2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS) 2011
DOI: 10.1109/dcoss.2011.5982177
|View full text |Cite
|
Sign up to set email alerts
|

Securing communication in 6LoWPAN with compressed IPsec

Abstract: Abstract-Real-world deployments of wireless sensor networks (WSNs) require secure communication. It is important that a receiver is able to verify that sensor data was generated by trusted nodes. It may also be necessary to encrypt sensor data in transit. Recently, WSNs and traditional IP networks are more tightly integrated using IPv6 and 6LoWPAN. Available IPv6 protocol stacks can use IPsec to secure data exchange. Thus, it is desirable to extend 6LoWPAN such that IPsec communication with IPv6 nodes is possi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
96
0
1

Year Published

2012
2012
2022
2022

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 180 publications
(98 citation statements)
references
References 15 publications
1
96
0
1
Order By: Relevance
“…The 6LoWPAN does not ensure end-to-end protection between an IP sensor node and the Internet which makes it vulnerable to eavesdropping/spoofing and man in the middle attacks. These can be prevented by IPsec which defines a set of protocols to enable the authentication and encryption of each IP packet at the network layer [45]. The most common attack in the category of threats arising from the Internet is the botnet attack where data is forged by the botnet network and the wrong data is sent to the user node.…”
Section: Attacks and Security Mechanisms For Adaptation And Network mentioning
confidence: 99%
See 1 more Smart Citation
“…The 6LoWPAN does not ensure end-to-end protection between an IP sensor node and the Internet which makes it vulnerable to eavesdropping/spoofing and man in the middle attacks. These can be prevented by IPsec which defines a set of protocols to enable the authentication and encryption of each IP packet at the network layer [45]. The most common attack in the category of threats arising from the Internet is the botnet attack where data is forged by the botnet network and the wrong data is sent to the user node.…”
Section: Attacks and Security Mechanisms For Adaptation And Network mentioning
confidence: 99%
“…Authentication attack Network access control framework [44] PS Provides the node identification, but only enables one border router; Not implemented yet; Man in the middle, Eavesdropping/spoofing IPsec (AH and EPS) [45] PS Provides end-to-end secure communication; Pre-shared keys mechanism is not very flexible; Botnet attack Bot analysis module [46] IDS Good detection rates for large number of nodes; Decreased network performance and large overhead; RPL Selective forwarding attack Lightweight Heartbeat [48] IDS It has to be combined with IPsec to detect attack; No defense is provided after the attack is detected; Resilient techniques [51] PS Improved delivery ratio, but an increase in energy consumption; Spoofed/altered inf., sinkhole, selective forwarding SVELTE [50] IDS SVELTEs overhead is small enough; The true positive rate is not 100% due to some false alarms; Sinkhole attack IDS solution [52] IDS IPsec and bidirectional communication are necessary. Parent fail-over & rank authentication [53] …”
Section: Psmentioning
confidence: 99%
“…If the routing path has a malicious node, then the security of the messages routed through this path cannot be guaranteed. In addition to this, IEEE 802.15.4 PHY and Link Layer Security works only in the IoT -Access Network Layer in our generic architecture and when messages leave this layer and enter the Internet, they are no more protected [40].…”
Section: Which Security Solution To Use?mentioning
confidence: 99%
“…work on the 6LoWPAN), the pertinent cryptographic primitives are also adapted and improved accordingly. Such an example is the IPsec protocol and its variants that utilize header compression [44], [45], [46], which can provide similar levels of protection while preserving the valuable node resources.…”
Section: Security Analysis and Considerationsmentioning
confidence: 99%