Visible to the public Experimental Study of IP Spoofing Attack in 6LoWPAN Network

TitleExperimental Study of IP Spoofing Attack in 6LoWPAN Network
Publication TypeConference Paper
Year of Publication2017
AuthorsMavani, M., Asawa, K.
Conference Name2017 7th International Conference on Cloud Computing, Data Science Engineering - Confluence
ISBN Number978-1-5090-3519-9
Keywords6LoWPAN, 6LoWPAN control messages, 6LoWPAN network, 6LoWPAN-ND, access protocols, composability, computer network security, Cooja Simulator, cyber physical systems security, Encryption, energy consumption, Internet of Things, IP networks, IP spoofing attack, IPv6 protocol, IPv6 Spoofing, lossy personal area networks, low power personal area networks, Media Access Protocol, memory consumption, personal area networks, pubcrawl, Registers, resilience, Resiliency, Routing protocols, RPL, telecommunication power management, wrong IPv6-MAC binding
Abstract

6L0WPAN is a communication protocol for Internet of Things. 6LoWPAN is IPv6 protocol modified for low power and lossy personal area networks. 6LoWPAN inherits threats from its predecessors IPv4 and IPv6. IP spoofing is a known attack prevalent in IPv4 and IPv6 networks but there are new vulnerabilities which creates new paths, leading to the attack. This study performs the experimental study to check the feasibility of performing IP spoofing attack on 6LoWPAN Network. Intruder misuses 6LoWPAN control messages which results into wrong IPv6-MAC binding in router. Attack is also simulated in cooja simulator. Simulated results are analyzed for finding cost to the attacker in terms of energy and memory consumption.

URLhttp://ieeexplore.ieee.org/document/7943192/
DOI10.1109/CONFLUENCE.2017.7943192
Citation Keymavani_experimental_2017