Please use this identifier to cite or link to this item:
https://ptsldigital.ukm.my/jspui/handle/123456789/476472
Title: | Protection enhancement for 6LoWPAN in IoT by using non-causal hash function scheme against fragmentation attacks |
Authors: | Sala Sabah Nori (P82833) |
Supervisor: | Rosilah Hassan, Assoc. Prof. Dr. |
Keywords: | Internet of Things Wireless Internet |
Issue Date: | 7-Sep-2017 |
Description: | The Internet of Things (IoT) is a system of interrelated computing devices, objects, animals or people that are provided with unique identifiers to transfer data over a network. IoT will be the foundation of many services, and our daily life will depend on its availability and reliable operation. One of the most important components in the IoT paradigm is Wireless Sensor Networks (WSNs). IPv6 Low power Wireless Personal Area Networks (6LoWPAN) is one of WSN protocol that can serve in IoT. It provides the connection between the Internet Protocol version 6 (IPv6) and the lossy link. 6LoWPAN is a protocol designed to define a fragmentation mechanism for large packets. Here, the idea of this research is to provide an effective protection technique that can be incorporated particularly in 6LoWPAN protocol and generally in WSN protocols. Moreover, this research opens the door for the wide range of IoT applications in fields that requires secure transmission and reliability of data, such as the medical field, intelligent systems and military applications. The main aim of this research is to enhance the protection for 6LoWPAN protocols that can prevent fragment duplication attack by propose the Non-Causal Hash Function Based Scheme (NCHFS). NCHFS ensures the fully protection for the data packets transmission between the intermediate nodes in the network. The proposed method works to use the whole packet information to create hash keys. These keys can be used by any node to authenticate the packets and detect any possible modification on its individual fragments. The proposed hashing keys are classified as non-causal. This means that any attacker cannot modify the fragment content with preserving the hash keys unless it assembles the whole packet in advance and this is impossible. The NCHFS was tested under two types of attackers, the ordinary attacker and the smart attacker. In addition, the number of the malicious nodes and the probability ratio of the smart attack were changed to demonstrate the strength of our proposed scheme. The results of evaluation have shown a superiority of the developed approach over the benchmark with respect to most measures when the probability ratio of the smart attack was 40% the PDR improved to 105%, as well as reducing the energy consumption to 38%, and reduced the overhead by 51% when the number of malicious nodes was 12. While the PDR improvement by 119%, the energy has reduced by 40% and reduced the overhead by 54% when the number of malicious nodes was 24. Finally, when the probability ratio of the smart attack was 80%, the PDR improved to 410%, the energy consumption reduced by 68%, and the overhead also reduced by 80%, when the number of malicious nodes was 12. While the PDR improvement by 736%, the energy has reduced by 80% and reduced the overhead by 88% when the number of malicious nodes was 24.,Certification of Master's/Doctoral Thesis" is not available |
Pages: | 88 |
Call Number: | TK5103.4885.N647 2017 3 tesis |
Publisher: | UKM, Bangi |
Appears in Collections: | Faculty of Information Science and Technology / Fakulti Teknologi dan Sains Maklumat |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ukmvital_99001+SOURCE1+SOURCE1.0.PDF Restricted Access | 422.71 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.