6LoWPAN multi-layered security protocol based on IEEE 802.15.4 security features

Security should be an integral part of IoT communication stack facing vulnerabilities imposed by protocol diversity. In this paper, we propose a new multilayer security protocol based on the security specifications of the IEEE 802.15.4 standard, operating at both the MAC and the 6LoWPAN adaptation layers in order to ensure all essential security aspects to broad public and industrial acceptance. Measurements demonstrate that this alternation between end-to-end and hop-by-hop security protects the entire network against internal and external attacks with minimum overhead, energy consumption, and delay; and a robust hardware implementation.

[1]  Michele Zorzi,et al.  BlinkToSCoAP: An end-to-end security framework for the Internet of Things , 2015, 2015 7th International Conference on Communication Systems and Networks (COMSNETS).

[2]  Yang Xiao,et al.  MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks , 2006, EURASIP J. Wirel. Commun. Netw..

[3]  Lisandro Zambenedetti Granville,et al.  A DTLS-based security architecture for the Internet of Things , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).

[4]  Thiemo Voigt,et al.  Lithe: Lightweight Secure CoAP for the Internet of Things , 2013, IEEE Sensors Journal.

[5]  Jorge Sá Silva,et al.  Enabling Network-Layer Security on IPv6 Wireless Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[6]  Grigore Stamatescu,et al.  Enabling security on 6LoWPAN / IPv6 Wireless Sensor Networks , 2015, 2015 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI).

[7]  Charlie Kaufman,et al.  Internet Key Exchange (IKEv2) Protocol , 2005, RFC.

[8]  Alberto Camacho Martínez Implementation and testing of LOADng: a routing protocol for WSN , 2012 .

[9]  Gabriel Montenegro,et al.  IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.

[10]  Syed Muhammad Sajjad,et al.  Security analysis of IEEE 802.15.4 MAC in the context of Internet of Things (IoT) , 2014, 2014 Conference on Information Assurance and Cyber Security (CIACS).

[11]  Philip Levis,et al.  RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.

[12]  Philippas Tsigas,et al.  ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System , 2009, NordSec.

[13]  Klaus Wehrle,et al.  Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..

[14]  Yassine Maleh,et al.  An enhanced DTLS protocol for Internet of Things applications , 2016, 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM).

[15]  Thiemo Voigt,et al.  6LoWPAN Compressed DTLS for CoAP , 2012, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems.

[16]  Thomas H. Clausen,et al.  LOADng: Towards AODV Version 2 , 2012, 2012 IEEE Vehicular Technology Conference (VTC Fall).

[17]  Garth V. Crosby,et al.  Implementing IPsec in Wireless Sensor Networks , 2014, 2014 6th International Conference on New Technologies, Mobility and Security (NTMS).

[18]  Daeyoung Kim,et al.  A back-end offload architecture for security of resource-constrained networks , 2016, 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA).

[19]  Paola Batistoni,et al.  International Conference , 2001 .

[20]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.