This demonstration defines a small IoT wireless network that uses TI CC2538-OpenMote as hardware platform and state-of-the-art IETF network standards such as 6LoWPAN, RPL, and CoAP implemented by ContikiOS. The IoT nodes are controlled from outside the IoT network using end-to-end connectivity provided by IPv6-CoAP messages. We implement a man-in-the-middle attack that disrupts the normal behavior of the system. Our attack leverages on the inherent hierarchical routing topology of RPL-based IoT networks. The demonstration aims at highlighting the need for end-to-end source-authentication and authorization enforcement of information even inside a trusted IoT network. We also provide some insights on how these services can be offered in a IoT-friendly way.
CITATION STYLE
Navas, R. E., Le Bouder, H., Cuppens, N., Cuppens, F., & Papadopoulos, G. Z. (2018). Demo: Do not trust your neighbors! a small iot platform illustrating a man-in-the-middle attack. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11104 LNCS, pp. 120–125). Springer Verlag. https://doi.org/10.1007/978-3-030-00247-3_11
Mendeley helps you to discover research relevant for your work.