Browse > Article
http://dx.doi.org/10.13089/JKIISC.2019.29.1.17

Secure 6LoWPAN Neighbor Discovery Address Registration Protocol  

Han, Sang-woo (Dankook University)
Park, Chang-seop (Dankook University)
Abstract
6LoWPAN based on IEEE 802.15.4 is a realistic standard platform for various Internet of Things (IoT) applications. To bootstrap the LoWPAN (Low-power Wireless Personal Area Network), each device must perform 6LoWPAN-ND address registration to assign a unique IPv6 address. Without adequate security mechanisms, 6LoWPAN-ND is vulnerable to a variety of security attacks including corrupted node attacks. Several security mechanisms have been proposed as a supplement to the vulnerability, but the vulnerability exists because it relies solely on IEEE 802.15.4 hop-by-hop security. In this paper, we propose and analyze a vulnerability of 6LoWPAN-ND address registration and a new security mechanism suitable for preventing the attack of damaged node. It also shows that the proposed security mechanism is compatible with the Internet Engineering Task Force (IETF) standard and is more efficient than the mechanism proposed in the IETF 6 lo WG.
Keywords
6LoWPAN; Neighbor Discovery; Address Registration;
Citations & Related Records
연도 인용수 순위
  • Reference
1 G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler, "Transmission of IPv6 Packets over IEEE 802.15.4 Networks," IETF RFC 4944, Sep. 2007.
2 J. Hui and P. Thubert, "Compression Format for IPv6 Datagrams over IEEE 802.15.4-based Networks," IETF RFC 6282, Sep. 2011.
3 S. Misra, S. Goswam, C. Taneja, A. Mukerjee, and M. Obaidat, "A PKI Adapted Model for Secure Information Dissemination in Industrial Control and Automation 6LoWPANs," IEEE Access, vol. 3, pp. 875-889, 2015   DOI
4 Y. Qiu and M. Ma, "A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks," IEEE Trans. on Industrial Informatics, vol. 12, no. 6, pp. 2074-2085, Dec. 2016.   DOI
5 Certicom Research, "SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV)," Standard for Efficient Cryptography, Jan. 2013.
6 P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, "PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications," International Journal of Distributed Sensor Networks, vol. 2014, Article ID 357430.
7 C. S. Park, "A Secure and Efficient ECQV Implicit Certificate Issuance Protocol for the Internet of Things Applications," IEEE Sensors Journal, vol. 17, no. 7, pp. 2215-2223, Apr. 2017   DOI
8 L. Oliveira, J. Rodrigues, A. Sousa, and V. Denisov, "Network Admission Control Solution for 6LoWPAN Networks Based on Symmetric Key Mechanisms," IEEE Trans. on Industrial Informatics, vol. 12, no. 6, pp. 2186-2195, Dec. 2016.   DOI
9 L. Eschenauer and V. Gligor, "A Key Management Scheme for Distributed Sensor Networks," in Proc. of 9th ACM conference on Computer and Communications Security (ACM-CCS), pp. 41-47, Washington D.C., U.S.A., Nov. 18-22, 2002.
10 H. Chan, A. Perrig, and D. Song, "Random Key Pre-distribution Schemes for Sensor Networks", in Proc. of the IEEE Symposium on Security and Privacy, 2003, pp. 197-213, Washington D.C., U.S.A., May 11-14, 2003.
11 L. Seitz, S. Gerdes, G. Selander, M. Mani, and S. Kumar, "Use Cases for Authentication and Authorization in Constrained Environments," IETF RFC 7744, Jan. 2016.
12 A. Esfahani, G. Mantas, R. Matischek, F. B. Saghezchi, J. Rodriguez, A. Bicaku, S. Maksuti, M. Tauber, C. Schmittner, and J. Bastos, "A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment," IEEE Internet of Things Journal, 2017.
13 Z. Shelby, S. Chakrabarti, E. Nordmark, and C. Bormann, "Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)," IETF RFC 6775, Nov. 2012.
14 J. Nieminen, T. Savolainen, M. Isomaki, B. Patil, Z. Shelby, and C. Gomez, "IPv6 over Bluetooth Low Energy," IETF RFC 7668, Oct. 2015.
15 M.A.M. Seliem, K.M.F. Elsayed, and A Kattab, "Optimized Neighbor Discovery for 6LoWPANs: Implementation and Performance Evaluation," Computer Communications, vol. 112, pp. 73-92, Nov. 2017.   DOI
16 C. S. Park and J. H. Lee, "Security Bootstrapping for Secure Join and Binding on the IEEE 802.15.4-Based LoWPAN," IEEE Internet of Things Journal, vol. 4, no. 4, pp. 996-1005, May. 2017.   DOI
17 J. Arkko, J. Kempf, B. Zill, and P. Nikander, "Secure Neighbor Discovery," IETF RFC 3971, Mar. 2005.
18 P. Thubert, B. Sarikaya, and M. Sethi, "Address Protected Neighbor Discovery for Low-power and Lossy Networks," IETF 6lo WG Internet-Draft, draft-ietf-6lo-ap-nd-06, Feb. 2018.