Ajou University repository

Analysis of Fragmentation Security Threats and Secure Authentication Scheme in 6LoWPAN
  • Hassen Redwan Hussen
Citations

SCOPUS

0

Citation Export

Affiliation
아주대학교 일반대학원
Department
일반대학원 컴퓨터공학과
Publication Year
2010-02
Publisher
The Graduate School, Ajou University
Keyword
6LoWPANFragmentation SecurityFragmentaton AttackWSN Security6LoWPAN Authentication
Description
학위논문(석사)--아주대학교 일반대학원 :컴퓨터공학과,2010. 2
Alternative Abstract
Currently, providing 6LoWPAN fragmentation security is considered as one of the most critical issue since 6LoWPAN nodes are deployed in hostile environments and, therefore, are vulnerable to severe attacks. In this paper, we describe security threats to be observed in the 6LoWPAN fragments while fragments traverse across multiple hops towards the destination. Moreover, we explain the fundamental characteristics and security requirements of fragments in 6LoWPAN. Then, possible fragmentation security vulnerabilities and attacks in 6LoWPAN are identified. We also identified possible causes to fragmentation security threats in the 6LoWPAN. Finally, we propose a 3-tier secure end-to-end authentication (SEA) and message transmission protocol to overcome fragmentation vulnerabilities and prevent fragmentation attacks such as selective forwarding, sinkhole, wormhole, denial of service, sybil, replay, buffer overflow, node revocation and spoofed attacks in a large scale motionless 6LoWPAN. The proposed scheme assures 6LoWPAN node-to-stub node, stub node-to-edge router and edge router-to-edge router authentication along the way from source to destination.
Language
eng
URI
https://dspace.ajou.ac.kr/handle/2018.oak/7089
Fulltext

Type
Thesis
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Total Views & Downloads

File Download

  • There are no files associated with this item.