- -

Denial of service mitigation approach for IPv6-enabled smart object networks

RiuNet: Repositorio Institucional de la Universidad Politécnica de Valencia

Compartir/Enviar a

Citas

Estadísticas

  • Estadisticas de Uso

Denial of service mitigation approach for IPv6-enabled smart object networks

Mostrar el registro sencillo del ítem

Ficheros en el ítem

dc.contributor.author Oliveira, Luis M. L. es_ES
dc.contributor.author Rodrigues, Joel J. P. C. es_ES
dc.contributor.author de Sousa, Amaro F. es_ES
dc.contributor.author Lloret, Jaime es_ES
dc.date.accessioned 2014-10-16T14:27:10Z
dc.date.available 2014-10-16T14:27:10Z
dc.date.issued 2013-01
dc.identifier.issn 1532-0626
dc.identifier.uri http://hdl.handle.net/10251/43343
dc.description.abstract Denial of service (DoS) attacks can be defined as any third-party action aiming to reduce or eliminate a network's capability to perform its expected functions. Although there are several standard techniques in traditional computing that mitigate the impact of some of the most common DoS attacks, this still remains a very important open problem to the network security community. DoS attacks are even more troublesome in smart object networks because of two main reasons. First, these devices cannot support the computational overhead required to implement many of the typical counterattack strategies. Second, low traffic rates are enough to drain sensors' battery energy making the network inoperable in short times. To realize the Internet of Things vision, it is necessary to integrate the smart objects into the Internet. This integration is considered an exceptional opportunity for Internet growth but, also, a security threat, because more attacks, including DoS, can be conducted. For these reasons, the prevention of DoS attacks is considered a hot topic in the wireless sensor networks scientific community. In this paper, an approach based on 6LowPAN neighbor discovery protocol is proposed to mitigate DoS attacks initiated from the Internet, without adding additional overhead on the 6LoWPAN sensor devices. es_ES
dc.description.sponsorship This work has been partially supported by the Instituto de Telecomunicacoes, Next Generation Networks and Applications Group (NetGNA), Portugal, and by National Funding from the FCT - Fundacao para a Ciencia e Tecnologia through the Pest-OE/EEI/LA0008/2011. en_EN
dc.language Inglés es_ES
dc.publisher Wiley es_ES
dc.relation.ispartof Concurrency and Computation: Practice and Experience es_ES
dc.rights Reserva de todos los derechos es_ES
dc.subject wireless sensor networks es_ES
dc.subject low-power personal area networks es_ES
dc.subject denial of service attacks es_ES
dc.subject 6LoWPAN neighbor discovery es_ES
dc.subject Internet of Things es_ES
dc.subject.classification INGENIERIA TELEMATICA es_ES
dc.title Denial of service mitigation approach for IPv6-enabled smart object networks es_ES
dc.type Artículo es_ES
dc.identifier.doi 10.1002/cpe.2850
dc.relation.projectID info:eu-repo/grantAgreement/FCT//PEst-OE%2FEEI%2FLA0008%2F2011/PT/ es_ES
dc.rights.accessRights Abierto es_ES
dc.contributor.affiliation Universitat Politècnica de València. Departamento de Comunicaciones - Departament de Comunicacions es_ES
dc.contributor.affiliation Universitat Politècnica de València. Instituto de Investigación para la Gestión Integral de Zonas Costeras - Institut d'Investigació per a la Gestió Integral de Zones Costaneres es_ES
dc.description.bibliographicCitation Oliveira, LML.; Rodrigues, JJPC.; De Sousa, AF.; Lloret, J. (2013). Denial of service mitigation approach for IPv6-enabled smart object networks. Concurrency and Computation: Practice and Experience. 25(1):129-142. doi:10.1002/cpe.2850 es_ES
dc.description.accrualMethod S es_ES
dc.relation.publisherversion http://dx.doi.org/10.1002/cpe.2850 es_ES
dc.description.upvformatpinicio 129 es_ES
dc.description.upvformatpfin 142 es_ES
dc.type.version info:eu-repo/semantics/publishedVersion es_ES
dc.description.volume 25 es_ES
dc.description.issue 1 es_ES
dc.relation.senia 265796
dc.contributor.funder Fundação para a Ciência e a Tecnologia, Portugal es_ES
dc.contributor.funder Instituto de Telecomunicações, Portugal es_ES
dc.description.references Gershenfeld, N., Krikorian, R., & Cohen, D. (2004). The Internet of Things. Scientific American, 291(4), 76-81. doi:10.1038/scientificamerican1004-76 es_ES
dc.description.references Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: a survey. Computer Networks, 38(4), 393-422. doi:10.1016/s1389-1286(01)00302-4 es_ES
dc.description.references Karl, H., & Willig, A. (2005). Protocols and Architectures for Wireless Sensor Networks. doi:10.1002/0470095121 es_ES
dc.description.references IEEE Std 802.15.4-2006 Part 15.4: wireless medium access control (MAC) and physical layer (PHY) specificationsfor low-rate wireless personal area networks (LR-WPANs) 2006 es_ES
dc.description.references ZigBee Alliance ZigBee Specification 2007 es_ES
dc.description.references WirelessHARThomepage 2012 http://www.hartcomm.org/ es_ES
dc.description.references Hui, J. W., & Culler, D. E. (2008). Extending IP to Low-Power, Wireless Personal Area Networks. IEEE Internet Computing, 12(4), 37-45. doi:10.1109/mic.2008.79 es_ES
dc.description.references Kushalnagar N Montenegro G Schumacher C IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals 2007 es_ES
dc.description.references Montenegro G Kushalnagar N Hui J Culler D Transmission of IPv6 Packets over IEEE 802.15.4 Networks 2007 es_ES
dc.description.references Shelby Z Thubert P Hui J Chakrabarti S Bormann C Nordmark E 6LoWPAN Neighbor Discovery 2011 es_ES
dc.description.references Zhou, L., Chao, H.-C., & Vasilakos, A. V. (2011). Joint Forensics-Scheduling Strategy for Delay-Sensitive Multimedia Applications over Heterogeneous Networks. IEEE Journal on Selected Areas in Communications, 29(7), 1358-1367. doi:10.1109/jsac.2011.110803 es_ES
dc.description.references Roman, R., & Lopez, J. (2009). Integrating wireless sensor networks and the internet: a security analysis. Internet Research, 19(2), 246-259. doi:10.1108/10662240910952373 es_ES
dc.description.references Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8(2), 2-23. doi:10.1109/comst.2006.315852 es_ES
dc.description.references Xiaojiang Du, & Hsiao-Hwa Chen. (2008). Security in wireless sensor networks. IEEE Wireless Communications, 15(4), 60-66. doi:10.1109/mwc.2008.4599222 es_ES
dc.description.references Pelechrinis, K., Iliofotou, M., & Krishnamurthy, S. V. (2011). Denial of Service Attacks in Wireless Networks: The Case of Jammers. IEEE Communications Surveys & Tutorials, 13(2), 245-257. doi:10.1109/surv.2011.041110.00022 es_ES
dc.description.references Zhou, L., Wang, X., Tu, W., Muntean, G., & Geller, B. (2010). Distributed scheduling scheme for video streaming over multi-channel multi-radio multi-hop wireless networks. IEEE Journal on Selected Areas in Communications, 28(3), 409-419. doi:10.1109/jsac.2010.100412 es_ES
dc.description.references Lin, K., Lai, C.-F., Liu, X., & Guan, X. (2010). Energy Efficiency Routing with Node Compromised Resistance in Wireless Sensor Networks. Mobile Networks and Applications, 17(1), 75-89. doi:10.1007/s11036-010-0287-x es_ES
dc.description.references Li, H., Lin, K., & Li, K. (2011). Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks. Computer Communications, 34(4), 591-597. doi:10.1016/j.comcom.2010.02.026 es_ES
dc.description.references Oliveira, L. M. L., de Sousa, A. F., & Rodrigues, J. J. P. C. (2011). Routing and mobility approaches in IPv6 over LoWPAN mesh networks. International Journal of Communication Systems, 24(11), 1445-1466. doi:10.1002/dac.1228 es_ES
dc.description.references Narten T Nordmark E Simpson W Soliman H Neighbor Discovery for IP version 6 (IPv6) 2007 es_ES
dc.description.references Singh H Beebee W Nordmark E IPv6 Subnet Model: The Relationship between Links and Subnet Prefixes 2010 es_ES
dc.description.references Roman, R., Lopez, J., & Gritzalis, S. (2008). Situation awareness mechanisms for wireless sensor networks. IEEE Communications Magazine, 46(4), 102-107. doi:10.1109/mcom.2008.4481348 es_ES
dc.description.references Sakarindr, P., & Ansari, N. (2007). Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks. IEEE Wireless Communications, 14(5), 8-20. doi:10.1109/mwc.2007.4396938 es_ES
dc.description.references Tsao T Alexander R Dohler M Daza V Lozano A A Security Framework for Routing over Low Power and Lossy Networks 2009 es_ES
dc.description.references Karlof C Wagner D Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 2003 113 127 10.1109/SNPA.2003.1203362 es_ES
dc.description.references Hui J Thubert P Compression Format for IPv6 Datagrams in 6LoWPAN Networks 2009 es_ES
dc.description.references Elaine Shi, & Perrig, A. (2004). Designing Secure Sensor Networks. IEEE Wireless Communications, 11(6), 38-43. doi:10.1109/mwc.2004.1368895 es_ES
dc.description.references Akkaya, K., & Younis, M. (2005). A survey on routing protocols for wireless sensor networks. Ad Hoc Networks, 3(3), 325-349. doi:10.1016/j.adhoc.2003.09.010 es_ES


Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem