Projects per year
Abstract
Research and standardisation efforts in the fields of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) are leading towards the adoption of TCP/IP for deployments of networks of severely constrained smart embedded objects. As a result, wireless sensors can now be uniquely identified by an IPv6 address and thus be directly connected to and reachable from the internet. This has a series of advantages but also exposes sensor deployments to new security vulnerabilities. Should a deployment be compromised, post-incident analysis can provide information about the nature of the attack by inspecting the network’s state and traffic during the time period prior, during and after the attack. In this paper we adopt traffic forensic techniques in order to achieve post-hoc detection of attacks against availability in IPv6-based Low-Power Wireless Personal Area Networks. To this end, we first implement an attack which exploits inherent vulnerabilities of the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL). Subsequently, we present an automated method to detect and analyse this attack by examining network packet captures.
Original language | English |
---|---|
Title of host publication | 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT 2016) |
Subtitle of host publication | Proceedings of a meeting held 12-14 December 2016, Reston, Virginia, USA |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Number of pages | 6 |
ISBN (Electronic) | 9781509041305 |
ISBN (Print) | 9781509041312 |
DOIs | |
Publication status | Published - Mar 2017 |
Event | 3rd IEEE World Forum on Internet of Things - Reston, VA, United States Duration: 12 Dec 2016 → 14 Dec 2016 |
Conference
Conference | 3rd IEEE World Forum on Internet of Things |
---|---|
Abbreviated title | WF-IoT 2016 |
Country/Territory | United States |
City | Reston, VA |
Period | 12/12/16 → 14/12/16 |
Keywords
- 6LoWPAN Forensics
- Traffic Forensics
- Wireless Sensor Networks
Fingerprint
Dive into the research topics of 'Traffic Forensics for IPv6-Based Wireless Sensor Networks and the Internet of Things'. Together they form a unique fingerprint.Projects
- 1 Finished