2012
DOI: 10.1002/cpe.2850
|View full text |Cite
|
Sign up to set email alerts
|

Denial of service mitigation approach for IPv6‐enabled smart object networks

Abstract: Denial of service (DoS) attacks can be defined as any third-party action aiming to reduce or eliminate a network's capability to perform its expected functions. Although there are several standard techniques in traditional computing that mitigate the impact of some of the most common DoS attacks, this still remains a very important open problem to the network security community. DoS attacks are even more troublesome in smart object networks because of two main reasons. First, these devices cannot support the c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0
2

Year Published

2012
2012
2020
2020

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 23 publications
(14 citation statements)
references
References 31 publications
(87 reference statements)
0
12
0
2
Order By: Relevance
“…Eavesdropping, packet replay, tampering and spoofing are examples of attacks against the secrecy and authenticity. Denial of service can be targeted at the different protocol layers and is the main example of an attack against the network availability [7]. In the stealthy attacks, the main objective is to make a legitimate node to accept fake data generated by the attacker and the compromised legitimate node can also be used to intensify the spreading of false data through all other legitimate nodes.…”
Section: Security On Wireless Sensor Netwoksmentioning
confidence: 99%
See 1 more Smart Citation
“…Eavesdropping, packet replay, tampering and spoofing are examples of attacks against the secrecy and authenticity. Denial of service can be targeted at the different protocol layers and is the main example of an attack against the network availability [7]. In the stealthy attacks, the main objective is to make a legitimate node to accept fake data generated by the attacker and the compromised legitimate node can also be used to intensify the spreading of false data through all other legitimate nodes.…”
Section: Security On Wireless Sensor Netwoksmentioning
confidence: 99%
“…However, they can also be used to perform security attacks, because third party nodes can easily join the network [6]. WSN exhibit a large number of vulnerabilities, which make them even more vulnerable to security attacks than unconstrained IP networks [7][8]. To circumvent this issue, several security mechanisms have been proposed, some of them defined to address particular well-known attacks [9].…”
Section: Introductionmentioning
confidence: 99%
“…Etiket saldırılarındaysa saldırganlar kötücül etiketleri IoT ortamına yerleşirmekte ve kullanıcıları istemedikleri yerlere ya da Internet sitelerine yönlendirmektedirler [19]. Dügümü Fiziksel Veri Bagı 6LoWPAN Agİletim Uygulama Parazit yapma [12] Çerçeve çakıştırma [13] Parçalama [14], [15] Çukur [10], [16] Taşkın [13] Çapraz protokol [17] Dügüm yineleme [11] Zaman penceresi [18] Seçerek yönlendirme [10], [11] Senkronizasyon [13] Prokol işleme [17] Etiket [19] Taklit/degiştirme [20] URI işleme [17] Çok kimliklilik [11], [21] Vekil sunucu [17] Solucan deligi [11], [22] Önbellekleme [17] Seviye [23], [24] Versiyon numarası [25], [26] Yerel onarım [10], [17], [23] Hello taşkını [11] Tablo I: IoT Protol Yıgını Katmanlarına Göre DoS/DDoS Saldırıları ele geçirme ya da yineleme saldırılarındaysa saldırgan fiziksel bir dügümü kopyalayarak IoT agında birden fazla noktaya yerleştirmeye çalışır. Bu sayede mesajların hedefledikleri yerler yerine kopya dügümlere gitme olasılıgı artar ve önemli mesajlar hedefe hiç ulaşamayabilir.…”
Section: A Fiziksel Katman Saldırılarıunclassified
“…Çerçeveleri çakışmaya zorlayan bu saldırılar kaynakların tükenmesine neden olmakta ve dügümler arasında adil kaynak kullanımını bozmaktadır [13]. IoT MAC katmanı zaman aralıkları saldırılarında ise saldırgan garantili zaman aralıklarının ag koordinatörü ile kurulması esnasındaki gerekli mesaj alışverişini sekteye ugratmaya çalışmaktadır [18].…”
Section: B Veri Bagı Katmanı Saldırılarıunclassified
“…Eavesdropping, packet replay, tampering and spoofing are examples of attacks against the secrecy and authenticity. Denial of service (DoS) is the main example of an attack against the network availability and can be targeted at the different layers of the networking stack [9,10]. In the stealthy attacks, the main goal is to make a legitimate node to accept false data values generated by the attacker and, in this way, the compromised legitimate node can also be used to amplify the dissemination of false data through all other legitimate nodes.…”
Section: Security On Lowpan Networkmentioning
confidence: 99%