SlideShare a Scribd company logo
SECuRE and Trustworthy
Computing Lab
Authors
Mahmud Hossain, Yasser Karim, and Ragib Hasan
SECuRE and Trustworthy computing Lab (SECRETLab)
University of Alabama at Birmingham
Presenter: Mahmud Hossain
http://secret.cis.uab.edu
IoT
SecuPAN: A Security Scheme to Mitigate
Fragmentation-Based Network Attacks in 6LoWPAN
SECuRE and Trustworthy
Computing Lab
2
The Internet of Things (IoT)
 A programmable world
 Everyday objects are
interconnected
 Objects are smart enough to
make decision
SECuRE and Trustworthy
Computing Lab
Source: Zinnov Zones (2016)
IoT Forecasts and Market Estimates
3
 Estimation of connected things by 2020
 20.8 billion (Gartner)
 26.3 billion (Cisco)
 28 billion (Ericson)
 34 billion (Business Insider)
Source: ZStatista (2018)
SECuRE and Trustworthy
Computing Lab
Protocols for IoT network
 IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN)
 Zigbee
 Bluetooth
 Z-Wave
 Sigfox
 Wi-Fi
4
SECuRE and Trustworthy
Computing Lab
6LoWPAN: Protocol Stack
 IEEE 802.15.4
 IPv6
5
SECuRE and Trustworthy
Computing Lab
Fragmentation in 6LoWPAN
 Maximum Transmission Unit (MTU) size 127 octets(bytes).
 IPv6 packets are usually larger than 127 octets. (Maximum 1280
octets)
6
SECuRE and Trustworthy
Computing Lab
Vulnerabilities of 6LoWPAN Fragmentation
Mechanism
 Fragment authentication
 Fragment freshness verification
 Payload integrity verification
 Source IP-Address validation
7
SECuRE and Trustworthy
Computing Lab
Threat Model
 Capability of Target and Malicious Devices
 Resource Constrained
 Location
 Within Radio Range (Mallory)
 Via Gateway (Eve)
 Via Internet (Malice)
 Extract key materials
 Memory Probing
8
SECuRE and Trustworthy
Computing Lab
Threat Model
 Network External Attacks
 Attackers conduct activity from outside via Internet.
 No resource limitation
 Attackers can easily send large number of packets which are further
broken into fragments.
 Gateway can prevent such attack by employing an
authenticated tunnel, such as IPsec.
 Secure rate limiting mechanisms for large packets from
authenticated sources.
9
SECuRE and Trustworthy
Computing Lab
Threat Model
 Network Internal Attacks
10
Replay
Alteration
Spoofing Duplicate
Buffer exhaustion
SECuRE and Trustworthy
Computing Lab
SecuPAN : Proposed Solutions
 Nonce field in the FRAG1 header.
 MAC-based scheme.
 Cryptographic datagram-tag and cryptographically generated
IPv6 address (CGA-IPv6).
 Reputation-based buffer management mechanism.
11
SECuRE and Trustworthy
Computing Lab
Proposed Datagram Tag, Nonce & MAC fields
12
 Crypto Datagram Tag 16 bits.
 MAC (N || Hash (Payload added to FRAG1)
 Nonce 16 bits.
 MAC field 32 bits.
 MAC (Hash (Payload added to FRAGN))
 Ensures fragments integrity and freshness.
SECuRE and Trustworthy
Computing Lab
Cryptographic IPv6 Address Assignment
 A CGA is an Internet Protocol Version
6 (IPv6) address that contains a host
identifier computed from a
cryptographic hash function.
 In our proposed solution, a Border
Router in a 6LoWPAN network assigns
a CGA-IPv6 address to joining device.
 Prevent address spoofing.
13
SECuRE and Trustworthy
Computing Lab
Secure Transfer of Packet Fragmentations
 Public Key Retrieval
 Secure Fragmentation
14
SECuRE and Trustworthy
Computing Lab
Operational Model
15
Verify Crypto Datagram Tag
MACK (N)
=? Hash
Yes
SECuRE and Trustworthy
Computing Lab
SecuPAN : Secure Management of
Reassembly Buffer
 A reputation point based buffer management scheme
 Reputation point, 𝑟𝑗 is defined as follows:
𝑟𝑗 =
min
𝑟𝑗 + 1
2
, 1
max 𝑟𝑗 −
𝑏𝑢𝑓𝑗
𝑟𝑗
1 − μ 𝑗 , 0.1
 Here, 𝜇 𝑗 =
𝑇𝑜𝑡𝑎𝑙 𝑏𝑦𝑡𝑒𝑠 𝑟𝑒𝑐𝑒𝑖𝑣𝑒𝑑
𝑇𝑜𝑡𝑎𝑙 𝑙𝑒𝑛𝑔𝑡ℎ 𝑜𝑓 𝑡ℎ𝑒 𝑝𝑎𝑐𝑘𝑒𝑡
and 𝑏𝑢𝑓𝑗 =
𝑇𝑜𝑡𝑎𝑙 𝑎𝑙𝑙𝑜𝑐𝑎𝑡𝑒𝑑 𝑝𝑜𝑟𝑡𝑖𝑜𝑛 𝑜𝑓 𝑡ℎ𝑒 𝑏𝑢𝑓𝑓𝑒𝑟(𝑏𝑢𝑓𝑎)
𝑇𝑜𝑡𝑎𝑙 𝑠𝑖𝑧𝑒 𝑜𝑓 𝑡ℎ𝑒 𝑏𝑢𝑓𝑓𝑒𝑟
 A receiver allocates 𝑏𝑢𝑓𝑎 for a fragmented packet as:
𝑏𝑢𝑓𝑎 = 𝑝 + 𝑞, 𝑝 = 𝑟𝑗 ∗ 𝑑𝑎𝑡𝑎𝑔𝑟𝑎𝑚_𝑠𝑖𝑧𝑒, 𝑎𝑛𝑑 𝑞 = 𝑝 + 8 𝑚𝑜𝑑 8
 Packet discard policy: Uncertainty Point ucP =
𝑓 𝑟
+𝑡𝑟+𝑛𝑠
𝑟 𝑠
16
If a sender sends all the fragments.
If the receiver fails receiving all the packet
fragments before time expires
SECuRE and Trustworthy
Computing Lab
Experimental Setup
17
SECuRE and Trustworthy
Computing Lab
Evaluation
18
Packet Delivery Ratio
(buffer reservation)
Effective Packet Number
SECuRE and Trustworthy
Computing Lab
Evaluation
19
End to End Delay Throughput
Energy Consumption for
Communications
SECuRE and Trustworthy
Computing Lab
Security Analysis
 Replay
 Nonce field
 Alteration
 MAC field
 Spoofing
 CGA-IPv6
 Duplication
 MAC field
 Buffer exhaustion
 Reputation point based system
20
SECuRE and Trustworthy
Computing Lab
Conclusion
 Fragmentation mechanism enables vulnerabilities in
6LoWPAN.
 Proposed a security mechanism based on Cryptographically
Generated IPv6 Address to mitigate impersonation attacks.
 MAC-based fragmentation scheme to verify authenticity and
integrity of packet fragments.
 Reputation-based buffer management scheme to protect
resource-limited devices from buffer overflow.
21
SECuRE and Trustworthy
Computing Lab
Thank You
22
SECRETLab@UAB
 Phone: 205.934.8643
 Fax: 205.934.5473
 Web: http://secret.cis.uab.edu/
Mahmud Hossain
 Email: mahmud@uab.edu

More Related Content

PPTX
Seattle Scalability Meetup 6-26-13
PPTX
Classical cryptographic techniques, Feistel cipher structure
PDF
Design and Implementation of Ipv6 Address Using Cryptographically Generated A...
PPTX
Datagrams
PDF
M021201092098
PDF
Searchable Encryption Systems
PDF
Hardware Attacks and Security
DOC
Privacy and integrity-preserving range queries in sensor networks
Seattle Scalability Meetup 6-26-13
Classical cryptographic techniques, Feistel cipher structure
Design and Implementation of Ipv6 Address Using Cryptographically Generated A...
Datagrams
M021201092098
Searchable Encryption Systems
Hardware Attacks and Security
Privacy and integrity-preserving range queries in sensor networks

What's hot (12)

PDF
Models and approaches for Differential Power Analysis
PDF
Virus, Vaccines, Genes and Quantum - 2020-06-18
PDF
Hardware Implementation of Algorithm for Cryptanalysis
PPTX
Technical Seminar on Securing the IoT in the Quantum World
PDF
International Journal of Engineering and Science Invention (IJESI)
PDF
Encryption & steganography in i pv6 source address
PPTX
NS2 Network Simulation Example Research Assistance
PDF
Ben herzberg/incapsula trends of cyber attacks
PPTX
Power Analysis Attacks
PDF
Narrow bicliques cryptanalysisoffullidea
PDF
Enabling a Secure Multi-Tenant Environment for HPC
DOCX
Searchable Symmetric Encryption with Forward Search Privacy
Models and approaches for Differential Power Analysis
Virus, Vaccines, Genes and Quantum - 2020-06-18
Hardware Implementation of Algorithm for Cryptanalysis
Technical Seminar on Securing the IoT in the Quantum World
International Journal of Engineering and Science Invention (IJESI)
Encryption & steganography in i pv6 source address
NS2 Network Simulation Example Research Assistance
Ben herzberg/incapsula trends of cyber attacks
Power Analysis Attacks
Narrow bicliques cryptanalysisoffullidea
Enabling a Secure Multi-Tenant Environment for HPC
Searchable Symmetric Encryption with Forward Search Privacy
Ad

Similar to SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in 6LoWPAN (20)

PPTX
Seminar V2
PDF
Fragattacks-Breaking-Wi-Fi-Through-Fragmentation-And-Aggregation.pdf
PPT
Websecurity
PDF
IPv6 Security - Where is the Challenge?
PDF
Information Security Technology for IPv6-based IoT (Internet-of-Things)
PDF
IPv6 Security - Myths and Reality
PPT
Wolfgang Fritsche (IABG) – Secure IPv6 deployment
PPTX
Resilience in the ZigBee Residential Mode
PDF
10 fn s05
PDF
10 fn s05
PDF
Security Key Management Model for Low Rate Wireless Personal Area Networks
PPT
Web Security
PPT
IPSec(Somesh Jha).ppt IPSex Training ppt
PDF
Efficient End-to-End Secure Key Management Protocol for Internet of Things
PDF
IoT/M2M Security
PPT
Ip sec and ssl
PPT
12 tcp-dns
PPTX
Implementation & Challenges of IPv6
PPTX
Ip security
PDF
CS6004 CYBER FORENSICS
Seminar V2
Fragattacks-Breaking-Wi-Fi-Through-Fragmentation-And-Aggregation.pdf
Websecurity
IPv6 Security - Where is the Challenge?
Information Security Technology for IPv6-based IoT (Internet-of-Things)
IPv6 Security - Myths and Reality
Wolfgang Fritsche (IABG) – Secure IPv6 deployment
Resilience in the ZigBee Residential Mode
10 fn s05
10 fn s05
Security Key Management Model for Low Rate Wireless Personal Area Networks
Web Security
IPSec(Somesh Jha).ppt IPSex Training ppt
Efficient End-to-End Secure Key Management Protocol for Internet of Things
IoT/M2M Security
Ip sec and ssl
12 tcp-dns
Implementation & Challenges of IPv6
Ip security
CS6004 CYBER FORENSICS
Ad

More from Mahmud Hossain (12)

PDF
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
PDF
CACROS: A Context-Aware Cloud Content Roaming Service
PDF
Aura: An IoT based Cloud Infrastructure for Localized Mobile Computation Outs...
PDF
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...
PDF
Secprov: Trustworthy and Efficient Provenance Management in the Cloud
PDF
Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...
PDF
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
PDF
Jugo: A Generic Architecture for Composite Cloud as a Service Auth
PDF
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
PDF
IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...
PDF
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
PDF
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
CACROS: A Context-Aware Cloud Content Roaming Service
Aura: An IoT based Cloud Infrastructure for Localized Mobile Computation Outs...
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...
Secprov: Trustworthy and Efficient Provenance Management in the Cloud
Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
Jugo: A Generic Architecture for Composite Cloud as a Service Auth
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
IoTbed: A Generic Architecture for Testbed as a Service for Internet of Thing...
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Big Data Technologies - Introduction.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Encapsulation theory and applications.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPT
Teaching material agriculture food technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
cuic standard and advanced reporting.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
Chapter 3 Spatial Domain Image Processing.pdf
Spectral efficient network and resource selection model in 5G networks
Review of recent advances in non-invasive hemoglobin estimation
Big Data Technologies - Introduction.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Unlocking AI with Model Context Protocol (MCP)
Encapsulation theory and applications.pdf
Machine learning based COVID-19 study performance prediction
Programs and apps: productivity, graphics, security and other tools
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
sap open course for s4hana steps from ECC to s4
Building Integrated photovoltaic BIPV_UPV.pdf
Teaching material agriculture food technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Electronic commerce courselecture one. Pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
cuic standard and advanced reporting.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm

SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in 6LoWPAN

  • 1. SECuRE and Trustworthy Computing Lab Authors Mahmud Hossain, Yasser Karim, and Ragib Hasan SECuRE and Trustworthy computing Lab (SECRETLab) University of Alabama at Birmingham Presenter: Mahmud Hossain http://secret.cis.uab.edu IoT SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in 6LoWPAN
  • 2. SECuRE and Trustworthy Computing Lab 2 The Internet of Things (IoT)  A programmable world  Everyday objects are interconnected  Objects are smart enough to make decision
  • 3. SECuRE and Trustworthy Computing Lab Source: Zinnov Zones (2016) IoT Forecasts and Market Estimates 3  Estimation of connected things by 2020  20.8 billion (Gartner)  26.3 billion (Cisco)  28 billion (Ericson)  34 billion (Business Insider) Source: ZStatista (2018)
  • 4. SECuRE and Trustworthy Computing Lab Protocols for IoT network  IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN)  Zigbee  Bluetooth  Z-Wave  Sigfox  Wi-Fi 4
  • 5. SECuRE and Trustworthy Computing Lab 6LoWPAN: Protocol Stack  IEEE 802.15.4  IPv6 5
  • 6. SECuRE and Trustworthy Computing Lab Fragmentation in 6LoWPAN  Maximum Transmission Unit (MTU) size 127 octets(bytes).  IPv6 packets are usually larger than 127 octets. (Maximum 1280 octets) 6
  • 7. SECuRE and Trustworthy Computing Lab Vulnerabilities of 6LoWPAN Fragmentation Mechanism  Fragment authentication  Fragment freshness verification  Payload integrity verification  Source IP-Address validation 7
  • 8. SECuRE and Trustworthy Computing Lab Threat Model  Capability of Target and Malicious Devices  Resource Constrained  Location  Within Radio Range (Mallory)  Via Gateway (Eve)  Via Internet (Malice)  Extract key materials  Memory Probing 8
  • 9. SECuRE and Trustworthy Computing Lab Threat Model  Network External Attacks  Attackers conduct activity from outside via Internet.  No resource limitation  Attackers can easily send large number of packets which are further broken into fragments.  Gateway can prevent such attack by employing an authenticated tunnel, such as IPsec.  Secure rate limiting mechanisms for large packets from authenticated sources. 9
  • 10. SECuRE and Trustworthy Computing Lab Threat Model  Network Internal Attacks 10 Replay Alteration Spoofing Duplicate Buffer exhaustion
  • 11. SECuRE and Trustworthy Computing Lab SecuPAN : Proposed Solutions  Nonce field in the FRAG1 header.  MAC-based scheme.  Cryptographic datagram-tag and cryptographically generated IPv6 address (CGA-IPv6).  Reputation-based buffer management mechanism. 11
  • 12. SECuRE and Trustworthy Computing Lab Proposed Datagram Tag, Nonce & MAC fields 12  Crypto Datagram Tag 16 bits.  MAC (N || Hash (Payload added to FRAG1)  Nonce 16 bits.  MAC field 32 bits.  MAC (Hash (Payload added to FRAGN))  Ensures fragments integrity and freshness.
  • 13. SECuRE and Trustworthy Computing Lab Cryptographic IPv6 Address Assignment  A CGA is an Internet Protocol Version 6 (IPv6) address that contains a host identifier computed from a cryptographic hash function.  In our proposed solution, a Border Router in a 6LoWPAN network assigns a CGA-IPv6 address to joining device.  Prevent address spoofing. 13
  • 14. SECuRE and Trustworthy Computing Lab Secure Transfer of Packet Fragmentations  Public Key Retrieval  Secure Fragmentation 14
  • 15. SECuRE and Trustworthy Computing Lab Operational Model 15 Verify Crypto Datagram Tag MACK (N) =? Hash Yes
  • 16. SECuRE and Trustworthy Computing Lab SecuPAN : Secure Management of Reassembly Buffer  A reputation point based buffer management scheme  Reputation point, 𝑟𝑗 is defined as follows: 𝑟𝑗 = min 𝑟𝑗 + 1 2 , 1 max 𝑟𝑗 − 𝑏𝑢𝑓𝑗 𝑟𝑗 1 − μ 𝑗 , 0.1  Here, 𝜇 𝑗 = 𝑇𝑜𝑡𝑎𝑙 𝑏𝑦𝑡𝑒𝑠 𝑟𝑒𝑐𝑒𝑖𝑣𝑒𝑑 𝑇𝑜𝑡𝑎𝑙 𝑙𝑒𝑛𝑔𝑡ℎ 𝑜𝑓 𝑡ℎ𝑒 𝑝𝑎𝑐𝑘𝑒𝑡 and 𝑏𝑢𝑓𝑗 = 𝑇𝑜𝑡𝑎𝑙 𝑎𝑙𝑙𝑜𝑐𝑎𝑡𝑒𝑑 𝑝𝑜𝑟𝑡𝑖𝑜𝑛 𝑜𝑓 𝑡ℎ𝑒 𝑏𝑢𝑓𝑓𝑒𝑟(𝑏𝑢𝑓𝑎) 𝑇𝑜𝑡𝑎𝑙 𝑠𝑖𝑧𝑒 𝑜𝑓 𝑡ℎ𝑒 𝑏𝑢𝑓𝑓𝑒𝑟  A receiver allocates 𝑏𝑢𝑓𝑎 for a fragmented packet as: 𝑏𝑢𝑓𝑎 = 𝑝 + 𝑞, 𝑝 = 𝑟𝑗 ∗ 𝑑𝑎𝑡𝑎𝑔𝑟𝑎𝑚_𝑠𝑖𝑧𝑒, 𝑎𝑛𝑑 𝑞 = 𝑝 + 8 𝑚𝑜𝑑 8  Packet discard policy: Uncertainty Point ucP = 𝑓 𝑟 +𝑡𝑟+𝑛𝑠 𝑟 𝑠 16 If a sender sends all the fragments. If the receiver fails receiving all the packet fragments before time expires
  • 17. SECuRE and Trustworthy Computing Lab Experimental Setup 17
  • 18. SECuRE and Trustworthy Computing Lab Evaluation 18 Packet Delivery Ratio (buffer reservation) Effective Packet Number
  • 19. SECuRE and Trustworthy Computing Lab Evaluation 19 End to End Delay Throughput Energy Consumption for Communications
  • 20. SECuRE and Trustworthy Computing Lab Security Analysis  Replay  Nonce field  Alteration  MAC field  Spoofing  CGA-IPv6  Duplication  MAC field  Buffer exhaustion  Reputation point based system 20
  • 21. SECuRE and Trustworthy Computing Lab Conclusion  Fragmentation mechanism enables vulnerabilities in 6LoWPAN.  Proposed a security mechanism based on Cryptographically Generated IPv6 Address to mitigate impersonation attacks.  MAC-based fragmentation scheme to verify authenticity and integrity of packet fragments.  Reputation-based buffer management scheme to protect resource-limited devices from buffer overflow. 21
  • 22. SECuRE and Trustworthy Computing Lab Thank You 22 SECRETLab@UAB  Phone: 205.934.8643  Fax: 205.934.5473  Web: http://secret.cis.uab.edu/ Mahmud Hossain  Email: mahmud@uab.edu