Modeling and analyses of IP spoofing attack in 6LoWPAN network

Abstract 6LoWPAN (modified version of IPv6 for low power devices) inherits security threats from its predecessor protocols, IPv4 and IPv6. IP spoofing is one such classic attack. There are vulnerabilities in 6LoWPAN and associated routing protocol, which open up new spoofing paths to the attacker. This study aims at profiling the feasibility to carry IPv6 spoofing attack on the 6LoWPAN network. Two new different attack paths are identified, which associate wrong IPv6 address with the MAC address of a node. These two paths use spoofed RPL and 6LoWPAN-ND messages to perform the IPv6 spoofing attack in an unsecured wireless medium. Probability of attack success is analyzed using the radio propagation environment parameters which affect the correct reception of a signal. It is shown that the success of an attack is highly dependent on the signal path loss. To perform the systematic mathematical analysis, attack tree model is used and attack is simulated in cooja simulator as well as performed in real experimental network. Our mathematical and simulated analysis show that path loss exponent, which represents distance based path loss, affects the probability of attack success. Attack feasibility analysis is done to find the cost to the attacker with respect to energy and memory consumption. It is observed that attacker code can be accommodated in memory constrained devices, and uses less energy to perform the attack, which manifests its feasibility.

[1]  Joel J. P. C. Rodrigues,et al.  Denial of service mitigation approach for IPv6‐enabled smart object networks , 2013, Concurr. Comput. Pract. Exp..

[2]  Cynthia A. Phillips,et al.  A graph-based system for network-vulnerability analysis , 1998, NSPW '98.

[3]  Thomas C. Schmidt,et al.  TRAIL: Topology Authentication in RPL , 2016, EWSN.

[4]  David E. Culler,et al.  Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.

[5]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[6]  Sandip C. Patel,et al.  Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements , 2008, Int. J. Inf. Manag..

[7]  Ki-Hyung Kim,et al.  SAKES: Secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6L0WPAN) , 2013, 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN).

[8]  Thomas Narten,et al.  Neighbor Discovery for IP Version 6 (IPv6) , 1996, RFC.

[9]  Hanno Wirtz,et al.  6LoWPAN fragmentation attacks and mitigation mechanisms , 2013, WiSec '13.

[10]  Carlier Matthias,et al.  Study on impact of adding security in a 6LoWPAN based network , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[11]  Raphael C.-W. Phan,et al.  Augmented attack tree modeling of SQL injection attacks , 2010, 2010 2nd IEEE International Conference on Information Management and Engineering.

[12]  Richard F. Paige,et al.  Fault trees for security system design and analysis , 2003, Comput. Secur..

[13]  Mohammad Abdollahi Azgomi,et al.  Predicting the behavior of attackers and the consequences of attacks against cyber-physical systems , 2016, Secur. Commun. Networks.

[14]  Adam Dunkels,et al.  Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[15]  Thiemo Voigt,et al.  Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.

[16]  Joel J. P. C. Rodrigues,et al.  Network Admission Control Solution for 6LoWPAN Networks Based on Symmetric Key Mechanisms , 2016, IEEE Transactions on Industrial Informatics.

[17]  Carsten Bormann,et al.  Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) , 2012, RFC.

[18]  Adam Dunkels,et al.  Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.

[19]  Sayan Kumar Ray,et al.  Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..

[20]  Dong Seong Kim,et al.  Cyber security analysis using attack countermeasure trees , 2010, CSIIRW '10.

[21]  Jong-Moon Chung,et al.  Message Complexity Analysis of Mobile Ad Hoc Network Address Autoconfiguration Protocols , 2008, IEEE Transactions on Mobile Computing.

[22]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[23]  Joel J. P. C. Rodrigues,et al.  Network Admission Control Solution for 6LoWPAN Networks , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[24]  Yu Liu,et al.  Network vulnerability assessment using Bayesian networks , 2005, SPIE Defense + Commercial Sensing.

[25]  Siarhei Kuryla,et al.  RPL: IPv6 Routing Protocol for Low power and Lossy Networks , 2010 .

[26]  Jonathan Loo,et al.  The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks , 2013, IEEE Sensors Journal.

[27]  Thomas R. Henderson,et al.  Host Identity Protocol Version 2 (HIPv2) , 2015, RFC.

[28]  Rajesh Kumar,et al.  Quantitative Attack Tree Analysis via Priced Timed Automata , 2015, FORMATS.

[29]  Maode Ma,et al.  A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks , 2016, IEEE Transactions on Industrial Informatics.

[30]  Azeddine Bilami,et al.  Compressed and distributed host identity protocol for end-to-end security in the IoT , 2014, 2014 International Conference on Next Generation Networks and Services (NGNS).

[31]  Sjouke Mauw,et al.  Foundations of Attack Trees , 2005, ICISC.

[32]  Monali Mavani,et al.  Experimental study of IP spoofing attack in 6LoWPAN network , 2017, 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence.

[33]  Jessye Dos Santos,et al.  Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis , 2014, IEEE Internet of Things Journal.

[34]  Remi Badonnel,et al.  A Taxonomy of Attacks in RPL-based Internet of Things , 2016, Int. J. Netw. Secur..

[35]  Stefano Bistarelli,et al.  Defense trees for economic evaluation of security investments , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[36]  Jaime C. Acosta,et al.  Augmenting attack graphs to represent data link and network layer vulnerabilities , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.

[37]  Bülent Yener,et al.  Modeling and detection of complex attacks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[38]  Adam Dunkels,et al.  Software-based on-line energy estimation for sensor nodes , 2007, EmNets '07.

[39]  Sipra Das Bit,et al.  LoWaNA: low overhead watermark based node authentication in WSN , 2016, Wirel. Networks.

[40]  S. Seidel,et al.  914 MHz path loss prediction models for indoor wireless communications in multifloored buildings , 1992 .

[41]  Jorge Sá Silva,et al.  Enabling Network-Layer Security on IPv6 Wireless Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[42]  Utz Roedig,et al.  Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).

[43]  Stephen E. Deering,et al.  Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) , 1995, RFC.

[44]  Christoph Meinel,et al.  6LoWPAN security: adding compromise resilience to the 802.15.4 security sublayer , 2013, ASPI '13.

[45]  Ingrid Moerman,et al.  Characterization of On-Body Communication Channel and Energy Efficient Topology Design for Wireless Body Area Networks , 2009, IEEE Transactions on Information Technology in Biomedicine.