SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in 6LoWPAN

6LoWPAN is a widely used protocol for communication over IPV6 Low-power Wireless Personal Area Networks. Unfortunately, the 6LoWPAN packet fragmentation mechanism possesses vulnerabilities that adversaries can exploit to perform network attacks. Lack of fragment authentication, payload integrity verification, and sender IP address validation lead to fabrication, duplication, and impersonation attacks. Moreover, adversaries can abuse the poor reassembly buffer management technique of the 6LoWPAN layer to perform buffer exhaustion and selective forwarding attacks. In this paper, we propose SecuPAN - a security scheme for mitigating fragmentation-based network attacks in 6LoWPAN networks and devices. We propose a Message Authentication Code based per-fragment integrity and authenticity verification scheme to defend against fabrication and duplication attacks. We also present a mechanism for computing datagram-tag and IPv6 address cryptographically to mitigate impersonation attacks. Additionally, our reputation-based buffer management scheme protects 6LoWPAN devices from buffer reservation attacks. We provide an extensive security analysis of SecuPAN to demonstrate that SecuPAN is secure against strong adversarial scenarios. We also implemented a prototype of SecuPAN on Contiki enabled IoT devices and provided a performance analysis of our proposed scheme.

[1]  Hanno Wirtz,et al.  6LoWPAN fragmentation attacks and mitigation mechanisms , 2013, WiSec '13.

[2]  Elisa Bertino,et al.  Seamless and Secure Bluetooth LE Connection Migration , 2017, CODASPY.

[3]  Abdulmotaleb El-Saddik,et al.  Toward Social Internet of Vehicles: Concept, Architecture, and Applications , 2015, IEEE Access.

[4]  Zinaida Benenson,et al.  Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.

[5]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[6]  Sylvain Kubler,et al.  Enriching a Situation Awareness Framework for IoT with Knowledge Base and Reasoning Components , 2017, CONTEXT.

[7]  Lata Ragha,et al.  A rate limiting mechanism for defending against flooding based distributed denial of service attack , 2011, 2011 World Congress on Information and Communication Technologies.

[8]  David E. Culler,et al.  Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.

[9]  Tuomas Aura,et al.  Cryptographically Generated Addresses (CGA) , 2005, ISC.

[10]  Carsten Bormann Guidance for Light-Weight Implementations of the Internet Protocol Suite , 2012 .

[11]  Amir Herzberg,et al.  Fragmentation Considered Vulnerable , 2011, TSEC.

[12]  Gabriel Montenegro,et al.  IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.

[13]  Enrico Tronci 1997 , 1997, Les 25 ans de l’OMC: Une rétrospective en photos.

[14]  Myung-Ki Shin,et al.  Transmission of IPv6 Packets over IEEE 802.16 , 2006 .

[15]  Sheila Frankel,et al.  IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap , 2011, RFC.

[16]  J.T. Adams An introduction to IEEE STD 802.15.4 , 2006, 2006 IEEE Aerospace Conference.

[17]  Shivakant Mishra,et al.  Secure code distribution in dynamically programmable wireless sensor networks , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[18]  Klaus Wehrle,et al.  Towards viable certificate-based authentication for the internet of things , 2013, HotWiSec '13.

[19]  Hwajeong Seo,et al.  Optimized implementation of chaskey MAC on 16-bit MSP430 , 2017, 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN).

[20]  Darren Reed,et al.  Security Considerations for IP Fragment Filtering , 1995, RFC.

[21]  Jonathan W. Hui,et al.  Securing the Deluge network programming system , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[22]  Peng Ning,et al.  Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[23]  Hassen Redwan,et al.  Route-over vs mesh-under routing in 6LoWPAN , 2009, IWCMC.

[24]  A. James 2010 , 2011, Philo of Alexandria: an Annotated Bibliography 2007-2016.

[25]  Thomas Henry Ptacek,et al.  Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .

[26]  Jonathan Loo,et al.  6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..

[27]  HyunGon Kim,et al.  Protection Against Packet Fragmentation Attacks at 6LoWPAN Adaptation Layer , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.

[28]  Jorge Lobo,et al.  Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios , 2017, ESORICS.

[29]  Sally Floyd,et al.  Dynamics of TCP traffic over ATM networks , 1994 .

[30]  Elisa Bertino,et al.  Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices , 2017, IEEE Transactions on Mobile Computing.

[31]  Philip Levis,et al.  RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.

[32]  Robert Szabo,et al.  Information and Communication Technologies , 2012, Lecture Notes in Computer Science.

[33]  Sylvain Kubler,et al.  Towards semantic interoperability in an open IoT ecosystem for connected vehicle services , 2017, 2017 Global Internet of Things Summit (GIoTS).

[34]  Rajeev Gandhi,et al.  Sluice: Secure Dissemination of Code Updates in Sensor Networks , 2005, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[35]  Olaf Bergmann,et al.  Datagram Transport Layer Security in Constrained Environments , 2012 .

[36]  Richard Han,et al.  Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05 , 2005 .

[37]  Sammy Chan,et al.  Fair packet discarding for controlling ABR traffic in ATM networks , 1997, IEEE Trans. Commun..