首页> 外文会议>IEEE World Forum on Internet of Things >Deep En-Route Filtering of Constrained Application Protocol (CoAP) Messages on 6LoWPAN Border Routers
【24h】

Deep En-Route Filtering of Constrained Application Protocol (CoAP) Messages on 6LoWPAN Border Routers

机译:6LoWPAN边界路由器上的受约束的应用协议(CoAP)消息的深度路由筛选

获取原文

摘要

Devices on the Internet of Things (IoT) are usually battery-powered and have limited resources. Hence, energy-efficient and lightweight protocols were designed for IoT devices, such as the popular Constrained Application Protocol (CoAP). Yet, CoAP itself does not include any defenses against denial-of-sleep attacks, which are attacks that aim at depriving victim devices of entering low-power sleep modes. For example, a denial-of-sleep attack against an IoT device that runs a CoAP server is to send plenty of CoAP messages to it, thereby forcing the IoT device to expend energy for receiving and processing these CoAP messages. All current security solutions for CoAP, namely Datagram Transport Layer Security (DTLS), IPsec, and OSCORE, fail to prevent such attacks. To fill this gap, Seitz et al. proposed a method for filtering out inauthentic and replayed CoAP messages "en-route" on 6LoWPAN border routers. In this paper, we expand on Seitz et al.'s proposal in two ways. First, we revise Seitz et al.'s software architecture so that 6LoWPAN border routers can not only check the authenticity and freshness of CoAP messages, but can also perform a wide range of further checks. Second, we propose a couple of such further checks, which, as compared to Seitz et al.'s original checks, more reliably protect IoT devices that run CoAP servers from remote denial-of-sleep attacks, as well as from remote exploits. We prototyped our solution and successfully tested its compatibility with Contiki-NG's CoAP implementation.
机译:物联网(IoT)上的设备通常由电池供电,并且资源有限。因此,为物联网设备设计了节能高效的轻量级协议,例如流行的约束应用协议(CoAP)。但是,CoAP本身不包含任何针对拒绝睡眠攻击的防御措施,这些攻击旨在使受害设备进入低功耗睡眠模式。例如,针对运行CoAP服务器的IoT设备的拒绝睡眠攻击是向其发送大量CoAP消息,从而迫使IoT设备花费更多的精力来接收和处理这些CoAP消息。当前针对CoAP的所有安全解决方案,即数据报传输层安全性(DTLS),IPsec和OSCORE,都无法阻止此类攻击。为了填补这一空白,Seitz等人。提出了一种在6LoWPAN边界路由器上“过滤”过滤掉虚假和重播的CoAP消息的方法。在本文中,我们以两种方式扩展了Seitz等人的建议。首先,我们对Seitz等人的软件体系结构进行了修改,以使6LoWPAN边界路由器不仅可以检查CoAP消息的真实性和新鲜度,还可以进行广泛的进一步检查。其次,我们提出了一些此类进一步的检查,与Seitz等人的原始检查相比,它们可以更可靠地保护运行CoAP服务器的IoT设备免受远程拒绝睡眠攻击以及远程攻击的侵害。我们对解决方案进行了原型设计,并成功测试了其与Contiki-NG的CoAP实施的兼容性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号