A security strategy for cyber threats on neighbor discovery in 6LoWPAN networks

Download
Author
Ang, Cheng Hai
Date
2017-12Advisor
Thulasiraman, Preetha
Second Reader
Dinolt, George
Metadata
Show full item recordAbstract
Wireless sensor networks (WSNs) employ various technologies to facilitate low power communications. One such technology is the Internet Protocol version 6 (IPv6) Low Power Local Area Networks (6LoWPAN). One of the key concerns for 6LoWPAN networks is the vulnerability of its neighbor discovery (ND) protocol. In this thesis, we study the potential threat vectors against the ND protocol, focusing specifically on replay attacks that can cause denial of service (DoS). We propose a combination of hard and soft security approaches to mitigate cyber-attacks against the ND protocol. The hard security approach is based on a Trust-ND option, which includes a Timestamp, Nonce, and SHA-1 hashing function. The soft security approach leverages the social interactions between the nodes in the network to identify malicious nodes. We also propose a time-synchronization mechanism to synchronize the local clock of the nodes in the network. We demonstrate the effectiveness of the Nonce and Timestamp functions against replay attacks using the Contiki Operating System (OS) and Cooja network simulator. Via simulations, we also demonstrate the effectiveness of the time-synchronization mechanism. In addition, the data captured during the simulations is further analyzed using Wireshark.
Description
Reissued 27 Sep 2018 to reflect updated abstract on pages i and v.
Rights
Copyright is reserved by the copyright owner.Collections
Related items
Showing items related by title, author, creator and subject.
-
A simulation and evaluation of NATO Standardization Agreement (STANAG) 4214
Dorko, Michael A.; Schultz, Robert G. (Monterey, California. Naval Postgraduate School, 1993-09);An object-oriented simulation model is developed to evaluate the effectiveness of NATO Standardization Agreement (STANAG) 4214, which promulgates the protocol for international telephone call routing and directories for ... -
Performance evaluation of Voice over Internet Protocol
Dechjaroen, Chaiporn (Monterey, California. Naval Postgraduate School, 2002-12);Voice over Internet Protocol (VoIP) was developed to emulate toll services with lower communication cost. In VoIP applications, voices are digitized and packetized into small blocks. These voice blocks are encapsulated in ... -
Achieving sink node anonymity in tactical wireless sensor networks using a reactive routing protocol
Haakensen, Thomas J. (Monterey, California: Naval Postgraduate School, 2017-06);A wireless sensor network (WSN) collects and routes information from the environment to an aggregation point, known as a sink node. The sink node processes the information or acts as a gateway to forward information to ...