2016 IEEE Global Communications Conference (GLOBECOM) 2016
DOI: 10.1109/glocom.2016.7841523
|View full text |Cite
|
Sign up to set email alerts
|

A Novel 6LoWPAN-ND Extension to Enhance Privacy in IEEE 802.15.4 Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…The adopted countermeasure will have total cost less or equal to the damage cost: in our example, when an attack is detected, we can change the MAC-16 (MAC short) [19,22] address of our devices and, if a new attack is perform, we can modify the routing algorithm tree with a complete network reconfiguration.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The adopted countermeasure will have total cost less or equal to the damage cost: in our example, when an attack is detected, we can change the MAC-16 (MAC short) [19,22] address of our devices and, if a new attack is perform, we can modify the routing algorithm tree with a complete network reconfiguration.…”
Section: Resultsmentioning
confidence: 99%
“…As an example, if in a Fog/IoT network there are several temperature sensors and only one is under attack, we can evaluate if we can accept the risk that the attack propagates and simply apply a low-cost countermeasure by discarding data from the device under attack or by isolating the node and by reauthenticating it. Instead, if the device is a central node which routes data towards the FU, we need, e.g., to apply network reconfiguration with higher time and energy costs [19]. Therefore, the countermeasure must be correlated to the attack according to the assessed risk outcomes.…”
Section: Attack Tree and Attack Modelsmentioning
confidence: 99%
“…The authors in [24] provided a method based on an exten-sion of IPv6 over Low power Wireless Personal Area Network -Neighbor Discovery (6LoWPAN-ND) to change both L2 and L3 addresses, while maintaining the header compression (as well as all other functionalities of the 6LoWPAN) and a small routing table. The technique presented in this paper, with respect to [24], maintains all the original benefits, reducing the network overhead to zero for small to medium size networks. Moreover, the active sessions and routing path management during the address renew are greatly simplified.…”
Section: Related Workmentioning
confidence: 99%
“…The address reconfiguration approach suggested in [24] is to start the reconfiguration from the tree leafs. However, this solution requires an exact topology knowledge and an additional coordination among the nodes.…”
Section: Use Case: Applying Asha To Lr-wpanmentioning
confidence: 99%
“…A gateway architecture is chosen as the most appropriate for resource-constrained devices and for high system availability. In [16] the authors propose a cross layer method to overcome the traceability of the user in smart home networks 6LoWPAN . In this case, the IEEE 802.15.4 standards [17] foresees to cipher the payload but leaves out the headers containing the layer 2 addresses of the source and destination of the packets.…”
Section: Related Workmentioning
confidence: 99%