A security strategy for cyber threats on neighbor discovery in 6LoWPAN networks
Ang, Cheng Hai
MetadataShow full item record
Wireless sensor networks (WSNs) employ various technologies to facilitate low power communications. One such technology is the Internet Protocol version 6 (IPv6) Low Power Local Area Networks (6LoWPAN). One of the key concerns for 6LoWPAN networks is the vulnerability of its neighbor discovery (ND) protocol. In this thesis, we study the potential threat vectors against the ND protocol, focusing specifically on replay attacks that can cause denial of service (DoS). We propose a combination of hard and soft security approaches to mitigate cyber-attacks against the ND protocol. The hard security approach is based on a Trust-ND option, which includes a Timestamp, Nonce, and SHA-1 hashing function. The soft security approach leverages the social interactions between the nodes in the network to identify malicious nodes. We also propose a time-synchronization mechanism to synchronize the local clock of the nodes in the network. We demonstrate the effectiveness of the Nonce and Timestamp functions against replay attacks using the Contiki Operating System (OS) and Cooja network simulator. Via simulations, we also demonstrate the effectiveness of the time-synchronization mechanism. In addition, the data captured during the simulations is further analyzed using Wireshark.
Reissued 27 Sep 2018 to reflect updated abstract on pages i and v.
RightsCopyright is reserved by the copyright owner.
Showing items related by title, author, creator and subject.
Dorko, Michael A.; Schultz, Robert G. (Monterey, California. Naval Postgraduate School, 1993);An object-oriented simulation model is developed to evaluate the effectiveness of NATO Standardization Agreement (STANAG) 4214, which promulgates the protocol for international telephone call routing and directories for ...
Dechjaroen, Chaiporn (Monterey, California. Naval Postgraduate School, 2002-12);Voice over Internet Protocol (VoIP) was developed to emulate toll services with lower communication cost. In VoIP applications, voices are digitized and packetized into small blocks. These voice blocks are encapsulated in ...
Achieving sink node anonymity in tactical wireless sensor networks using a reactive routing protocol Haakensen, Thomas J. (Monterey, California: Naval Postgraduate School, 2017-06);A wireless sensor network (WSN) collects and routes information from the environment to an aggregation point, known as a sink node. The sink node processes the information or acts as a gateway to forward information to ...