Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks 2013
DOI: 10.1145/2462096.2462107
|View full text |Cite
|
Sign up to set email alerts
|

6LoWPAN fragmentation attacks and mitigation mechanisms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
75
0
1

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 110 publications
(76 citation statements)
references
References 22 publications
0
75
0
1
Order By: Relevance
“…Two additional security schemes to PS There is no energy efficient attack against B-MAC which means that the attacker is awake most of the time. However, this framework has not been simulated/tested; prevent fragmentation attacks were proposed in [43]. In the content chaining scheme receiving node uses cryptographic mechanisms to verify that received fragments belong to the same packet, while the split buffer approach promotes direct competition between legitimate nodes and an attacker in using deficient buffer resources.…”
Section: Attacks and Security Mechanisms For Adaptation And Network mentioning
confidence: 99%
See 1 more Smart Citation
“…Two additional security schemes to PS There is no energy efficient attack against B-MAC which means that the attacker is awake most of the time. However, this framework has not been simulated/tested; prevent fragmentation attacks were proposed in [43]. In the content chaining scheme receiving node uses cryptographic mechanisms to verify that received fragments belong to the same packet, while the split buffer approach promotes direct competition between legitimate nodes and an attacker in using deficient buffer resources.…”
Section: Attacks and Security Mechanisms For Adaptation And Network mentioning
confidence: 99%
“…The main threat comes from internal attacks where for example, a malicious node can PS Fragmented packet formats have to be redefined; The framework has not been simulated/tested; The content chaining scheme and the split buffer approach [43] …”
Section: Security and Attacks In Bcpmentioning
confidence: 99%
“…Hummen et al [19] proposed two attacks, namely fragment duplication and buffer reservation, which may target the 6LoWPAN Adaptation Layer.…”
Section: D/dos Attacks To the 6lowpan Layermentioning
confidence: 99%
“…Hummen et al [19] proposed two novel attacks to 6LoWPAN adaptation layer, which are fragment duplication attack and buffer reservation attack. They also proposed two novel mitigation mechanisms against these attacks.…”
Section: Mitigation Systems and Protocol Security Solutions For Intermentioning
confidence: 99%
“…Using AES-CCM is only applicable to the ESP, and does not apply to the AH method, using only the EID value 101.AES-CCM with IPsec security encryption can be used in multi group encryption mode, including the CBC-MAC(Cipher Block Chaining Message Authentication Code) mode [9]. Literature [10] made a detailed security analysis of the 6LoWPAN fragmentation mechanism, identified the two kinds of attack methods in 6LoWPAN design level. The author proposes two countermeasures against such attacks, namely the content link method and the split cache method.…”
Section: Related Researchmentioning
confidence: 99%