Mostrar el registro sencillo del ítem
dc.contributor.author | Oliveira, Luis M. L. | es_ES |
dc.contributor.author | Rodrigues, Joel J. P. C. | es_ES |
dc.contributor.author | de Sousa, Amaro F. | es_ES |
dc.contributor.author | Lloret, Jaime | es_ES |
dc.date.accessioned | 2014-10-16T14:27:10Z | |
dc.date.available | 2014-10-16T14:27:10Z | |
dc.date.issued | 2013-01 | |
dc.identifier.issn | 1532-0626 | |
dc.identifier.uri | http://hdl.handle.net/10251/43343 | |
dc.description.abstract | Denial of service (DoS) attacks can be defined as any third-party action aiming to reduce or eliminate a network's capability to perform its expected functions. Although there are several standard techniques in traditional computing that mitigate the impact of some of the most common DoS attacks, this still remains a very important open problem to the network security community. DoS attacks are even more troublesome in smart object networks because of two main reasons. First, these devices cannot support the computational overhead required to implement many of the typical counterattack strategies. Second, low traffic rates are enough to drain sensors' battery energy making the network inoperable in short times. To realize the Internet of Things vision, it is necessary to integrate the smart objects into the Internet. This integration is considered an exceptional opportunity for Internet growth but, also, a security threat, because more attacks, including DoS, can be conducted. For these reasons, the prevention of DoS attacks is considered a hot topic in the wireless sensor networks scientific community. In this paper, an approach based on 6LowPAN neighbor discovery protocol is proposed to mitigate DoS attacks initiated from the Internet, without adding additional overhead on the 6LoWPAN sensor devices. | es_ES |
dc.description.sponsorship | This work has been partially supported by the Instituto de Telecomunicacoes, Next Generation Networks and Applications Group (NetGNA), Portugal, and by National Funding from the FCT - Fundacao para a Ciencia e Tecnologia through the Pest-OE/EEI/LA0008/2011. | en_EN |
dc.language | Inglés | es_ES |
dc.publisher | Wiley | es_ES |
dc.relation.ispartof | Concurrency and Computation: Practice and Experience | es_ES |
dc.rights | Reserva de todos los derechos | es_ES |
dc.subject | wireless sensor networks | es_ES |
dc.subject | low-power personal area networks | es_ES |
dc.subject | denial of service attacks | es_ES |
dc.subject | 6LoWPAN neighbor discovery | es_ES |
dc.subject | Internet of Things | es_ES |
dc.subject.classification | INGENIERIA TELEMATICA | es_ES |
dc.title | Denial of service mitigation approach for IPv6-enabled smart object networks | es_ES |
dc.type | Artículo | es_ES |
dc.identifier.doi | 10.1002/cpe.2850 | |
dc.relation.projectID | info:eu-repo/grantAgreement/FCT//PEst-OE%2FEEI%2FLA0008%2F2011/PT/ | es_ES |
dc.rights.accessRights | Abierto | es_ES |
dc.contributor.affiliation | Universitat Politècnica de València. Departamento de Comunicaciones - Departament de Comunicacions | es_ES |
dc.contributor.affiliation | Universitat Politècnica de València. Instituto de Investigación para la Gestión Integral de Zonas Costeras - Institut d'Investigació per a la Gestió Integral de Zones Costaneres | es_ES |
dc.description.bibliographicCitation | Oliveira, LML.; Rodrigues, JJPC.; De Sousa, AF.; Lloret, J. (2013). Denial of service mitigation approach for IPv6-enabled smart object networks. Concurrency and Computation: Practice and Experience. 25(1):129-142. doi:10.1002/cpe.2850 | es_ES |
dc.description.accrualMethod | S | es_ES |
dc.relation.publisherversion | http://dx.doi.org/10.1002/cpe.2850 | es_ES |
dc.description.upvformatpinicio | 129 | es_ES |
dc.description.upvformatpfin | 142 | es_ES |
dc.type.version | info:eu-repo/semantics/publishedVersion | es_ES |
dc.description.volume | 25 | es_ES |
dc.description.issue | 1 | es_ES |
dc.relation.senia | 265796 | |
dc.contributor.funder | Fundação para a Ciência e a Tecnologia, Portugal | es_ES |
dc.contributor.funder | Instituto de Telecomunicações, Portugal | es_ES |
dc.description.references | Gershenfeld, N., Krikorian, R., & Cohen, D. (2004). The Internet of Things. Scientific American, 291(4), 76-81. doi:10.1038/scientificamerican1004-76 | es_ES |
dc.description.references | Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: a survey. Computer Networks, 38(4), 393-422. doi:10.1016/s1389-1286(01)00302-4 | es_ES |
dc.description.references | Karl, H., & Willig, A. (2005). Protocols and Architectures for Wireless Sensor Networks. doi:10.1002/0470095121 | es_ES |
dc.description.references | IEEE Std 802.15.4-2006 Part 15.4: wireless medium access control (MAC) and physical layer (PHY) specificationsfor low-rate wireless personal area networks (LR-WPANs) 2006 | es_ES |
dc.description.references | ZigBee Alliance ZigBee Specification 2007 | es_ES |
dc.description.references | WirelessHARThomepage 2012 http://www.hartcomm.org/ | es_ES |
dc.description.references | Hui, J. W., & Culler, D. E. (2008). Extending IP to Low-Power, Wireless Personal Area Networks. IEEE Internet Computing, 12(4), 37-45. doi:10.1109/mic.2008.79 | es_ES |
dc.description.references | Kushalnagar N Montenegro G Schumacher C IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals 2007 | es_ES |
dc.description.references | Montenegro G Kushalnagar N Hui J Culler D Transmission of IPv6 Packets over IEEE 802.15.4 Networks 2007 | es_ES |
dc.description.references | Shelby Z Thubert P Hui J Chakrabarti S Bormann C Nordmark E 6LoWPAN Neighbor Discovery 2011 | es_ES |
dc.description.references | Zhou, L., Chao, H.-C., & Vasilakos, A. V. (2011). Joint Forensics-Scheduling Strategy for Delay-Sensitive Multimedia Applications over Heterogeneous Networks. IEEE Journal on Selected Areas in Communications, 29(7), 1358-1367. doi:10.1109/jsac.2011.110803 | es_ES |
dc.description.references | Roman, R., & Lopez, J. (2009). Integrating wireless sensor networks and the internet: a security analysis. Internet Research, 19(2), 246-259. doi:10.1108/10662240910952373 | es_ES |
dc.description.references | Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8(2), 2-23. doi:10.1109/comst.2006.315852 | es_ES |
dc.description.references | Xiaojiang Du, & Hsiao-Hwa Chen. (2008). Security in wireless sensor networks. IEEE Wireless Communications, 15(4), 60-66. doi:10.1109/mwc.2008.4599222 | es_ES |
dc.description.references | Pelechrinis, K., Iliofotou, M., & Krishnamurthy, S. V. (2011). Denial of Service Attacks in Wireless Networks: The Case of Jammers. IEEE Communications Surveys & Tutorials, 13(2), 245-257. doi:10.1109/surv.2011.041110.00022 | es_ES |
dc.description.references | Zhou, L., Wang, X., Tu, W., Muntean, G., & Geller, B. (2010). Distributed scheduling scheme for video streaming over multi-channel multi-radio multi-hop wireless networks. IEEE Journal on Selected Areas in Communications, 28(3), 409-419. doi:10.1109/jsac.2010.100412 | es_ES |
dc.description.references | Lin, K., Lai, C.-F., Liu, X., & Guan, X. (2010). Energy Efficiency Routing with Node Compromised Resistance in Wireless Sensor Networks. Mobile Networks and Applications, 17(1), 75-89. doi:10.1007/s11036-010-0287-x | es_ES |
dc.description.references | Li, H., Lin, K., & Li, K. (2011). Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks. Computer Communications, 34(4), 591-597. doi:10.1016/j.comcom.2010.02.026 | es_ES |
dc.description.references | Oliveira, L. M. L., de Sousa, A. F., & Rodrigues, J. J. P. C. (2011). Routing and mobility approaches in IPv6 over LoWPAN mesh networks. International Journal of Communication Systems, 24(11), 1445-1466. doi:10.1002/dac.1228 | es_ES |
dc.description.references | Narten T Nordmark E Simpson W Soliman H Neighbor Discovery for IP version 6 (IPv6) 2007 | es_ES |
dc.description.references | Singh H Beebee W Nordmark E IPv6 Subnet Model: The Relationship between Links and Subnet Prefixes 2010 | es_ES |
dc.description.references | Roman, R., Lopez, J., & Gritzalis, S. (2008). Situation awareness mechanisms for wireless sensor networks. IEEE Communications Magazine, 46(4), 102-107. doi:10.1109/mcom.2008.4481348 | es_ES |
dc.description.references | Sakarindr, P., & Ansari, N. (2007). Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks. IEEE Wireless Communications, 14(5), 8-20. doi:10.1109/mwc.2007.4396938 | es_ES |
dc.description.references | Tsao T Alexander R Dohler M Daza V Lozano A A Security Framework for Routing over Low Power and Lossy Networks 2009 | es_ES |
dc.description.references | Karlof C Wagner D Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 2003 113 127 10.1109/SNPA.2003.1203362 | es_ES |
dc.description.references | Hui J Thubert P Compression Format for IPv6 Datagrams in 6LoWPAN Networks 2009 | es_ES |
dc.description.references | Elaine Shi, & Perrig, A. (2004). Designing Secure Sensor Networks. IEEE Wireless Communications, 11(6), 38-43. doi:10.1109/mwc.2004.1368895 | es_ES |
dc.description.references | Akkaya, K., & Younis, M. (2005). A survey on routing protocols for wireless sensor networks. Ad Hoc Networks, 3(3), 325-349. doi:10.1016/j.adhoc.2003.09.010 | es_ES |