Cargando…

Research on the Security of IPv6 Communication Based on Petri Net under IoT

The distribution of wireless network systems challenges the communication security of Internet of Things (IoT), and the IPv6 protocol is gradually becoming the main communication protocol under the IoT. The Neighbor Discovery Protocol (NDP), as the base protocol of IPv6, includes address resolution,...

Descripción completa

Detalles Bibliográficos
Autores principales: Han, Yu, Zhang, Liumei, Wang, Yichuan, Deng, Xi, Gu, Zhendong, Zhang, Xiaohui
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10255493/
https://www.ncbi.nlm.nih.gov/pubmed/37299919
http://dx.doi.org/10.3390/s23115192
_version_ 1785056885675655168
author Han, Yu
Zhang, Liumei
Wang, Yichuan
Deng, Xi
Gu, Zhendong
Zhang, Xiaohui
author_facet Han, Yu
Zhang, Liumei
Wang, Yichuan
Deng, Xi
Gu, Zhendong
Zhang, Xiaohui
author_sort Han, Yu
collection PubMed
description The distribution of wireless network systems challenges the communication security of Internet of Things (IoT), and the IPv6 protocol is gradually becoming the main communication protocol under the IoT. The Neighbor Discovery Protocol (NDP), as the base protocol of IPv6, includes address resolution, DAD, route redirection and other functions. The NDP protocol faces many attacks, such as DDoS attacks, MITM attacks, etc. In this paper, we focus on the communication-addressing problem between nodes in the Internet of Things (IoT). We propose a Petri-Net-based NS flooding attack model for the flooding attack problem of address resolution protocols under the NDP protocol. Through a fine-grained analysis of the Petri Net model and attacking techniques, we propose another Petri-Net-based defense model under the SDN architecture, achieving security for communications. We further simulate the normal communication between nodes in the EVE-NG simulation environment. We implement a DDoS attack on the communication protocol by an attacker who obtains the attack data through the THC-IPv6 tool. In this paper, the SVM algorithm, random forest algorithm (RF) and Bayesian algorithm (NBC) are used to process the attack data. The NBC algorithm is proven to exhibit high accuracy in classifying and identifying data through experiments. Further, the abnormal data are discarded through the abnormal data processing rules issued by the controller in the SDN architecture, to ensure the security of communications between nodes.
format Online
Article
Text
id pubmed-10255493
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-102554932023-06-10 Research on the Security of IPv6 Communication Based on Petri Net under IoT Han, Yu Zhang, Liumei Wang, Yichuan Deng, Xi Gu, Zhendong Zhang, Xiaohui Sensors (Basel) Article The distribution of wireless network systems challenges the communication security of Internet of Things (IoT), and the IPv6 protocol is gradually becoming the main communication protocol under the IoT. The Neighbor Discovery Protocol (NDP), as the base protocol of IPv6, includes address resolution, DAD, route redirection and other functions. The NDP protocol faces many attacks, such as DDoS attacks, MITM attacks, etc. In this paper, we focus on the communication-addressing problem between nodes in the Internet of Things (IoT). We propose a Petri-Net-based NS flooding attack model for the flooding attack problem of address resolution protocols under the NDP protocol. Through a fine-grained analysis of the Petri Net model and attacking techniques, we propose another Petri-Net-based defense model under the SDN architecture, achieving security for communications. We further simulate the normal communication between nodes in the EVE-NG simulation environment. We implement a DDoS attack on the communication protocol by an attacker who obtains the attack data through the THC-IPv6 tool. In this paper, the SVM algorithm, random forest algorithm (RF) and Bayesian algorithm (NBC) are used to process the attack data. The NBC algorithm is proven to exhibit high accuracy in classifying and identifying data through experiments. Further, the abnormal data are discarded through the abnormal data processing rules issued by the controller in the SDN architecture, to ensure the security of communications between nodes. MDPI 2023-05-30 /pmc/articles/PMC10255493/ /pubmed/37299919 http://dx.doi.org/10.3390/s23115192 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Han, Yu
Zhang, Liumei
Wang, Yichuan
Deng, Xi
Gu, Zhendong
Zhang, Xiaohui
Research on the Security of IPv6 Communication Based on Petri Net under IoT
title Research on the Security of IPv6 Communication Based on Petri Net under IoT
title_full Research on the Security of IPv6 Communication Based on Petri Net under IoT
title_fullStr Research on the Security of IPv6 Communication Based on Petri Net under IoT
title_full_unstemmed Research on the Security of IPv6 Communication Based on Petri Net under IoT
title_short Research on the Security of IPv6 Communication Based on Petri Net under IoT
title_sort research on the security of ipv6 communication based on petri net under iot
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10255493/
https://www.ncbi.nlm.nih.gov/pubmed/37299919
http://dx.doi.org/10.3390/s23115192
work_keys_str_mv AT hanyu researchonthesecurityofipv6communicationbasedonpetrinetunderiot
AT zhangliumei researchonthesecurityofipv6communicationbasedonpetrinetunderiot
AT wangyichuan researchonthesecurityofipv6communicationbasedonpetrinetunderiot
AT dengxi researchonthesecurityofipv6communicationbasedonpetrinetunderiot
AT guzhendong researchonthesecurityofipv6communicationbasedonpetrinetunderiot
AT zhangxiaohui researchonthesecurityofipv6communicationbasedonpetrinetunderiot