Proceedings of the Second International Conference on Internet-of-Things Design and Implementation 2017
DOI: 10.1145/3054977.3054997
|View full text |Cite
|
Sign up to set email alerts
|

Designing a Micro-Moving Target IPv6 Defense for the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(13 citation statements)
references
References 24 publications
0
13
0
Order By: Relevance
“…Most studies evaluating the performance of MTD approaches have been validated based on simulation experiments. Compared to analytical models, simulation models have more flexibility in modeling specific attack behaviors (e.g., periodic attacks [83], DDoS attacks [170], Multi-Armed Bandit policybased attacks [121], sequential attacks on attack surface [26]), and various testing scenarios characterizing unique environmental features (e.g., cloud-based service computing [120], wireless sensor networks using IPv6-based MTD [162]). Some simulation studies add MTD features into existing network simulators (e.g., NeSSi2 [170]).…”
Section: B Simulation Model-based Mtd Evaluationmentioning
confidence: 99%
See 2 more Smart Citations
“…Most studies evaluating the performance of MTD approaches have been validated based on simulation experiments. Compared to analytical models, simulation models have more flexibility in modeling specific attack behaviors (e.g., periodic attacks [83], DDoS attacks [170], Multi-Armed Bandit policybased attacks [121], sequential attacks on attack surface [26]), and various testing scenarios characterizing unique environmental features (e.g., cloud-based service computing [120], wireless sensor networks using IPv6-based MTD [162]). Some simulation studies add MTD features into existing network simulators (e.g., NeSSi2 [170]).…”
Section: B Simulation Model-based Mtd Evaluationmentioning
confidence: 99%
“…MTD Techniques: In the literature, most IoT-based MTD techniques are shuffling or diversity-based. The examples include mutation of cryptosystem and/or firmware version [26], IP randomization [140], IPv6 rotation (i.e., µMT6D) [162], or code partitioning and diversification on IoT devices [101]. Since IoT concerns severe resource constraints because most of them are mobile devices, developing lightweight shufflingbased MTD is a key concern in IoT-based MTD.…”
Section: B Internet-of-things (Iot)mentioning
confidence: 99%
See 1 more Smart Citation
“…For example, in [10], [11], [14] the MP randomization method is not specified. In [12], [13] an unkeyed hash function (SHA-256) is used to construct a crypto-transformation that resembles a key-based mechanism. A more conservative security design would use a keyed-hash function.…”
Section: Motivationmentioning
confidence: 99%
“…It makes them vulnerable for eavesdropping. These devices may also be unattended for prolonged periods of time leaving them vulnerable to physical attacks, and most devices limited in energy and computing power do not allow for the implementation and use of complex security schemes [6,7]. A recent survey [8] has showen that False Data Injection (FDI) attacks also threaten state estimation in smart grids.…”
Section: Introductionmentioning
confidence: 99%