threats, namely rank attack, local repair attack, and resource depleting attack, which are more seriously affecting the routing protocol for low-power and lossy network, the routing protocol used to establish 6LoWPAN network topology. A new two-layer IDS concept is introduced as a countermeasure method for securing the routing protocol for low-power and lossy network-built network topology from the internal QoS attacks. Potential research works are also presented to provide baseline reference to researchers in this field. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:1189 / 1212
页数:24
相关论文
共 56 条
[1]  
Amin SO, 2009, ICOIN: 2009 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, P285
[2]  
[Anonymous], 2005, Proceedings 1st ACM International Workshop on Quality of service Security in Wireless and Mobile Networks
[3]  
[Anonymous], 2011, P INT C CONTR AUT SY
[4]  
[Anonymous], 2010, 1 INT WORKSH SEC INT
[5]  
[Anonymous], 2002, P 9 ACM C COMP COMM
[6]  
[Anonymous], RFC 5673 IND ROUTING
[7]  
[Anonymous], ITU INT REP
[8]  
[Anonymous], 2011, RPL IPV6 ROUTING PRO
[9]  
[Anonymous], RFC 5548 ROUTING REQ
[10]  
[Anonymous], RFC 5867 BUILDING AU