Experimental Study of IP Spoofing Attack in 6LoWPAN Network
Title | Experimental Study of IP Spoofing Attack in 6LoWPAN Network |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Mavani, M., Asawa, K. |
Conference Name | 2017 7th International Conference on Cloud Computing, Data Science Engineering - Confluence |
ISBN Number | 978-1-5090-3519-9 |
Keywords | 6LoWPAN, 6LoWPAN control messages, 6LoWPAN network, 6LoWPAN-ND, access protocols, composability, computer network security, Cooja Simulator, cyber physical systems security, Encryption, energy consumption, Internet of Things, IP networks, IP spoofing attack, IPv6 protocol, IPv6 Spoofing, lossy personal area networks, low power personal area networks, Media Access Protocol, memory consumption, personal area networks, pubcrawl, Registers, resilience, Resiliency, Routing protocols, RPL, telecommunication power management, wrong IPv6-MAC binding |
Abstract | 6L0WPAN is a communication protocol for Internet of Things. 6LoWPAN is IPv6 protocol modified for low power and lossy personal area networks. 6LoWPAN inherits threats from its predecessors IPv4 and IPv6. IP spoofing is a known attack prevalent in IPv4 and IPv6 networks but there are new vulnerabilities which creates new paths, leading to the attack. This study performs the experimental study to check the feasibility of performing IP spoofing attack on 6LoWPAN Network. Intruder misuses 6LoWPAN control messages which results into wrong IPv6-MAC binding in router. Attack is also simulated in cooja simulator. Simulated results are analyzed for finding cost to the attacker in terms of energy and memory consumption. |
URL | http://ieeexplore.ieee.org/document/7943192/ |
DOI | 10.1109/CONFLUENCE.2017.7943192 |
Citation Key | mavani_experimental_2017 |
- IPv6 protocol
- wrong IPv6-MAC binding
- telecommunication power management
- RPL
- Routing protocols
- Resiliency
- resilience
- Registers
- pubcrawl
- personal area networks
- memory consumption
- Media Access Protocol
- low power personal area networks
- lossy personal area networks
- IPv6 Spoofing
- 6LoWPAN
- IP spoofing attack
- IP networks
- Internet of Things
- energy consumption
- encryption
- Cyber Physical Systems Security
- Cooja Simulator
- computer network security
- composability
- access protocols
- 6LoWPAN-ND
- 6LoWPAN network
- 6LoWPAN control messages