Resolving Threats in IoT: ID Spoofing to DDoS
Title | Resolving Threats in IoT: ID Spoofing to DDoS |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Mishra, A., Dixit, A. |
Conference Name | 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT) |
ISBN Number | 978-1-5386-4430-0 |
Keywords | 6LoWPAN, administrative machines, Botnet, composability, Computer crime, computer network security, DDoS, DDoS stress, ID Spoofing, ID spoofing vulnerabilities, ID validation time, Internet of Things, Internet-of-Things, invasive software, IoT, IP networks, IP-enabled devices, malicious machines spoof ID, Malware, Peer-to-peer computing, personal area network model, personal area networks, PRIG-adapted 6LoWPAN, Protocols, PseudoRandom Identity Generator, pubcrawl, Resiliency, resource-constrained network, security of data, unique identity, Zigbee |
Abstract | Internet-of-Things (IoT) is a resource-constrained network with machines low on power, processing and memory capabilities. Resource constraints in IoT impact the adoption of protocols for design and validation of unique identity (ID) for every machine. Malicious machines spoof ID to pose as administrative machines and program their neighbour systems in the network with malware. The cycle of ID spoofing and infecting the IP-enabled devices with malware creates an entire network popularly termed as the Botnet. In this paper, we study 6LoWPAN and ZigBee for DDoS and ID spoofing vulnerabilities. We propose a design for generation and validation of ID on such systems called Pseudo Random Identity Generator (PRIG). We compare the performance of PRIG-adapted 6LoWPAN with 6LoWPAN in a simulated personal area network (PAN) model under DDoS stress and demonstrate a 93% reduction in ID validation time as well as an improvement of 67% in overall throughput. |
URL | https://ieeexplore.ieee.org/document/8493729 |
DOI | 10.1109/ICCCNT.2018.8493729 |
Citation Key | mishra_resolving_2018 |
- IP networks
- Zigbee
- unique identity
- security of data
- resource-constrained network
- Resiliency
- pubcrawl
- PseudoRandom Identity Generator
- Protocols
- PRIG-adapted 6LoWPAN
- personal area networks
- personal area network model
- Peer-to-peer computing
- malware
- malicious machines spoof ID
- IP-enabled devices
- 6LoWPAN
- IoT
- invasive software
- Internet-of-Things
- Internet of Things
- ID validation time
- ID spoofing vulnerabilities
- ID Spoofing
- DDoS stress
- DDoS
- computer network security
- Computer crime
- composability
- botnet
- administrative machines