Security with IP Address Assignment and Spoofing for Smart IOT Devices

The widespread use of internet is causing more cyber-attacks using IP spoofing. The security for IoT devices to prevent IP spoofing involves validating the source address of received IP packets at the gateway. This is required to prevent a unauthorized user from using IP address as source address and flooding packets to the gateway there by using the bandwidth allocated to authorized users. This paper proposes a scheme for IP address assignment to smart IoT devices (which communicate using TCP/IP) and validation of source IP address in the received IP packets from the IoT Device at the Gateway device.

[1]  Dhvani Shah,et al.  IoT Based Biometrics Implementation on Raspberry Pi , 2016 .

[2]  Ayman I. Kayssi,et al.  IP Spoofing Detection Using Modified Hop Count , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.

[3]  Kevin Benton,et al.  Filtering IP source spoofing using feasible path reverse path forwarding with SDN , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[4]  Anat Bremler-Barr,et al.  Spoofing prevention method , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[5]  Jianping Wu,et al.  LAS: An effective anti-spoofing method using existing information , 2014, 2014 23rd International Conference on Computer Communication and Networks (ICCCN).

[6]  Shashikala Tapaswi,et al.  A Lightweight Approach to Detect the Low/High Rate IP Spoofed Cloud DDoS Attacks , 2017, 2017 IEEE 7th International Symposium on Cloud and Service Computing (SC2).

[7]  C Fancy,et al.  A dedicated setup to identify spoofing via IP-traceback , 2017, 2017 International Conference on Intelligent Sustainable Systems (ICISS).

[8]  Sameer Seth,et al.  TCP/IP architecture, design, and implementation in Linux , 2008 .

[9]  Vijay Katkar,et al.  Light weight approach for IP-ARP spoofing detection and prevention , 2011, 2011 Second Asian Himalayas International Conference on Internet (AH-ICI).

[10]  M. Sedano Reynolds Next generation DDoS Web based attacks , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..

[11]  Kang G. Shin,et al.  Defense Against Spoofed IP Traffic Using Hop-Count Filtering , 2007, IEEE/ACM Transactions on Networking.

[12]  Douglas E. Comer,et al.  Internetworking with TCP/IP - Principles, Protocols, and Architectures, Fourth Edition , 1988 .

[13]  Charles Kozierok,et al.  The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference , 2005 .