skip to main content
10.1145/2508859.2512494acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
demonstration

DEMO: An IDS framework for internet of things empowered by 6LoWPAN

Published:04 November 2013Publication History

ABSTRACT

The Internet of Things (IoT) is an emerging paradigm where smart objects are seamlessly connected to the overall Internet and can potentially cooperate to achieve common objectives such as supporting innovative home automation services. With reference to such a scenario, this paper presents an Intrusion Detection System (IDS) framework for IoT empowered by IPv6 over low-power personal area network (6LoWPAN) devices. In fact, 6LoWPAN is an interesting protocol supporting the realization of IoT in a resource constrained environment. 6LoWPAN devices are vulnerable to attacks inherited from both the wireless sensor networks and the Internet protocols. The proposed IDS framework which includes a monitoring system and a detection engine has been integrated into the network framework developed within the EU FP7 project `ebbits'. A penetration testing (PenTest) system had been used to evaluate the performance of the implemented IDS framework. Preliminary tests revealed that the proposed framework represents a promising solution for ensuring better security in 6LoWPANs.

References

  1. ebbits. Eu fp7 project -'enabling the business-based internet of things and services'. website {Online} www.ebbits-project.eu, Accessed May 2013.Google ScholarGoogle Scholar
  2. A. H. Farooqi and F. A. Khan. Intrusion detection systems for wireless sensor networks: A survey. In Communication and networking, pages 234--241. Springer, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  3. P. Kasinathan, C. Pastrone, M. A. Spirito, and M. Vinkovits. Denial-of-Service detection in 6LoWPAN based internet of things. In 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob'13), Lyon, France, Oct. 2013.Google ScholarGoogle ScholarCross RefCross Ref
  4. A. Lahmadi, C. Brandin, and O. Festor. A testing framework for discovering vulnerabilities in 6lowpan networks. In Distributed Computing in Sensor Systems (DCOSS), 2012 IEEE 8th International Conference on, pages 335--340, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Metasploit. Metasploit Penetration Testing Software. website {online} http://www.metasploit.com/, Accessed May 2013.Google ScholarGoogle Scholar
  6. A. Mitrokotsa and A. Karygiannis. Intrusion detection techniques in sensor networks. Wireless Sensor Network Security, ed. J. Lopez and J. Zhou, pages 251--272, 2008.Google ScholarGoogle Scholar
  7. D. R. Raymond and S. F. Midkiff. Denial-of-service in wireless sensor networks: Attacks and defenses. Pervasive Computing, IEEE, 7(1):74--81, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Raza, L. Wallgren, and T. Voigt. SVELTE: Real-time Intrusion Detection in the Internet of Things. Ad Hoc Networks, Elsevier, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Suricata. - The Next Generation Intrusion Detection System. website {online} www.openinfosecfoundation.org/, Accessed May 2013.Google ScholarGoogle Scholar
  10. R. Tomasi, H. Khaleel, F. Penna, C. Pastrone, R. Garello, and M. Spirito. Frequency agility in ipv6-based wireless personal area networks (6lowpan). In E. Osipov, A. Kassler, T. Bohnert, and X. Masip-Bruin, editors, Wired/Wireless Internet Communications, pages 146--157. Springer Berlin Heidelberg, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. DEMO: An IDS framework for internet of things empowered by 6LoWPAN

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
      November 2013
      1530 pages
      ISBN:9781450324779
      DOI:10.1145/2508859

      Copyright © 2013 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 November 2013

      Check for updates

      Qualifiers

      • demonstration

      Acceptance Rates

      CCS '13 Paper Acceptance Rate105of530submissions,20%Overall Acceptance Rate1,261of6,999submissions,18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader