The Improvement of the Protection for 6LoWPAN in IoT through Non-Causal Hash Function Scheme

Internet of Things (IoT) has become a variety, smart and intelligent concept for the Internet, where all things around us are connected to the Internet and have the ability to exchange information, organize data and work adequately. Progressive researches done in the area of IoT technologies were to support the need of powerful development platform of this technology. Wireless Sensor Network (WSN) is one of the most important components in IoT. One of the WSN protocol known as 6LoWPAN can serve in IoT, which provides the connection between the IPv6 and the lossy link. 6LoWPAN is a protocol designed to define a fragmentation mechanism for large packet. The aim of this paper is to improve the protection for 6LoWPAN protocols that can prevent fragment duplication attack by proposing the Non-Causal Hash Function Scheme (NCHFS). The proposed method works to use the whole packet information to create hash keys that is classified as non-causal. These keys can be used by any nodes to authenticate the packets and detect any possible modification on its individual fragment. This means that any attacker cannot modify the fragment content with preserving the hash keys unless it assembles the whole packet in advance that is impossible. The NCHFS was tested under two types of attackers, the ordinary attacker and the smart attacker.

[1]  Gabriel Montenegro,et al.  IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.

[2]  David E. Culler,et al.  Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.

[3]  Anitta Vincent,et al.  Security Aspects in 6 lowpan Networks : A Study , 2015 .

[4]  HyunGon Kim,et al.  Protection Against Packet Fragmentation Attacks at 6LoWPAN Adaptation Layer , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.

[5]  Manik Lal Das,et al.  RFID security in the context of "internet of things" , 2012, SecurIT '12.

[6]  Stormy Attaway,et al.  Matlab: A Practical Introduction to Programming and Problem Solving , 2009 .

[7]  Mumbai,et al.  Internet of Things (IoT): A Literature Review , 2015 .

[8]  Rosilah Hassan,et al.  A STUDY ON PROTOCOL STACK IN 6LOWPAN MODEL , 2012 .

[9]  Rohit Srivastava,et al.  A Survey on Techniques for Securing 6LoWPAN , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.

[10]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[11]  Pavan Pongle,et al.  A survey: Attacks on RPL and 6LoWPAN in IoT , 2015, 2015 International Conference on Pervasive Computing (ICPC).

[12]  Mihir Bellare,et al.  Lecture Notes on Cryptography , 2001 .

[13]  David E. Culler,et al.  Extending IP to Low-Power, Wireless Personal Area Networks , 2008, IEEE Internet Computing.

[14]  Rosilah Hassan,et al.  Adaptive congestion control mechanism in CoAP Application Protocol for Internet of Things (IoT) , 2016, 2016 International Conference on Signal Processing and Communication (ICSC).

[15]  Hanno Wirtz,et al.  6LoWPAN fragmentation attacks and mitigation mechanisms , 2013, WiSec '13.

[16]  Srinivas Sampalli,et al.  A novel sender authentication scheme based on hash chain for Vehicular Ad-Hoc Networks , 2011, 2011 IEEE Symposium on Wireless Technology and Applications (ISWTA).