Cargando…
Research on the Security of IPv6 Communication Based on Petri Net under IoT
The distribution of wireless network systems challenges the communication security of Internet of Things (IoT), and the IPv6 protocol is gradually becoming the main communication protocol under the IoT. The Neighbor Discovery Protocol (NDP), as the base protocol of IPv6, includes address resolution,...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10255493/ https://www.ncbi.nlm.nih.gov/pubmed/37299919 http://dx.doi.org/10.3390/s23115192 |
_version_ | 1785056885675655168 |
---|---|
author | Han, Yu Zhang, Liumei Wang, Yichuan Deng, Xi Gu, Zhendong Zhang, Xiaohui |
author_facet | Han, Yu Zhang, Liumei Wang, Yichuan Deng, Xi Gu, Zhendong Zhang, Xiaohui |
author_sort | Han, Yu |
collection | PubMed |
description | The distribution of wireless network systems challenges the communication security of Internet of Things (IoT), and the IPv6 protocol is gradually becoming the main communication protocol under the IoT. The Neighbor Discovery Protocol (NDP), as the base protocol of IPv6, includes address resolution, DAD, route redirection and other functions. The NDP protocol faces many attacks, such as DDoS attacks, MITM attacks, etc. In this paper, we focus on the communication-addressing problem between nodes in the Internet of Things (IoT). We propose a Petri-Net-based NS flooding attack model for the flooding attack problem of address resolution protocols under the NDP protocol. Through a fine-grained analysis of the Petri Net model and attacking techniques, we propose another Petri-Net-based defense model under the SDN architecture, achieving security for communications. We further simulate the normal communication between nodes in the EVE-NG simulation environment. We implement a DDoS attack on the communication protocol by an attacker who obtains the attack data through the THC-IPv6 tool. In this paper, the SVM algorithm, random forest algorithm (RF) and Bayesian algorithm (NBC) are used to process the attack data. The NBC algorithm is proven to exhibit high accuracy in classifying and identifying data through experiments. Further, the abnormal data are discarded through the abnormal data processing rules issued by the controller in the SDN architecture, to ensure the security of communications between nodes. |
format | Online Article Text |
id | pubmed-10255493 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-102554932023-06-10 Research on the Security of IPv6 Communication Based on Petri Net under IoT Han, Yu Zhang, Liumei Wang, Yichuan Deng, Xi Gu, Zhendong Zhang, Xiaohui Sensors (Basel) Article The distribution of wireless network systems challenges the communication security of Internet of Things (IoT), and the IPv6 protocol is gradually becoming the main communication protocol under the IoT. The Neighbor Discovery Protocol (NDP), as the base protocol of IPv6, includes address resolution, DAD, route redirection and other functions. The NDP protocol faces many attacks, such as DDoS attacks, MITM attacks, etc. In this paper, we focus on the communication-addressing problem between nodes in the Internet of Things (IoT). We propose a Petri-Net-based NS flooding attack model for the flooding attack problem of address resolution protocols under the NDP protocol. Through a fine-grained analysis of the Petri Net model and attacking techniques, we propose another Petri-Net-based defense model under the SDN architecture, achieving security for communications. We further simulate the normal communication between nodes in the EVE-NG simulation environment. We implement a DDoS attack on the communication protocol by an attacker who obtains the attack data through the THC-IPv6 tool. In this paper, the SVM algorithm, random forest algorithm (RF) and Bayesian algorithm (NBC) are used to process the attack data. The NBC algorithm is proven to exhibit high accuracy in classifying and identifying data through experiments. Further, the abnormal data are discarded through the abnormal data processing rules issued by the controller in the SDN architecture, to ensure the security of communications between nodes. MDPI 2023-05-30 /pmc/articles/PMC10255493/ /pubmed/37299919 http://dx.doi.org/10.3390/s23115192 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Han, Yu Zhang, Liumei Wang, Yichuan Deng, Xi Gu, Zhendong Zhang, Xiaohui Research on the Security of IPv6 Communication Based on Petri Net under IoT |
title | Research on the Security of IPv6 Communication Based on Petri Net under IoT |
title_full | Research on the Security of IPv6 Communication Based on Petri Net under IoT |
title_fullStr | Research on the Security of IPv6 Communication Based on Petri Net under IoT |
title_full_unstemmed | Research on the Security of IPv6 Communication Based on Petri Net under IoT |
title_short | Research on the Security of IPv6 Communication Based on Petri Net under IoT |
title_sort | research on the security of ipv6 communication based on petri net under iot |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10255493/ https://www.ncbi.nlm.nih.gov/pubmed/37299919 http://dx.doi.org/10.3390/s23115192 |
work_keys_str_mv | AT hanyu researchonthesecurityofipv6communicationbasedonpetrinetunderiot AT zhangliumei researchonthesecurityofipv6communicationbasedonpetrinetunderiot AT wangyichuan researchonthesecurityofipv6communicationbasedonpetrinetunderiot AT dengxi researchonthesecurityofipv6communicationbasedonpetrinetunderiot AT guzhendong researchonthesecurityofipv6communicationbasedonpetrinetunderiot AT zhangxiaohui researchonthesecurityofipv6communicationbasedonpetrinetunderiot |