Ephemeral: Lightweight Pseudonyms for 6LoWPAN MAC addresses

被引:0
|
作者
Dos Santos, Jessye [1 ]
Hennebert, Christine [1 ]
Fonbonne, J. C. [1 ]
Lauradoux, Cedric [2 ]
机构
[1] CEA, DRT, F-38054 Grenoble, France
[2] INRIA Rhone Alpes, F-38330 Montbonnot St Martin, France
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Privacy is a major issue for 6LoWPAN networks and the use of persistent identifiers (MAC addresses) in the core mechanism is particularly challenging. Indeed, nodes use the SLAAC protocol to auto generate their IPv6 addresses based on their MAC addresses. Persistent addresses simplify the routing in the network but allow an adversary to analyze the traffic and recover sensitive information. We propose Ephemeral, a MAC pseudonym scheme compliant with SLAAC. It provides dynamic pseudonyms cryptographically generated without the need to reconstruct the routing tables when the pseudonyms change. Our simulation based on CONTIKI 3.0 and WSNET shows that Ephemeral improves MT6D, a previous MAC pseudonyms scheme, by 16% in term of application packet delivery.
引用
收藏
页码:1448 / 1453
页数:6
相关论文
共 50 条
  • [31] 6LoWPAN-SNMP: Simple Network Management Protocol for 6LoWPAN
    Choi, Haksoo
    Kim, Nakyoung
    Cha, Hojung
    HPCC: 2009 11TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2009, : 305 - 313
  • [32] Green content communications in 6LoWPAN
    Li, Yanli
    Wang, Xiaonan
    IET NETWORKS, 2020, 9 (01) : 38 - 42
  • [33] 6LoWPAN Forwarding Techniques for IoT
    Mc Gee, Kevin
    Collier, Martin
    2019 IEEE 5TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2019, : 888 - 893
  • [34] Addressing and Privacy Support for 6LoWPAN
    Wang, Xiaonan
    Mu, Yi
    IEEE SENSORS JOURNAL, 2015, 15 (09) : 5193 - 5201
  • [35] Security Aspects in 6LowPan Networks
    Barker, Ron
    2010 DESIGN, AUTOMATION & TEST IN EUROPE (DATE 2010), 2010, : 660 - 660
  • [36] Time Synchronization Protocol for 6LoWPAN
    Waghmare, Anandghan
    Mazumdar, Arka Prokash
    Sairam, Ashok Singh
    2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2013, : 1855 - 1860
  • [37] A lightweight signcryption scheme for defense against fragment duplication attack in the 6LoWPAN networks
    Nikravan, Mohammad
    Movaghar, Ali
    Hosseinzadeh, Mehdi
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (01) : 209 - 226
  • [38] Spectrum: Lightweight Hybrid Address Autoconfiguration Protocol Based on Virtual Coordinates for 6LoWPAN
    Shin, Hyojeong
    Talipov, Elmurod
    Cha, Hojung
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2012, 11 (11) : 1749 - 1762
  • [39] Securing 6LoWPAN Neighbor Discovery
    Park, Wang-Seok
    Park, Chang-Seop
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (17) : 13677 - 13689
  • [40] A CONTEXT SYSTEM FOR 6LOWPAN NETWORK
    Li, Nan
    Huang, Xiaohong
    2011 4TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK AND MULTIMEDIA TECHNOLOGY (4TH IEEE IC-BNMT2011), 2011, : 522 - 525