Advertisement

Security Mechanisms for 6LoWPAN Network in Context of Internet of Things: A Survey

  • Yamina BenslimaneEmail author
  • Khelifa Benahmed
  • Hassane Benslimane
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 62)

Abstract

With the emergence of internet of things (IoT), the physical object belonging to our daily activity and to different domain as: home automation, industrial automation, monitoring environment and health care may be interacted and benefited from the world of internet. Thus, this communication provides several data that are circulate in the different networks as IPv6 network or the 6LoWPAN network. Since the 6LoWPAN network is the fundamental part of IoT, its security is challenge domain whether for the end-to-end security when the data are sent to the server outside the network or for the internal security with the intrusion detection system. In this paper, we present a survey about the proposed researches for the 6LoWPAN network security whether for inside or outside communication of network. The analysis of these proposed security mechanisms in the literature is discussed based on a taxonomy focusing on the following attributes: the selected internet security protocols as DTLS, HIP and IKE for the end-to-end security (out-side the 6LoWPAN network) and the attack detected as routing attack, DDoS attack,…etc. for the intrusion detection system (inside the 6LoWPAN network). We also give the Evaluation of these security mechanisms for 6LoWPAN network in term of different metrics. The aim of this work is to identify leading trends, open issues, and future research possibilities.

Keywords

Internet of things 6LoWPAN network Internet security protocols End-to-end security Intrusion detection system 

References

  1. Airehrour, D., Gutierrez, J., Ray, S.K.: Secure routing for internet of things: a survey. J. Netw. Comput. Appl. 66, 198–213 (2016)CrossRefGoogle Scholar
  2. Amaral, J.P., Oliveira, L.M., Rodrigues, J.J., Han, G., Shu, L.: Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks. In: 2014 IEEE International Conference on Communications (ICC), pp. 1796–1801. IEEE (2014)Google Scholar
  3. Badra, M.: Pre-shared key cipher suites for transport layer security (TLS) with SHA-256/384 and AES Galois Counter Mode (2009)Google Scholar
  4. Bostani, H., Sheikhan, M.: Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach. Comput. Commun. 98, 52–71 (2017)CrossRefGoogle Scholar
  5. Cervantes, C., Poplade, D., Nogueira, M., Santos A.: Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 606–611. IEEE (2015)Google Scholar
  6. Chavan, A.A., Nighot, M.K.: Secure and cost-effective application layer protocol with authentication interoperability for IOT. Procedia Comput. Sci. 78, 646–651 (2016)CrossRefGoogle Scholar
  7. Garcia-Morchon, O., Kumar, S., Struik, R., Keoh, S., Hummen, R.: Security considerations in the IP-based Internet of Things (2013)Google Scholar
  8. Granjal, J., Monteiro, E., Silva, J.S.: End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication. In: IFIP Networking Conference, 2013, pp. 1–9. IEEE (2013)Google Scholar
  9. Heer, T.: LHIP lightweight authentication extension for HIP, draft-heer-hip-lhip-00 (IETF work in progress), February (2007)Google Scholar
  10. Henderson, T., Heer, T., Jokela, P., Moskowitz, R.: Host identity protocol version 2 (HIPv2) (2015)Google Scholar
  11. Hui, J., Thubert, P.: Compression format for IPv6 datagrams over IEEE 802.15. 4-based networks (2011)Google Scholar
  12. Hummen, R., Wirtz, H., Ziegeldorf, J.H., Hiller, J., Wehrle, K.: Tailoring end-to-end IP security protocols to the Internet of Things. In: 2013 21st IEEE International Conference on Network Protocols (ICNP), pp. 1–10. IEEE (2013)Google Scholar
  13. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of the First IEEE. 2003 IEEE International Workshop on Sensor Network Protocols and Applications, 2003, pp. 113–127. IEEE (2003)Google Scholar
  14. Kasinathan, P., Pastrone, C., Spirito, M.A., Vinkovits, M.: Denial-of-Service detection in 6LoWPAN based Internet of Things. In: 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 600–607. IEEE (2013)Google Scholar
  15. Kaufman, C.: Internet key exchange (IKEv2) protocol. Report no. 2070–1721 (2005)Google Scholar
  16. Kent, S. IP encapsulating security payload (ESP). Report no. 2070–1721 (2005a)Google Scholar
  17. Kent, S.: RFC 4302: IP Authentication Header (AH). In: Request for Comments, IETF (2005b)Google Scholar
  18. Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., Carle, G.: A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication. In: 2012 IEEE 37th Conference on Local Computer Networks Workshops (LCN Workshops), pp. 956–963. IEEE (2012)Google Scholar
  19. Le, A., Loo, J., Chai, K.K., Aiash, M.: A specification-based IDS for detecting attacks on RPL-based network topology. Information 7(2), 25 (2016)CrossRefGoogle Scholar
  20. Lee, T.-H., Wen, C.-H., Chang, L.-H., Chiang, H.-S., Hsieh, M.-C.: A lightweight intrusion detection scheme based on energy consumption analysis in 6LowPAN. In: Advanced Technologies, Embedded and Multimedia for Human-centric Computing, pp. 1205–1213. Springer (2014)Google Scholar
  21. Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of things: vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497–1516 (2012)CrossRefGoogle Scholar
  22. Misra, S., Krishna, P.V., Agarwal, H., Saxena, A., Obaidat, M.S.: A learning automata based solution for preventing distributed denial of service in Internet of things. In: Internet of Things (iThings/CPSCom), 2011 International Conference on and 4th International Conference on Cyber, Physical and Social Computing, pp. 114–122. IEEE (2011)Google Scholar
  23. Moskowitz, R.: HIP Diet EXchange (DEX): draft-moskowitz-hip-rg-dex-05. Internet Engineering Task Force, Status: Work in progress. Technical report (2011)Google Scholar
  24. Moskowitz, R., Nikander, P., Jokela, P., Henderson, T.: Host Identity Protocol (2008)Google Scholar
  25. Neuman, B.C., Ts’o, T.: Kerberos: an authentication service for computer networks. IEEE Commun. Mag. 32(9), 33–38 (1994)CrossRefGoogle Scholar
  26. Nguyen, K.T., Laurent, M., Oualha, N.: Survey on secure communication protocols for the Internet of Things. Ad Hoc Netw. 32, 17–31 (2015)CrossRefGoogle Scholar
  27. Pongle, P., Chavan, G.: Real time intrusion and wormhole attack detection in internet of things. Int. J. Comput. Appl. 121(9) (2015)CrossRefGoogle Scholar
  28. Raza, S., Duquennoy, S., Chung, T., Yazar, D., Voigt, T., Roedig, U.: Securing communication in 6LoWPAN with compressed IPsec. In: 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), pp. 1–8. IEEE (2011)Google Scholar
  29. Raza, S., Duquennoy, S., Höglund, J., Roedig, U., Voigt, T.: Secure communication for the Internet of Things—a comparison of link-layer security and IPsec for 6LoWPAN. Secur. Commun. Netw. 7(12), 2654–2668 (2014)CrossRefGoogle Scholar
  30. Raza, S., Shafagh, H., Hewage, K., Hummen, R., Voigt, T.: Lithe: lightweight secure CoAP for the internet of things. IEEE Sens. J. 13(10), 3711–3720 (2013a)CrossRefGoogle Scholar
  31. Raza, S., Trabalza, D., Voigt, T.: 6LoWPAN compressed DTLS for CoAP. In: 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems (DCOSS), pp. 287–289. IEEE (2012)Google Scholar
  32. Raza, S., Voigt, T., Jutvik, V.: Lightweight IKEv2: a key management solution for both the compressed IPsec and the IEEE 802.15. 4 security. In: Proceedings of the IETF Workshop on Smart Object Security, vol. 23 (2012)Google Scholar
  33. Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the Internet of Things. Ad Hoc Netw. 11(8), 2661–2674 (2013b)CrossRefGoogle Scholar
  34. Rescorla, E., Modadugu, N.: Datagram transport layer security version 1.2 (2012)Google Scholar
  35. Riaz, R., Kim, K.-H., Ahmed, H.F.: Security analysis survey and framework design for ip connected lowpans. In: International Symposium on Autonomous Decentralized Systems, 2009. ISADS’09, pp. 1–6. IEEE (2009)Google Scholar
  36. Roman, R., Alcaraz, C., Lopez, J., Sklavos, N.: Key management systems for sensor networks in the context of the Internet of Things. Comput. Electr. Eng. 37(2), 147–159 (2011)CrossRefGoogle Scholar
  37. Saied, Y.B., Olivereau, A.: D-HIP: a distributed key exchange scheme for HIP-based Internet of Things. In: 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–7. IEEE (2012)Google Scholar
  38. Shelby, Z., Bormann, C.: 6LoWPAN: The Wireless Embedded Internet, vol. 43. Wiley, New York (2011)Google Scholar
  39. Thanigaivelan, N.K., Nigussie, E., Kanth, R.K., Virtanen, S., Isoaho, J.: Distributed internal anomaly detection system for Internet-of-Things. In: 2016 13th IEEE Annual Consumer Communications and Networking Conference (CCNC), pp. 319–320. IEEE (2016)Google Scholar
  40. Wallgren, L., Raza, S., Voigt, T.: Routing attacks and countermeasures in the RPL-based Internet of Things. Int. J. Distrib. Sens. Netw. 9(8), 794326 (2013)CrossRefGoogle Scholar
  41. Zarpelão, B.B., Miani, R.S., Kawakani, C.T., de Alvarenga, S.C.: A survey of intrusion detection in Internet of Things. J. Netw. Comput. Appl. (2017)Google Scholar
  42. Zhang, L., Feng, G., Qin, S.: Intrusion detection system for RPL from routing choice intrusion. In: 2015 IEEE International Conference on Communication Workshop (ICCW), pp. 2652–2658. IEEE (2015)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Yamina Benslimane
    • 1
    Email author
  • Khelifa Benahmed
    • 2
  • Hassane Benslimane
    • 1
  1. 1.Laboratory of Physics and Semiconductor DevicesTahri Mohamed UniversityBécharAlgeria
  2. 2.Exact Sciences DepartmentTahri Mohamed UniversityBecharAlgeria

Personalised recommendations