Foto 7

G. Carignani, F. Righetti, C. Vallati, M. Tiloca, G. Anastasi", "Evaluation of Feasibility and Impact of Attacks Against the 6top Protocol in 6TiSCH Networks", IEEE WoWMoM 2020, August 2020

Written by

Abstract: The 6TiSCH architecture have been gaining attrac- tion as a promising solution to ensure reliability and security for communication in applications for the Industrial Internet of Things (IIoT). While many different aspects of the architecture have been investigated in literature, an in-depth analysis of the security features included in its design is still missing. In this paper, we assess the security vulnerabilities of the 6top protocol, a core component of the 6TiSCH architecture for enabling network nodes to negotiate communication resources. Our analysis highlights two possible attacks against the 6top protocol that can impair network performance and reliability in a significant manner. To prove the feasibility of the attacks in practice, we implemented both of them on the Contiki-NG Operating System and tested their effectiveness on a simple deployment with three Zolertia RE-Mote sensor nodes. Also, we carried out a set of simulations using Cooja in order to assess their impact on larger networks. Our results show that both attacks reduce reliability in the overall network and increase energy consumption of the network nodes.

 

Keywords: Security, Industrial Internet of Things, 6TiSCH, 6top, IEEE 802.15.4.