Abstract
Internet of Things (IoT) is a network of tangible objects forming a Low-Power Network with each connected device having limited resources and computing power, and each entrusted with a task of data acquisition and transmission to controller devices or users. IoTs are taking over the networking world fast and are bringing the physical and the virtual world ever closer. The most prominent security threat with IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) is the Buffer Reservation Attack. In this paper, this attack has been extensively described, simulated using Contiki cooja simulator and proposed an energy efficient solution named BRAIN that defend against buffer reservation attack. We observe that the legitimacy score based BRAIN approach is improved by 4–35% packet dropping rate and 36.16% average throughput. Along with it reduces 0.09 mJ CPU Energy Computation (CPUENC), 0.14 mJ Transmission Energy (ETX), and 0.08 mJ Reception Energy (ERX).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ziegler, S., et al.: IoT6 – moving to an IPv6-based future IoT. In: Galis, A., Gavras, A. (eds.) FIA 2013. LNCS, vol. 7858, pp. 161–172. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38082-2_14
El Ksimi, A., Leghris, C.: A new IPv6 security approach for a local network. In: Khoukhi, F., Bahaj, M., Ezziyyani, M. (eds.) AIT2S 2018. LNNS, vol. 66, pp. 17–26. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-11914-0_2
Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M.: Internet of things for smart cities. IEEE Internet Things J. 1(1), 22–32 (2014)
Diaz-Rozo, J., Bielza, C., Larrañaga, P.: Clustering of data streams with dynamic gaussian mixture models: an IoT application in industrial processes. IEEE Internet Things J. 5(5), 3533–3547 (2018)
Pace, P., Aloi, G., Gravina, R., Caliciuri, G., Fortino, G., Liotta, A.: An edge-based architecture to support efficient applications for healthcare industry 4.0. IEEE Trans. Ind. Inform. 15(1), 481–489 (2018)
Pradeepkumar, B., Talukdar, K., Choudhury, B., Singh, P.K.: Predicting external rogue access point in IEEE 802.11 b/g WLAN using RF signal strength. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1981–1986. IEEE (2017)
Arış, A., Oktuğ, S.F., Voigt, T.: Security of internet of things for a reliable internet of services. In: Ganchev, I., van der Mei, R.D., van den Berg, H. (eds.) Autonomous Control for a Reliable Internet of Services. LNCS, vol. 10768, pp. 337–370. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-90415-3_13
Abdul-Ghani, H.A., Konstantas, D., Mahyoub, M.: A comprehensive IoT attacks survey based on a building-blocked reference model. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 9(3), 355–373 (2018)
Ammar, M., Russello, G., Crispo, B.: Internet of Things: a survey on the security of IoT frameworks. J. Inf. Secur. Appl. 38, 8–27 (2018)
Agrawal, N., Pradeepkumar, B., Tapaswi, S.: Preventing ARP spoofing in WLAN using SHA-512. In: 2013 IEEE International Conference on Computational Intelligence and Computing Research, pp. 1–5. IEEE (2013)
Khandelwal, M., Gupta, D.K., Bhale, P.: DoS attack detection technique using back propagation neural network. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1064–1068. IEEE (2016)
Kushalnagar, N., Montenegro, G., Schumacher, C.: IPv6 over low-power wireless personal area networks (6LoWPANs): overview, assumptions, problem statement, and goals. Technical report (2007)
Kim, H.: Protection against packet fragmentation attacks at 6LoWPAN adaptation layer. In: 2008 International Conference on Convergence and Hybrid Information Technology, pp. 796–801. IEEE (2008)
Hummen, R., Hiller, J., Wirtz, H., Henze, M., Shafagh, H., Wehrle, K.: 6LoWPAN fragmentation attacks and mitigation mechanisms. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 55–66. ACM (2013)
Gilad, Y., Herzberg, A.: Fragmentation considered vulnerable: blindly intercepting and discarding fragments. In: Proceedings of the 5th USENIX Conference on Offensive Technologies, p. 2. USENIX Association (2011)
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)
Hossain, M., Karim, Y., Hasan, R.: SecuPAN: a security scheme to mitigate fragmentation-based network attacks in 6LoWPAN. In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, pp. 307–318. ACM (2018)
Contiki: IoT Simulator. http://www.contiki-os.org/start.html. Accessed 15 Aug 2019
Cooja: IoT Simulator. http://anrg.usc.edu/contiki/index.php/Cooja_Simulator. Accessed 15 Aug 2019
Yang, Y., Wu, L., Yin, G., Li, L., Zhao, H.: A survey on security and privacy issues in internet-of-things. IEEE Internet Things J. 4(5), 1250–1258 (2017)
Acknowledgments
We thank the anonymous reviewers for their helpful feedback that served to improve this paper. The research work has been conducted under Information Security Education and Awareness (ISEA) Project Phase - II. The authors would like to thank MeitY and IIT Guwahati India, for the support.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Bhale, P., Prakash, S., Biswas, S., Nandi, S. (2020). BRAIN: Buffer Reservation Attack PreventIoN Using Legitimacy Score in 6LoWPAN Network. In: Rautaray, S., Eichler, G., Erfurth, C., Fahrnberger, G. (eds) Innovations for Community Services. I4CS 2020. Communications in Computer and Information Science, vol 1139. Springer, Cham. https://doi.org/10.1007/978-3-030-37484-6_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-37484-6_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37483-9
Online ISBN: 978-3-030-37484-6
eBook Packages: Computer ScienceComputer Science (R0)