Visible to the public Resolving Threats in IoT: ID Spoofing to DDoS

TitleResolving Threats in IoT: ID Spoofing to DDoS
Publication TypeConference Paper
Year of Publication2018
AuthorsMishra, A., Dixit, A.
Conference Name2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
ISBN Number978-1-5386-4430-0
Keywords6LoWPAN, administrative machines, Botnet, composability, Computer crime, computer network security, DDoS, DDoS stress, ID Spoofing, ID spoofing vulnerabilities, ID validation time, Internet of Things, Internet-of-Things, invasive software, IoT, IP networks, IP-enabled devices, malicious machines spoof ID, Malware, Peer-to-peer computing, personal area network model, personal area networks, PRIG-adapted 6LoWPAN, Protocols, PseudoRandom Identity Generator, pubcrawl, Resiliency, resource-constrained network, security of data, unique identity, Zigbee
Abstract

Internet-of-Things (IoT) is a resource-constrained network with machines low on power, processing and memory capabilities. Resource constraints in IoT impact the adoption of protocols for design and validation of unique identity (ID) for every machine. Malicious machines spoof ID to pose as administrative machines and program their neighbour systems in the network with malware. The cycle of ID spoofing and infecting the IP-enabled devices with malware creates an entire network popularly termed as the Botnet. In this paper, we study 6LoWPAN and ZigBee for DDoS and ID spoofing vulnerabilities. We propose a design for generation and validation of ID on such systems called Pseudo Random Identity Generator (PRIG). We compare the performance of PRIG-adapted 6LoWPAN with 6LoWPAN in a simulated personal area network (PAN) model under DDoS stress and demonstrate a 93% reduction in ID validation time as well as an improvement of 67% in overall throughput.

URLhttps://ieeexplore.ieee.org/document/8493729
DOI10.1109/ICCCNT.2018.8493729
Citation Keymishra_resolving_2018