2018
DOI: 10.1016/j.adhoc.2018.06.010
|View full text |Cite
|
Sign up to set email alerts
|

Privacy enabled disjoint and dynamic address auto-configuration protocol for 6Lowpan

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…Detection and defense mechanisms 46,55,58,60,[64][65][66][67] use intelligent techniques to identify and take defensive actions against malicious nodes, but they require additional development and implementation and cannot prevent all attacks. One proposed method 49 generates unique IIDs for all nodes, thus eliminating the need for the DAD process, but this violates the standardized network procedure of checking IID uniqueness before assignment.…”
Section: Dad Solutions To Mitigate Dos Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Detection and defense mechanisms 46,55,58,60,[64][65][66][67] use intelligent techniques to identify and take defensive actions against malicious nodes, but they require additional development and implementation and cannot prevent all attacks. One proposed method 49 generates unique IIDs for all nodes, thus eliminating the need for the DAD process, but this violates the standardized network procedure of checking IID uniqueness before assignment.…”
Section: Dad Solutions To Mitigate Dos Attacksmentioning
confidence: 99%
“…Detection and defense mechanisms 46,55,58,60,64–67 use intelligent techniques to identify and take defensive actions against malicious nodes, but they require additional development and implementation and cannot prevent all attacks. One proposed method 49 generates unique IIDs for all nodes, thus eliminating the need for the DAD process, but this violates the standardized network procedure of checking IID uniqueness before assignment. Enhancing the DAD procedure 20,21,26,32,48,52,63 is a promising approach for preventing attacks by malicious nodes, but care must be taken to avoid making it overly complex and adding extra burden to the network.…”
Section: Related Workmentioning
confidence: 99%
“…Mavani et al, has done several works on secure addressing and privacy preserving methodologies for IoT and Mobile environment paradigm [20,21,22]. In IoT, billions of devices can be addressed using IPv6 addressing scheme.…”
Section: Related Workmentioning
confidence: 99%
“…They analyzed the method using Cooja simulator to show that the method does not inflict much overhead for random changing of address and reconfiguration. In [21,22], they investigated the use of secure addressing and privacy mechanisms for f IPv6 over Low -Power Wireless Personal Area Networks (6LoWPAN) and designed a method to provide resilience against address spoofing and better reconfiguration time from attack disruption. They showed the efficacy of their proposal by time complexity analysis and simulation with benchmark data, but overall this does not pose much overhead to provide resilience against address spoofing.…”
Section: Related Workmentioning
confidence: 99%
“…The end-to-end (E2E) communication between Internet users and sensor nodes can really be realized, which promotes the application of WSNs. However a new security crisis has been introduced for IP-enabled WSNs whereby adversaries can more easily access data on sensor nodes by using global addressing [8,9,10]. Moreover, the high frangibility of the WSN itself (e.g., its resource constrained nature) makes it a easy target for many security attacks [3,11] (e.g., hacking, data theft, remote hijacking) or a tool for hackers to launch security attacks [12] (e.g., Mira, composed of IoT devices that constituted a million-level botnets, launched a crazy DDoS attack on Krebson Security).…”
Section: Introductionmentioning
confidence: 99%