검색 상세

A Secure and Efficient Low-power Bootstrapping and Commissioning Protocol for 6LoWPAN

초록/요약

This thesis is devoted to define a novel bootstrapping protocol for 6LoWPAN (IPv6 based Lowpower Wireless Personal Area Network). Bootstrapping is the way of associating a new node with a specific network with or without minimum human intervention and gets connected with the desired network. Generally, the gateway or the Personal Area Network (PAN) coordinator of a 6LoWPAN network is multihop away from new sensor nodes. In this thesis, we propose a novel protocol ?gLow-power Bootstrapping and Commissioning Protocol (LBCP)?h for 6LoWPAN which satisfies multihop property of 6LoWPAN. In our protocol we assume three different kinds of sensor nodes called a new device as LBD, an already bootstrapped device as LBA, and the gateway or the PAN coordinator as LBS. An LBA helps an LBD to communicate with the LBS and eventually gets connected with the network. For secure authentication of new sensor nodes we propose to use existing EUI-64 address and ?gjoin key?h which are known by the LBS. We call this method as centralized approach. We also introduce the concept of semidistributed approach where ?gjoin keys?h of new nodes are randomly distributed to agent nodes or LBAs, and LBAs can perform bootstrapping actions without help of the LBS. We propose two novel LBA selection algorithms to select the best LBA in the bootstrapping phase for both centralized and semi-distributed approaches. To prevent denial-of-service (DoS) attack in the bootstrapping phase we provide some roles to LABS and already commissioned devices, and define a blacklisting policy in the LBS. To show the effectiveness of our protocol we simulate our protocol in a discrete event simulator called QualNet. The simulation results show that our protocol is scalable as well as efficient in terms of number of control packets exchanged in the bootstrapping phase and average end-to-end delay between LBD and LBS. We compare LBCP with basic flooding scheme where bootstrapping is performed using only broadcast of request and reply messages. Latter, we discuss about various security attacks in bootstrapping phases and how we can provide solution for those attacks. Finally, we argue that the usage of agent nodes is very useful for secure network bootstrapping of 6LoWPAN.

more

목차

Chapter 1: Introduction ....................... ?] 1 ?]
1.1 Contribution ..............................?] 3 ?]
1.2 Organization of This Dissertation ........ ?] 3 ?]
Chapter 2: Related Works ...................... ?] 4 ?]
Chapter 3: Background ......................... ?] 6 ?]
3.1 Background of 6LoWPAN .................... ?] 6 ?]
3.2 Neighbor Discovery In 6LoWPAN ............ ?] 6 ?]
3.3 Terminology .............................. ?] 8 ?]
3.4 Routing In 6LoWPAN ....................... ?] 9 ?]
Mesh-under Routing .......................... ?] 10 ?]
Route-over Routing .......................... ?] 11 ?]
Chapter 4: Problem statement and assumptions... ?] 13 ?]
4.1 Problem Statement ........................ ?] 13 ?]
4.2 Assumptions .............................. ?] 13 ?]
4.3 Motivation and design choices ............ ?] 14 ?]
Chapter 5 Proposed Protocol ................... ?] 16 ?]
5.1 Centralized Approach ..................... ?] 17 ?]
LBA Selection Phase ......................... ?] 17 ?]
Network Joining Phase ....................... ?] 19 ?]
Short Address Assignment .................... ?] 21 ?]
Obtaining IPv6 Address ...................... ?] 21 ?]
Preventing DoS Attack ....................... ?] 22 ?]
5.2 Semi?]Distributed Approach .................?] 22 ?]
LBA Selection Phase ......................... ?] 22 ?]
Network Joining Phase ....................... ?] 26 ?]
Short Address Assignment .................... ?] 27 ?]
Obtaining IPv6 Address ...................... ?] 27 ?]
Preventing DoS Attack ....................... ?] 28 ?]
Chapter 6: Evaluation ......................... ?] 29 ?]
6.1 Implementation .......................... ?] 29 ?]
6.2 Evaluation Process ....................... ?] 29 ?]
Chapter 7: Security Analysis .................. ?] 33 ?]
7.1 Possible Security Attacks ................ ?] 33 ?]
Attacks from LBDs ........................... ?] 33 ?]
Attacks From LBAs ........................... ?] 33 ?]
Attack From the LBS ......................... ?] 33 ?]
7.2 Countermeasures for The Attacks ......... ?] 33 ?]
Attacks From LBDs ............................?] 33 ?]
Attacks From LBAs ........................... ?] 34 ?]
Attack From the LBS ......................... ?] 34 ?]
Chapter 8: Conclusion & Future Works .......... ?] 35 ?]
Reference ................................... ?] 36 ?]

more