ABSTRACT
The Internet of Things (IoT) is an emerging paradigm where smart objects are seamlessly connected to the overall Internet and can potentially cooperate to achieve common objectives such as supporting innovative home automation services. With reference to such a scenario, this paper presents an Intrusion Detection System (IDS) framework for IoT empowered by IPv6 over low-power personal area network (6LoWPAN) devices. In fact, 6LoWPAN is an interesting protocol supporting the realization of IoT in a resource constrained environment. 6LoWPAN devices are vulnerable to attacks inherited from both the wireless sensor networks and the Internet protocols. The proposed IDS framework which includes a monitoring system and a detection engine has been integrated into the network framework developed within the EU FP7 project `ebbits'. A penetration testing (PenTest) system had been used to evaluate the performance of the implemented IDS framework. Preliminary tests revealed that the proposed framework represents a promising solution for ensuring better security in 6LoWPANs.
- ebbits. Eu fp7 project -'enabling the business-based internet of things and services'. website {Online} www.ebbits-project.eu, Accessed May 2013.Google Scholar
- A. H. Farooqi and F. A. Khan. Intrusion detection systems for wireless sensor networks: A survey. In Communication and networking, pages 234--241. Springer, 2009.Google ScholarCross Ref
- P. Kasinathan, C. Pastrone, M. A. Spirito, and M. Vinkovits. Denial-of-Service detection in 6LoWPAN based internet of things. In 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob'13), Lyon, France, Oct. 2013.Google ScholarCross Ref
- A. Lahmadi, C. Brandin, and O. Festor. A testing framework for discovering vulnerabilities in 6lowpan networks. In Distributed Computing in Sensor Systems (DCOSS), 2012 IEEE 8th International Conference on, pages 335--340, 2012. Google ScholarDigital Library
- Metasploit. Metasploit Penetration Testing Software. website {online} http://www.metasploit.com/, Accessed May 2013.Google Scholar
- A. Mitrokotsa and A. Karygiannis. Intrusion detection techniques in sensor networks. Wireless Sensor Network Security, ed. J. Lopez and J. Zhou, pages 251--272, 2008.Google Scholar
- D. R. Raymond and S. F. Midkiff. Denial-of-service in wireless sensor networks: Attacks and defenses. Pervasive Computing, IEEE, 7(1):74--81, 2008. Google ScholarDigital Library
- S. Raza, L. Wallgren, and T. Voigt. SVELTE: Real-time Intrusion Detection in the Internet of Things. Ad Hoc Networks, Elsevier, 2013. Google ScholarDigital Library
- Suricata. - The Next Generation Intrusion Detection System. website {online} www.openinfosecfoundation.org/, Accessed May 2013.Google Scholar
- R. Tomasi, H. Khaleel, F. Penna, C. Pastrone, R. Garello, and M. Spirito. Frequency agility in ipv6-based wireless personal area networks (6lowpan). In E. Osipov, A. Kassler, T. Bohnert, and X. Masip-Bruin, editors, Wired/Wireless Internet Communications, pages 146--157. Springer Berlin Heidelberg, 2010. Google ScholarDigital Library
Index Terms
- DEMO: An IDS framework for internet of things empowered by 6LoWPAN
Recommendations
A smart IDS and response system for the internet malicious worm
In this paper, we proposed a behaviour-based intrusion detection and response system for the internet worm. The LAWS (Lambent Anti-Worm System) can detect the intruded services and influenced range automatically. Besides, it also can analyse the key ...
Securing Sensor to Cloud Ecosystem using Internet of Things (IoT) Security Framework
ICC '16: Proceedings of the International Conference on Internet of things and Cloud ComputingThe Internet of things (IoT) refers to every object, which is connected over a network with the ability to transfer data. Users perceive this interaction and connection as useful in their daily life. However any improperly designed and configured ...
Internet of Things: Protocols, Applications and Security Issues
AbstractThe Internet of Things is poised to become an important crossroads for several technologies. As a result, it will be possible to connect smart physical goods and enable smart decision-making across a wide range of applications. Various devices, ...
Comments