Speaker:Chen-Yu Tseng Advisor : Dr. Ho-Ting, Wu

Slides:



Advertisements
Similar presentations
Low-Power Interoperability for the IPv6 Internet of Things Presenter - Bob Kinicki Low-Power Interoperability for the IPv6 Internet of Things Adam Dunkels,
Advertisements

6LoWPAN Extending IP to Low-Power WPAN 1 By: Shadi Janansefat CS441 Dr. Kemal Akkaya Fall 2011.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
6LoWPAN Ad Hoc On-Demand Distance Vector Routing (LOAD) Ki-Hyung Kim, S. Daniel Park, G. Montenegro, S. Yoo, and N. Kushalnagar IETF 6LoWPAN WG 66th, Montreal,
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
EAIT, February 2006 A Pragmatic Approach towards the Improvement of Performance of Ad Hoc Routing ProtocolsOptimizations To Multipath Routing Protocols.
Advisor: Quincy Wu Speaker: Kuan-Ta Lu Date: Aug. 19, 2010
Speaker:Yi-Jie Pan Advisor:Dr. Kai-Wei Ke 2014/04/28
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Reducing Traffic Congestion in ZigBee Networks: Experimental Results th International Wireless Communications and Mobile Computing Conference (IWCMC)
Low-Power Interoperability for the IPv6 Internet of Things Presenter - Bob Kinicki Low-Power Interoperability for the IPv6 Internet of Things Adam Dunkels,
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
A Review of 6LoWPAN Routing Protocols Advisor: Quincy Wu Speaker: Kuan-Ta Lu Date: Dec. 14, 2010.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Speaker: Yi-Lei Chang Advisor: Dr. Kai-Wei Ke 2012/05/15 IPv6-based wireless sensor network 1.
Fast and Reliable Route Discovery Protocol Considering Mobility in Multihop Cellular Networks Hyun-Ho Choi and Dong-Ho Cho Wireless Pervasive Computing,
Integrating Quality of Protection into Ad Hoc Routing Protocols Seung Yi, Prasad Naldurg, Robin Kravets University of Illinois at Urbana-Champaign.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Integration of Wireless Sensor Networks to the Internet of Things using a 6LoWPAN Gateway Integration of Wireless Sensor Networks to the Internet of Things.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
6LoWPAN Ad Hoc On-Demand Distance Vector Routing Introduction Speaker: Wang Song-Ferng Advisor: Dr. Ho-Ting Wu Date: 2014/03/31.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Energy-Efficient Protocol for Cooperative Networks.
Security of the Internet of Things: perspectives and challenges
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Reporter: Hung-Wei Liu Advisor: Tsung-Hung Lin 1.
1 Computer Networks Chapter 5. Network layer The network layer is concerned with getting packets from the source all the way to the destination. Getting.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
TAODV: A Trusted AODV Routing Protocol for MANET
IMPROVING OF WIRELESS MESH NETWORKS.
Introduction Wireless devices offering IP connectivity
Dominik Kaspar, Eunsook Kim, Carles Gomez, Carsten Bormann
Performance analysis of an IP based protocol stack for WSNs
Department of Computer Science Southern Illinois University Carbondale CS441-Mobile & Wireless Computing Zigbee Standard Dr.
Ad-hoc Networks.
802.11s Proposal - Joint SEE-Mesh/Wi-Mesh Proposal to TGs
Trusted Routing in IoT Dr Ivana Tomić In collaboration with:
Speaker: Qi-Hong Cai Advisor: Dr. Ho-Ting Wu 2017/4/13
Outline Introduction Routing in Mobile Ad Hoc Networks
Algorithms for Big Data Delivery over the Internet of Things
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
Sensor Network Routing
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
Routing In Wireless Mesh Networks
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Ad-hoc On-demand Distance Vector
Smart Homes Automation using Z-Wave Protocol
Extending IP to Low-Power, Wireless Personal Area Networks
Mobile and Wireless Networking
Ad hoc Routing Protocols
Localized Scheduling for End-to-End Delay
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Enhancement to Mesh Discovery
Security Of Wireless Sensor Networks
ITIS 6010/8010 Wireless Network Security
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Authentication and handoff protocols for wireless mesh networks
Dhruv Gupta EEC 273 class project Prof. Chen-Nee Chuah
Security of Wireless Sensor Networks
Computer Networks: Wireless Networks
Efficient flooding with Passive clustering (PC) in Ad Hoc Networks
The Contiki Operating System Allan Blanchard, INRIA
Presentation transcript:

Speaker:Chen-Yu Tseng Advisor : Dr. Ho-Ting, Wu 6LoWPAN multi-layered security protocol based on IEEE 802.15.4 security features Speaker:Chen-Yu Tseng Advisor : Dr. Ho-Ting, Wu

Outline Introduction Networks Security 6LoWPAN Routing 6LoWPAN Security Attack Protocol Description Evaluation Conclusion

Introduction 6LoWPAN (IPv6 over Low Power Wireless Personal Area Networks) enable IP-based connection between smart devices, yielding autonomous Internet links without using centralized architecture. Remain an open research area with several unspecified security flaws reflected in threats and lack of trust.

Introduction This paper propose a security protocol named ”Combined 6LoWPSec”,operating alternately at the MAC and the adaptation layers, offering both end-to-end and hop-by-hop security features.

Introduction This alternation favoring end-to-end data protection due to its major importance in characterizing the network effectiveness. The hop-by-hop security is permanently arranged but for a limited period in order to maintain a convenient equilibrium with the quality of services. This solution therefore benefits from the hardware ciphering and verification structures offered by the AES-CCM algorithm.

Networks Security End-to-End (E2E) approaches provide the benefit of enabling secure communications between IPv6 enabled sensor networks and the Internet. Most previous proposed E2E Security protocol for WSN needs support with robust hardware.

Networks Security Hop-By-Hop(HbH) security provides secured communication between neighboring sensors. By IEEE 802.15.4, while setting the SecurityEnabled field an Auxiliary Security Header will be attached to the MAC frame.

Security Control : affords general information about the security level and the operation mode. Security Level subfield Key Identifier Mode subfield reserved bits

Frame Counter: incremented while securing the outgoing frame to provide semantic security and replay protection services.

Key Identifier : furnish details about the generated keyreference. Key Source Key Index

IEEE 802.15.4 link layer security features defines eight types of security based on AES(Advanced Encryption Standard) with CCM block cipher mode given variable MIC (Message Integrity Code) size.

6LoWPAN Routing Routing schema in 6LoWPAN networks could influence the security methodology decision since different layers could be responsible for building paths. Two basic routing schema operating distinguish in distinct levels, which are mesh under and route over.

Route Over Achieving routing discovery procedure based on directed acyclic graph (DAG). This tree-based routing focuses on the construction of a stable route framework using a metric value called Rank and exchanging several control messages.

Mesh Under Performed by the adaptation layer, forwarding the packet fragments towards the destination without resorting to the network layer.

Mesh under Route Over Application Layer Transport Layer (TCP/UDP) Network Layer (IPv6) 6LoWPAN Adaption Layer 802.12.4 MAC 802.12.4 PHY Routing Routing

LOADng LOADng routing (Lightweight Ad hoc On-Demand-Next Generation) is a reactive routing protocol intended to mesh under scheme and derived from AODV.

Route Requests (RREQs): genrate by originator node to discover a route to destination. Route Replies (RREPs): created to answer the originator of the RREQ.

6LoWPAN Security Attack Hop-by-hop attacks: Internal malicious nodes that aim to cause a direct damage to the network, by affecting physical links, radio hops and routing discovery. Selective forwarding attack consists in dropping or delaying arbitrary a part of the packets received by attackers.

6LoWPAN Security Attack End-to-end attacks: Man in middle modify or peeking packets. DoS attack to deplete nodes resources.

Protocol Description Works between MAC and adaptation layers. LOADng mesh under routing for E2E security since fragments are gathered at the end device and not at each node hop. During exchange data between nodes, security protocol will ensure the good running of the communication process within and outside the LoWPAN.

Evaluation Experimental setup: COOJA network simulator for Contiki OS Tmoste Sky node 16-bit msp430 MCU 48kB of ROM 10 kB of RAM CC2420 radio transceiver

Analyze memory allocation: 40.53 KB of memory for 6LoWPAN motes(CBC-MAC 4 mode) 43.21 KB for border router (CCM 16) -(CBC-MAC 4 mode) -(CCM 16)

Analyze energy consumption: Measurements are captured during a period of 30 min. SecDelay= 0.068ms MaxE2EDelay= 0.21ms MaxHopNum= 6 HbHDelay= 0.018ms,

For balance the alternation between these two modes, n = 50 is chose which corresponds to 9.5mJ of energy consumption.

HbyH attack affects a very limited zone of motes,unlike E2E attack affects the whole network and obliges all the nodes to retransmit the dropped messages leading then to battery exhausting.

End-to-End delay

Conclusion Provide a security protocol for 6LoWPAN networks,based on the IEEE 802.15.4 security features. ?- Instead of protocol more like a schema?

Reference G. Glissa and A. Meddeb, “6LoWPAN multi-layered security protocol based on IEEE802.15.4 security features,” in 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC) , 2017, pp. 264–269. J.V. Sobral, J.J. Rodrigues, K. Saleem, J. AI-Muhtadi, "Performance evaluation of loadng routing protocol in iot p2p and mp2p applications", Computer and Energy Science (SpliTech) International Multidisciplinary Conference on, pp. 1-6, 2016.