Specification-based anomaly detection: a new approach for detecting network intrusions
Proceedings of the 9th ACM conference on Computer and communications security
A specification-based intrusion detection system for AODV
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Decentralized intrusion detection in wireless sensor networks
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
A study of a routing attack in OLSR-based mobile ad hoc networks
International Journal of Communication Systems
Protection Against Packet Fragmentation Attacks at 6LoWPAN Adaptation Layer
ICHIT '08 Proceedings of the 2008 International Conference on Convergence and Hybrid Information Technology
Distributed Intrusion Detection Systems for Enhancing Security in Mobile Wireless Sensor Networks
International Journal of Distributed Sensor Networks - Advances on Heterogeneous Wireless Sensor Networks
Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection
Feature Selection: A Hybrid Approach Based on Self-Adaptive Ant Colony and Support Vector Machine
CSSE '08 Proceedings of the 2008 International Conference on Computer Science and Software Engineering - Volume 04
A novel intrusion detection framework for IP-based sensor networks
ICOIN'09 Proceedings of the 23rd international conference on Information Networking
Intrusion Detection System Based on Payoff Matrix for Wireless Sensor Networks
WGEC '09 Proceedings of the 2009 Third International Conference on Genetic and Evolutionary Computing
Attack model and detection scheme for Botnet on 6LoWPAN
APNOMS'09 Proceedings of the 12th Asia-Pacific network operations and management conference on Management enabling the future internet for changing business and new computing services
6LoWPAN: The Wireless Embedded Internet
6LoWPAN: The Wireless Embedded Internet
The Internet of Things: A survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Interconnecting Smart Objects with IP: The Next Internet
Interconnecting Smart Objects with IP: The Next Internet
Investigation of Security and Defense System for Home Based on Internet of Things
WISM '10 Proceedings of the 2010 International Conference on Web Information Systems and Mining - Volume 02
Research on the Architecture of Trusted Security System Based on the Internet of Things
ICICTA '11 Proceedings of the 2011 Fourth International Conference on Intelligent Computation Technology and Automation - Volume 02
Fuzzy logic anomaly detection scheme for directed diffusion based sensor networks
FSKD'06 Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery
An EFSM-based intrusion detection system for ad hoc networks
ATVA'05 Proceedings of the Third international conference on Automated Technology for Verification and Analysis
An anomaly detection algorithm for detecting attacks in wireless sensor networks
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
A specification-based intrusion detection model for OLSR
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Ranger intrusion detection system for wireless sensor networks with Sybil attack based on ontology
AIC'10/BEBI'10 Proceedings of the 10th WSEAS international conference on applied informatics and communications, and 3rd WSEAS international conference on Biomedical electronics and biomedical informatics
Designing secure sensor networks
IEEE Wireless Communications
Routing and mobility approaches in IPv6 over LoWPAN mesh networks
International Journal of Communication Systems
Hierarchical and low-power IPv6 address configuration for wireless sensor networks
International Journal of Communication Systems
6LoWPAN fragmentation attacks and mitigation mechanisms
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Hi-index | 0.00 |
Fuelled to bring the Internet of Things concept to real life, the Internet Engineering Task Force is working on 6LoWPAN, in which the standard allows a vast number of smart objects to be deployed in local wireless sensor networks (WSNs) using the huge address space of IPv6 for data and information harvesting through the Internet. From the security point of view, 6LoWPAN/WSN will be open to security threats from the local network itself and the Internet. Cryptography techniques applied as the front line of defence or deterrent can easily be broken because of the weak secure nature of LoWPAN devices and the wireless environment. Compromised nodes could lead to insider attacks without being detected by any cryptography checking. An intrusion detection system (IDS) is, primarily needed as a second line of defence to monitor the network operations and raise an alarm in case of any anomaly. This paper analyses potential security threats in 6LoWPAN and reviews the current countermeasures, in particular, the IDS-based solutions for countering insider/internal threats. Additionally, it discovers three novel QoS-related security threats, namely rank attack, local repair attack, and resource depleting attack, which are more seriously affecting the routing protocol for low-power and lossy network, the routing protocol used to establish 6LoWPAN network topology. A new two-layer IDS concept is introduced as a countermeasure method for securing the routing protocol for low-power and lossy network-built network topology from the internal QoS attacks. Potential research works are also presented to provide baseline reference to researchers in this field. Copyright © 2012 John Wiley & Sons, Ltd.