Skip to main content
Top

2020 | OriginalPaper | Chapter

BRAIN: Buffer Reservation Attack PreventIoN Using Legitimacy Score in 6LoWPAN Network

Authors : Pradeepkumar Bhale, Satya Prakash, Santosh Biswas, Sukumar Nandi

Published in: Innovations for Community Services

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Internet of Things (IoT) is a network of tangible objects forming a Low-Power Network with each connected device having limited resources and computing power, and each entrusted with a task of data acquisition and transmission to controller devices or users. IoTs are taking over the networking world fast and are bringing the physical and the virtual world ever closer. The most prominent security threat with IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) is the Buffer Reservation Attack. In this paper, this attack has been extensively described, simulated using Contiki cooja simulator and proposed an energy efficient solution named BRAIN that defend against buffer reservation attack. We observe that the legitimacy score based BRAIN approach is improved by 4–35% packet dropping rate and 36.16% average throughput. Along with it reduces 0.09 mJ CPU Energy Computation (CPUENC), 0.14 mJ Transmission Energy (ETX), and 0.08 mJ Reception Energy (ERX).

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M.: Internet of things for smart cities. IEEE Internet Things J. 1(1), 22–32 (2014)CrossRef Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M.: Internet of things for smart cities. IEEE Internet Things J. 1(1), 22–32 (2014)CrossRef
4.
go back to reference Diaz-Rozo, J., Bielza, C., Larrañaga, P.: Clustering of data streams with dynamic gaussian mixture models: an IoT application in industrial processes. IEEE Internet Things J. 5(5), 3533–3547 (2018)CrossRef Diaz-Rozo, J., Bielza, C., Larrañaga, P.: Clustering of data streams with dynamic gaussian mixture models: an IoT application in industrial processes. IEEE Internet Things J. 5(5), 3533–3547 (2018)CrossRef
5.
go back to reference Pace, P., Aloi, G., Gravina, R., Caliciuri, G., Fortino, G., Liotta, A.: An edge-based architecture to support efficient applications for healthcare industry 4.0. IEEE Trans. Ind. Inform. 15(1), 481–489 (2018)CrossRef Pace, P., Aloi, G., Gravina, R., Caliciuri, G., Fortino, G., Liotta, A.: An edge-based architecture to support efficient applications for healthcare industry 4.0. IEEE Trans. Ind. Inform. 15(1), 481–489 (2018)CrossRef
6.
go back to reference Pradeepkumar, B., Talukdar, K., Choudhury, B., Singh, P.K.: Predicting external rogue access point in IEEE 802.11 b/g WLAN using RF signal strength. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1981–1986. IEEE (2017) Pradeepkumar, B., Talukdar, K., Choudhury, B., Singh, P.K.: Predicting external rogue access point in IEEE 802.11 b/g WLAN using RF signal strength. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1981–1986. IEEE (2017)
8.
go back to reference Abdul-Ghani, H.A., Konstantas, D., Mahyoub, M.: A comprehensive IoT attacks survey based on a building-blocked reference model. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 9(3), 355–373 (2018) Abdul-Ghani, H.A., Konstantas, D., Mahyoub, M.: A comprehensive IoT attacks survey based on a building-blocked reference model. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 9(3), 355–373 (2018)
9.
go back to reference Ammar, M., Russello, G., Crispo, B.: Internet of Things: a survey on the security of IoT frameworks. J. Inf. Secur. Appl. 38, 8–27 (2018) Ammar, M., Russello, G., Crispo, B.: Internet of Things: a survey on the security of IoT frameworks. J. Inf. Secur. Appl. 38, 8–27 (2018)
10.
go back to reference Agrawal, N., Pradeepkumar, B., Tapaswi, S.: Preventing ARP spoofing in WLAN using SHA-512. In: 2013 IEEE International Conference on Computational Intelligence and Computing Research, pp. 1–5. IEEE (2013) Agrawal, N., Pradeepkumar, B., Tapaswi, S.: Preventing ARP spoofing in WLAN using SHA-512. In: 2013 IEEE International Conference on Computational Intelligence and Computing Research, pp. 1–5. IEEE (2013)
11.
go back to reference Khandelwal, M., Gupta, D.K., Bhale, P.: DoS attack detection technique using back propagation neural network. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1064–1068. IEEE (2016) Khandelwal, M., Gupta, D.K., Bhale, P.: DoS attack detection technique using back propagation neural network. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1064–1068. IEEE (2016)
12.
go back to reference Kushalnagar, N., Montenegro, G., Schumacher, C.: IPv6 over low-power wireless personal area networks (6LoWPANs): overview, assumptions, problem statement, and goals. Technical report (2007) Kushalnagar, N., Montenegro, G., Schumacher, C.: IPv6 over low-power wireless personal area networks (6LoWPANs): overview, assumptions, problem statement, and goals. Technical report (2007)
13.
go back to reference Kim, H.: Protection against packet fragmentation attacks at 6LoWPAN adaptation layer. In: 2008 International Conference on Convergence and Hybrid Information Technology, pp. 796–801. IEEE (2008) Kim, H.: Protection against packet fragmentation attacks at 6LoWPAN adaptation layer. In: 2008 International Conference on Convergence and Hybrid Information Technology, pp. 796–801. IEEE (2008)
14.
go back to reference Hummen, R., Hiller, J., Wirtz, H., Henze, M., Shafagh, H., Wehrle, K.: 6LoWPAN fragmentation attacks and mitigation mechanisms. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 55–66. ACM (2013) Hummen, R., Hiller, J., Wirtz, H., Henze, M., Shafagh, H., Wehrle, K.: 6LoWPAN fragmentation attacks and mitigation mechanisms. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 55–66. ACM (2013)
15.
go back to reference Gilad, Y., Herzberg, A.: Fragmentation considered vulnerable: blindly intercepting and discarding fragments. In: Proceedings of the 5th USENIX Conference on Offensive Technologies, p. 2. USENIX Association (2011) Gilad, Y., Herzberg, A.: Fragmentation considered vulnerable: blindly intercepting and discarding fragments. In: Proceedings of the 5th USENIX Conference on Offensive Technologies, p. 2. USENIX Association (2011)
16.
go back to reference Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)CrossRef Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)CrossRef
17.
go back to reference Hossain, M., Karim, Y., Hasan, R.: SecuPAN: a security scheme to mitigate fragmentation-based network attacks in 6LoWPAN. In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, pp. 307–318. ACM (2018) Hossain, M., Karim, Y., Hasan, R.: SecuPAN: a security scheme to mitigate fragmentation-based network attacks in 6LoWPAN. In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, pp. 307–318. ACM (2018)
20.
go back to reference Yang, Y., Wu, L., Yin, G., Li, L., Zhao, H.: A survey on security and privacy issues in internet-of-things. IEEE Internet Things J. 4(5), 1250–1258 (2017)CrossRef Yang, Y., Wu, L., Yin, G., Li, L., Zhao, H.: A survey on security and privacy issues in internet-of-things. IEEE Internet Things J. 4(5), 1250–1258 (2017)CrossRef
Metadata
Title
BRAIN: Buffer Reservation Attack PreventIoN Using Legitimacy Score in 6LoWPAN Network
Authors
Pradeepkumar Bhale
Satya Prakash
Santosh Biswas
Sukumar Nandi
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-37484-6_12

Premium Partner