Proceedings ArticleDOI
Denial-of-Service detection in 6LoWPAN based Internet of Things
Prabhakaran Kasinathan,Claudio Pastrone,Maurizio A. Spirito,Mark Vinkovits +3 more
- pp 600-607
Reads0
Chats0
TLDR
A denial-of-service (DoS) detection architecture for 6LoWPAN, the standard protocol designed by IETF as an adaptation layer for low-power lossy networks enabling low- power devices to communicate with the Internet, is presented.Abstract:
Smart objects connected to the Internet, constituting the so called Internet of Things (IoT), are revolutionizing human beings' interaction with the world. As technology reaches everywhere, anyone can misuse it, and it is always essential to secure it. In this work we present a denial-of-service (DoS) detection architecture for 6LoWPAN, the standard protocol designed by IETF as an adaptation layer for low-power lossy networks enabling low-power devices to communicate with the Internet. The proposed architecture integrates an intrusion detection system (IDS) into the network framework developed within the EU FP7 project ebbits. The aim is to detect DoS attacks based on 6LoWPAN. In order to evaluate the performance of the proposed architecture, preliminary implementation was completed and tested against a real DoS attack using a penetration testing system. The paper concludes with the related results proving to be successful in detecting DoS attacks on 6LoWPAN. Further, extending the IDS could lead to detect more complex attacks on 6LoWPAN.read more
Citations
More filters
Journal ArticleDOI
Internet of Things security
TL;DR: This study aims to serve as a useful manual of existing security threats and vulnerabilities of the IoT heterogeneous environment and proposes possible solutions for improving the IoT security architecture.
Journal ArticleDOI
A survey of intrusion detection in Internet of Things
TL;DR: A survey of IDS research efforts for IoT is presented to identify leading trends, open issues, and future research possibilities, and classified the IDS proposed in the literature according to the following attributes: detection method, IDS placement strategy, security threat and validation strategy.
Journal ArticleDOI
Network Intrusion Detection for IoT Security Based on Learning Techniques
TL;DR: This survey classifies the IoT security threats and challenges for IoT networks by evaluating existing defense techniques and provides a comprehensive review of NIDSs deploying different aspects of learning techniques for IoT, unlike other top surveys targeting the traditional systems.
Journal ArticleDOI
Internet of things security: A top-down survey
TL;DR: A comprehensive top down survey of the most recent proposed security and privacy solutions in IoT in terms of flexibility and scalability and a general classification of existing solutions is given.
Journal ArticleDOI
A Supervised Intrusion Detection System for Smart Home IoT Devices
TL;DR: This paper proposes a three layer intrusion detection system (IDS) that uses a supervised approach to detect a range of popular network based cyber-attacks on IoT networks and demonstrates that the proposed architecture can automatically distinguish between IoT devices on the network, whether network activity is malicious or benign.
References
More filters
ReportDOI
RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks
TL;DR: This document specifies the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL), which provides a mechanism whereby multipoint-to-point traffic from devices inside the LLN towards a central control point as well as point- to- multipoint traffic from the central control points to the devices insideThe LLN are supported.
ReportDOI
The Constrained Application Protocol (CoAP)
TL;DR: The Constrained Application Protocol is a specialized web transfer protocol for use with constrained nodes and constrained networks, designed for machine- to-machine (M2M) applications such as smart energy and building automation.
Journal ArticleDOI
Denial of service in sensor networks
TL;DR: To identify denial-of-service vulnerabilities, the authors analyzed two effective sensor network protocols that did not initially consider security and demonstrate that consideration of security at design time is the best way to ensure successful network deployment.