Visible to the public Biblio

Filters: Author is Ullrich, Johanna  [Clear All Filters]
2018-05-16
Khan, Zeeshan Ali, Ullrich, Johanna, Voyiatzis, Artemios G., Herrmann, Peter.  2017.  A Trust-based Resilient Routing Mechanism for the Internet of Things. Proceedings of the 12th International Conference on Availability, Reliability and Security. :27:1–27:6.
Local-area networks comprising the Internet of Things (IoT) consist mainly of devices that have limited processing capabilities and face energy constraints. This has an implication on developing security mechanisms, as they require significant computing resources. In this paper, we design a trust-based routing solution with IoT devices in mind. Specifically, we propose a trust-based approach for managing the reputation of every node of an IoT network. The approach is based on the emerging Routing Protocol for Low power and Lossy networks (RPL). The proposed solution is simulated for its routing resilience and compared with two other variants of RPL.
2018-02-28
Judmayer, Aljosha, Ullrich, Johanna, Merzdovnik, Georg, Voyiatzis, Artemios G., Weippl, Edgar.  2017.  Lightweight Address Hopping for Defending the IPv6 IoT. Proceedings of the 12th International Conference on Availability, Reliability and Security. :20:1–20:10.
The rapid deployment of IoT systems on the public Internet is not without concerns for the security and privacy of consumers. Security in IoT systems is often poorly engineered and engineering for privacy does notseemtobea concern for vendors at all. Thecombination of poor security hygiene and access to valuable knowledge renders IoT systems a much-sought target for attacks. IoT systems are not only Internet-accessible but also play the role of servers according to the established client-server communication model and are thus configured with static and/or easily predictable IPv6 addresses, rendering them an easy target for attacks. We present 6HOP, a novel addressing scheme for IoT devices. Our proposal is lightweight in operation, requires minimal administration overhead, and defends against reconnaissance attacks, address based correlation as well as denial-of-service attacks. 6HOP therefore exploits the ample address space available in IPv6 networks and provides effective protection this way.