Denial of service mitigation approach for IPv6-enabled smart object networks

نویسندگان

  • Luís M. L. Oliveira
  • Joel J. P. C. Rodrigues
  • Amaro F. de Sousa
  • Jaime Lloret Mauri
چکیده

Denial of service (DoS) attacks can be defined as any third-party action aiming to reduce or eliminate a network’s capability to perform its expected functions. Although there are several standard techniques in traditional computing that mitigate the impact of some of the most common DoS attacks, this still remains a very important open problem to the network security community. DoS attacks are even more troublesome in smart object networks because of two main reasons. First, these devices cannot support the computational overhead required to implement many of the typical counterattack strategies. Second, low traffic rates are enough to drain sensors’ battery energy making the network inoperable in short times. To realize the Internet of Things vision, it is necessary to integrate the smart objects into the Internet. This integration is considered an exceptional opportunity for Internet growth but, also, a security threat, because more attacks, including DoS, can be conducted. For these reasons, the prevention of DoS attacks is considered a hot topic in the wireless sensor networks scientific community. In this paper, an approach based on 6LowPAN neighbor discovery protocol is proposed to mitigate DoS attacks initiated from the Internet, without adding additional overhead on the 6LoWPAN sensor devices. Copyright © 2012 John Wiley & Sons, Ltd.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An architecture for "Web Of Things" using SOCKS protocol based IPv6/IPv4 gatewaying for heterogeneous communication

“Web of Things” evolved from “Internet of Things”. Lot of research has been done in designing architecture for “Web of Things”. Two main architectures are Smart gateway based architecture and embedded Web Server based architectture. These architectures address some of the basic and essential issues relating to Service Oriented Architecture for “Web of Things”. Taking into consideration the peri...

متن کامل

R Eview on Ip V 6 S Ecurity V Ulnerability I Ssues and M Itigation

One of the main purposes of Internet Protocol version 6 (IPv6) developments was to solve the IP address depletion concern due to the burgeoning growth of the Internet users. The new Internet protocol provides end-to-end communication, enhanced security and extensibility apart from the other features such as address auto-configuration or plug-and-play and faster packet processing in the routers....

متن کامل

A mobility framework to improve heterogeneous wireless network services

We propose and investigate the Internet Protocol version 6 (IPv6) enabled mobility framework to improve the user mobility experience in heterogenous wireless networks. The framework considers the traditional IP network infrastructure, IPv6 based mobility support, multihoming, traffic flow transparent handovers and flat/dynamic mobility policy enforcement to guarantee the Quality of Service (QoS...

متن کامل

On the Potential of IPv6 Open Resolvers for DDoS Attacks

Distributed Denial of Service (DDoS) attacks have become a daily problem in today’s Internet. These attacks aim at overwhelming online services or network infrastrucure. Some DDoS attacks explore open services to perform reflected and amplified attacks; and the DNS is one of the most (mis)used systems by attackers. This problem can be further aggravated in the near future by the increasing numb...

متن کامل

Multi-domain DDoS Mitigation Based on Blockchains

The exponential increase of the traffic volume makes Distributed Denial-of-Service (DDoS) attacks a top security threat to service providers. Existing DDoS defense mechanisms lack resources and flexibility to cope with attacks by themselves, and by utilizing other’s companies resources, the burden of the mitigation can be shared. Technologies as blockchain and smart contracts allow distributing...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Concurrency and Computation: Practice and Experience

دوره 25  شماره 

صفحات  -

تاریخ انتشار 2013