Vulnerabilities of the 6P protocol for the Industrial Internet of Things: Impact analysis and mitigation

The 6TiSCH architecture defined by the IETF provides a standard solution for extending the Internet of Things (IoT) paradigm to industrial applications with stringent reliability and timeliness requirements. In this context, communication security is another crucial requirement, which is currently l...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Computer communications Ročník 194; s. 411 - 432
Hlavní autoři: Righetti, Francesca, Vallati, Carlo, Tiloca, Marco, Anastasi, Giuseppe
Médium: Journal Article
Jazyk:angličtina
Vydáno: Elsevier B.V 01.10.2022
Témata:
ISSN:0140-3664, 1873-703X, 1873-703X
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract The 6TiSCH architecture defined by the IETF provides a standard solution for extending the Internet of Things (IoT) paradigm to industrial applications with stringent reliability and timeliness requirements. In this context, communication security is another crucial requirement, which is currently less investigated in the literature. In this article, we present a deep assessment of the security vulnerabilities of 6P, the protocol used for resource negotiation at the core of the 6TiSCH architecture. Specifically, we highlight two possible attacks against 6P, namely the Traffic Dispersion and the Overloading attacks. These two attacks effectively and stealthy alter the communication schedule of victim nodes and severely thwart network basic functionalities and efficiency, by specifically impacting network availability and energy consumption of victim nodes. To assess the impact of the attacks two analytical models have been defined, while, to demonstrate their feasibility, they have been implemented in Contiki-NG. The implementation has been used to quantitatively evaluate the impact of the two attacks by both simulations and measurements in a real testbed. Our results show that the impact of both attacks may be very significant. The impact, however, strongly depends on the position of the victim node(s) in the network and it is highly influenced by the dynamics of the routing protocol. We have investigated mitigation strategies to alleviate this impact and proposed an extended version of the Minimal Scheduling Function (MSF), i.e., the reference scheduling algorithm for 6TiSCH. This allows network nodes to early detect anomalies in their schedules possibly due to an Overloading attack, and thus curb the attack impact by appropriately revising their schedule.
AbstractList The 6TiSCH architecture defined by the IETF provides a standard solution for extending the Internet of Things (IoT) paradigm to industrial applications with stringent reliability and timeliness requirements. In this context, communication security is another crucial requirement, which is currently less investigated in the literature. In this article, we present a deep assessment of the security vulnerabilities of 6P, the protocol used for resource negotiation at the core of the 6TiSCH architecture. Specifically, we highlight two possible attacks against 6P, namely the Traffic Dispersion and the Overloading attacks. These two attacks effectively and stealthy alter the communication schedule of victim nodes and severely thwart network basic functionalities and efficiency, by specifically impacting network availability and energy consumption of victim nodes. To assess the impact of the attacks two analytical models have been defined, while, to demonstrate their feasibility, they have been implemented in Contiki-NG. The implementation has been used to quantitatively evaluate the impact of the two attacks by both simulations and measurements in a real testbed. Our results show that the impact of both attacks may be very significant. The impact, however, strongly depends on the position of the victim node(s) in the network and it is highly influenced by the dynamics of the routing protocol. We have investigated mitigation strategies to alleviate this impact and proposed an extended version of the Minimal Scheduling Function (MSF), i.e., the reference scheduling algorithm for 6TiSCH. This allows network nodes to early detect anomalies in their schedules possibly due to an Overloading attack, and thus curb the attack impact by appropriately revising their schedule. 
The 6TiSCH architecture defined by the IETF provides a standard solution for extending the Internet of Things (IoT) paradigm to industrial applications with stringent reliability and timeliness requirements. In this context, communication security is another crucial requirement, which is currently less investigated in the literature. In this article, we present a deep assessment of the security vulnerabilities of 6P, the protocol used for resource negotiation at the core of the 6TiSCH architecture. Specifically, we highlight two possible attacks against 6P, namely the Traffic Dispersion and the Overloading attacks. These two attacks effectively and stealthy alter the communication schedule of victim nodes and severely thwart network basic functionalities and efficiency, by specifically impacting network availability and energy consumption of victim nodes. To assess the impact of the attacks two analytical models have been defined, while, to demonstrate their feasibility, they have been implemented in Contiki-NG. The implementation has been used to quantitatively evaluate the impact of the two attacks by both simulations and measurements in a real testbed. Our results show that the impact of both attacks may be very significant. The impact, however, strongly depends on the position of the victim node(s) in the network and it is highly influenced by the dynamics of the routing protocol. We have investigated mitigation strategies to alleviate this impact and proposed an extended version of the Minimal Scheduling Function (MSF), i.e., the reference scheduling algorithm for 6TiSCH. This allows network nodes to early detect anomalies in their schedules possibly due to an Overloading attack, and thus curb the attack impact by appropriately revising their schedule.
Author Anastasi, Giuseppe
Vallati, Carlo
Righetti, Francesca
Tiloca, Marco
Author_xml – sequence: 1
  givenname: Francesca
  orcidid: 0000-0003-3892-8368
  surname: Righetti
  fullname: Righetti, Francesca
  email: francesca.righetti@ing.unipi.it
  organization: Department of Information Engineering, University of Pisa, Via Girolamo Caruso 16, 56126, Pisa, Italy
– sequence: 2
  givenname: Carlo
  surname: Vallati
  fullname: Vallati, Carlo
  email: carlo.vallati@unipi.it
  organization: Department of Information Engineering, University of Pisa, Via Girolamo Caruso 16, 56126, Pisa, Italy
– sequence: 3
  givenname: Marco
  orcidid: 0000-0001-8842-9810
  surname: Tiloca
  fullname: Tiloca, Marco
  email: marco.tiloca@ri.se
  organization: RISE Cybersecurity, RISE Research Institutes of Sweden, Kista, Sweden
– sequence: 4
  givenname: Giuseppe
  surname: Anastasi
  fullname: Anastasi, Giuseppe
  email: giuseppe.anastasi@unipi.it
  organization: Department of Information Engineering, University of Pisa, Via Girolamo Caruso 16, 56126, Pisa, Italy
BackLink https://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-60173$$DView record from Swedish Publication Index
https://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-60318$$DView record from Swedish Publication Index
BookMark eNqVUcFqGzEQFSWFOmn_oIe9l92MVvJqnUMhpG1qCCSHJPQmtNLIHrOWjCSn5O-7jtNLDy2FgXkM771h5p2ykxADMvaRQ8OBd-ebxsbtVE0LbduAamAu37AZ75WoFYgfJ2wGXEItuk6-Y6c5bwBAKiVmbP24HwMmM9BIhTBX0VdljVV3V-1SLNHGsfIxvcyWwe1zSWTGCRZMAcuBfr-msMoX1XK7M7ZUJpjxOVOegKu2k-nKFIrhPXvrzZjxw2s_Yw_fvt5ffa9vbq-XV5c3tZWtLLVywgPvpWtFq5wT82FAaZ3xPfZKykF55w30DgVHAar3C9l1Ylj4xTCfo0Bxxj4dffNP3O0HvUu0NelZR0P6Cz1e6phWOpHuQPD-P9hciYl9cWTbFHNO6LWl8nJdSYZGzUEf8tAbfcxDH_LQoPSUxySWf4h_L_uH7PNRhtPTngiTzpYwWHSU0BbtIv3d4BcTwKvV
CitedBy_id crossref_primary_10_1016_j_comnet_2024_110759
crossref_primary_10_1109_ACCESS_2025_3545918
crossref_primary_10_1016_j_cose_2023_103383
crossref_primary_10_1016_j_adhoc_2025_103864
crossref_primary_10_1016_j_jii_2024_100623
crossref_primary_10_1016_j_adhoc_2023_103162
Cites_doi 10.1016/j.iot.2020.100333
10.1145/3241052
10.1109/TMC.2018.2828835
10.1145/3395927
10.1007/s11276-021-02711-1
10.1109/TMC.2011.22
10.1109/LCOMM.2022.3155992
ContentType Journal Article
Copyright 2022 Elsevier B.V.
Copyright_xml – notice: 2022 Elsevier B.V.
DBID AAYXX
CITATION
ADTPV
AOWAS
D8T
ZZAVC
DOI 10.1016/j.comcom.2022.07.054
DatabaseName CrossRef
SwePub
SwePub Articles
SWEPUB Freely available online
SwePub Articles full text
DatabaseTitle CrossRef
DatabaseTitleList


DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1873-703X
EndPage 432
ExternalDocumentID oai_DiVA_org_ri_60318
oai_DiVA_org_ri_60173
10_1016_j_comcom_2022_07_054
S0140366422003085
GroupedDBID --K
--M
.DC
.~1
0R~
1B1
1~.
1~5
4.4
457
4G.
5GY
5VS
7-5
71M
77K
8P~
9JN
AABNK
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAXUO
AAYFN
ABBOA
ABFNM
ABMAC
ABYKQ
ACDAQ
ACGFS
ACRLP
ACZNC
ADBBV
ADEZE
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
AXJTR
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EO8
EO9
EP2
EP3
FDB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
IHE
J1W
JJJVA
KOM
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
ROL
RPZ
RXW
SDF
SDG
SDP
SES
SPC
SPCBC
SST
SSV
SSZ
T5K
WH7
ZMT
~G-
07C
29F
77I
9DU
AAQXK
AATTM
AAXKI
AAYWO
AAYXX
ABJNI
ABWVN
ABXDB
ACLOT
ACNNM
ACRPL
ACVFH
ADCNI
ADJOM
ADMUD
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AI.
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
ASPBG
AVWKF
AZFZN
CITATION
EFKBS
EJD
F0J
FEDTE
FGOYB
HLZ
HVGLF
HZ~
R2-
SBC
SEW
TAE
UHS
VH1
VOH
WUQ
XPP
ZY4
~HD
ADTPV
AOWAS
D8T
ZZAVC
ID FETCH-LOGICAL-c424t-7d3f0184d2327dd35bbe4cdaf8e8744b7fdfa08de31e3078f94663b9f9b55e3e3
ISICitedReferencesCount 6
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000860367900011&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0140-3664
1873-703X
IngestDate Wed Sep 24 03:38:21 EDT 2025
Wed Sep 24 03:24:49 EDT 2025
Sat Nov 29 07:22:48 EST 2025
Tue Nov 18 21:22:03 EST 2025
Fri Feb 23 02:38:12 EST 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords Availability
MSF
6P
6TiSCH
Security
6P vulnerabilities
Industrial Internet of Things
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c424t-7d3f0184d2327dd35bbe4cdaf8e8744b7fdfa08de31e3078f94663b9f9b55e3e3
ORCID 0000-0001-8842-9810
0000-0003-3892-8368
OpenAccessLink https://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-60173
PageCount 22
ParticipantIDs swepub_primary_oai_DiVA_org_ri_60318
swepub_primary_oai_DiVA_org_ri_60173
crossref_citationtrail_10_1016_j_comcom_2022_07_054
crossref_primary_10_1016_j_comcom_2022_07_054
elsevier_sciencedirect_doi_10_1016_j_comcom_2022_07_054
PublicationCentury 2000
PublicationDate 2022-10-01
PublicationDateYYYYMMDD 2022-10-01
PublicationDate_xml – month: 10
  year: 2022
  text: 2022-10-01
  day: 01
PublicationDecade 2020
PublicationTitle Computer communications
PublicationYear 2022
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Thubert (b1) 2021
Fafoutis, Elsts, Vafeas, Oikonomou, Piechocki (b30) 2018
Boufenneche, Zitouni, George, Gharbi (b17) 2021; 27
Gunnarsson, Brorsson, Palombini, Seitz, Tiloca (b14) 2021; 13
Fanucchi, Righetti, Vallati, Staehle, Anastasi (b20) 2019
Vallati, Ancillotti, Bruno, Mingozzi, Anastasi (b25) 2016
Kim, Kim, Kim (b15) 2019
Gnawali, Levis (b11) 2012
Vallati, Brienza, Anastasi, Das (b18) 2019; 18
Durmaz Incel, Ghosh, Krishnamachari, Chintalapudi (b28) 2012; 11
Righetti, Vallati, Anastasi, Das (b31) 2017
De Couto, Aguayo, Bicket, Morris (b12) 2003
Althubaity, Gong, Raymond, Nixon, Ammar, Han (b22) 2020
Righetti, Vallati, Das, Anastasi (b16) 2020; 1
Dunkels, Osterlind, Tsiftes, He (b29) 2007
Carignani, Righetti, Vallati, Tiloca, Anastasi (b5) 2020
Montenegro, Kushalnagar, Hui, Culler (b7) 2007
(b4) 2004
Winter, Thubert, Brandt, Hui, Kelsey, Levis, Pister, Struik, Vasseur, Alexander (b8) 2012
Kalita, Brighente, Khatua, Conti (b21) 2022; 26
(b10) 2020
Chang, Vučinić, Vilajosana, Duquennoy, Dujovne (b2) 2021
(b26) 2016
Shelby, Hartke, Bormann (b9) 2014
Yang, Wang, Wan, He (b23) 2016
Fanucchi, Staehle, Knorr (b19) 2018
Tiloca, Guglielmo, Dini, Anastasi, Das (b24) 2019; 15
Vučinić, Simon, Pister, Richardson (b3) 2021
Wang, Vilajosana, Watteyne (b6) 2018
Selander, Mattsson, Palombini, Seitz (b13) 2019
Osterlind, Dunkels, Eriksson, Finne, Voigt (b27) 2006
Chang (10.1016/j.comcom.2022.07.054_b2) 2021
Righetti (10.1016/j.comcom.2022.07.054_b31) 2017
Righetti (10.1016/j.comcom.2022.07.054_b16) 2020; 1
(10.1016/j.comcom.2022.07.054_b4) 2004
Althubaity (10.1016/j.comcom.2022.07.054_b22) 2020
Vučinić (10.1016/j.comcom.2022.07.054_b3) 2021
Durmaz Incel (10.1016/j.comcom.2022.07.054_b28) 2012; 11
Yang (10.1016/j.comcom.2022.07.054_b23) 2016
Gnawali (10.1016/j.comcom.2022.07.054_b11) 2012
Fanucchi (10.1016/j.comcom.2022.07.054_b19) 2018
Dunkels (10.1016/j.comcom.2022.07.054_b29) 2007
Montenegro (10.1016/j.comcom.2022.07.054_b7) 2007
De Couto (10.1016/j.comcom.2022.07.054_b12) 2003
Fanucchi (10.1016/j.comcom.2022.07.054_b20) 2019
Vallati (10.1016/j.comcom.2022.07.054_b25) 2016
Osterlind (10.1016/j.comcom.2022.07.054_b27) 2006
Boufenneche (10.1016/j.comcom.2022.07.054_b17) 2021; 27
Gunnarsson (10.1016/j.comcom.2022.07.054_b14) 2021; 13
(10.1016/j.comcom.2022.07.054_b10) 2020
Wang (10.1016/j.comcom.2022.07.054_b6) 2018
Shelby (10.1016/j.comcom.2022.07.054_b9) 2014
Selander (10.1016/j.comcom.2022.07.054_b13) 2019
Fafoutis (10.1016/j.comcom.2022.07.054_b30) 2018
Kalita (10.1016/j.comcom.2022.07.054_b21) 2022; 26
Thubert (10.1016/j.comcom.2022.07.054_b1) 2021
(10.1016/j.comcom.2022.07.054_b26) 2016
Tiloca (10.1016/j.comcom.2022.07.054_b24) 2019; 15
Winter (10.1016/j.comcom.2022.07.054_b8) 2012
Kim (10.1016/j.comcom.2022.07.054_b15) 2019
Vallati (10.1016/j.comcom.2022.07.054_b18) 2019; 18
Carignani (10.1016/j.comcom.2022.07.054_b5) 2020
References_xml – volume: 18
  start-page: 98
  year: 2019
  end-page: 110
  ident: b18
  article-title: Improving network formation in 6TiSCH networks
  publication-title: IEEE Trans. Mob. Comput.
– year: 2021
  ident: b2
  article-title: 6TiSCH Minimal Scheduling Function (MSF)
– start-page: 121
  year: 2019
  end-page: 132
  ident: b15
  article-title: ALICE: Autonomous link-based cell scheduling for TSCH
  publication-title: 18th International Conference on Information Processing in Sensor Networks
– start-page: 227
  year: 2018
  end-page: 234
  ident: b19
  article-title: Network formation for industrial IoT: Evaluation, limits and recommendations
  publication-title: 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)
– year: 2016
  ident: b26
  article-title: Zolertia re-mote
– volume: 27
  start-page: 3927
  year: 2021
  end-page: 3946
  ident: b17
  article-title: Selfishness in secure internet of things networks: 6TiSCH case study
  publication-title: Wirel. Netw.
– year: 2018
  ident: b6
  article-title: 6TiSCH Operation Sublayer (6top) Protocol (6P)
– volume: 26
  start-page: 1190
  year: 2022
  end-page: 1193
  ident: b21
  article-title: Effect of DIS attack on 6TiSCH network formation
  publication-title: IEEE Commun. Lett.
– start-page: 243
  year: 2019
  end-page: 250
  ident: b20
  article-title: Improving link quality estimation accuracy in 6TiSCH networks
  publication-title: 6th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)
– start-page: 102
  year: 2016
  end-page: 107
  ident: b23
  article-title: Security vulnerabilities and countermeasures for time synchronization in IEEE 802.15.4e networks
  publication-title: 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)
– year: 2021
  ident: b3
  article-title: Constrained Join Protocol (CoJP) for 6TiSCH
– start-page: 1
  year: 2017
  end-page: 6
  ident: b31
  article-title: Performance evaluation the 6top protocol and analysis of its interplay with routing
  publication-title: 2017 IEEE International Conference on Smart Computing (SMARTCOMP)
– start-page: 1
  year: 2004
  end-page: 9
  ident: b4
  article-title: Standards for Security Categorization of Federal Information and Information Systems
– volume: 11
  start-page: 86
  year: 2012
  end-page: 99
  ident: b28
  article-title: Fast data collection in tree-based wireless sensor networks
  publication-title: IEEE Trans. Mob. Comput.
– volume: 15
  start-page: 1
  year: 2019
  end-page: 28
  ident: b24
  article-title: DISH: Distributed shuffling against selective jamming attack in IEEE 802.15.4e TSCH networks
  publication-title: ACM Trans. Sensor Netw.
– start-page: 419
  year: 2003
  end-page: 434
  ident: b12
  article-title: A high-throughput path metric for multi-hop wireless routing
  publication-title: 9th Annual International Conference on Mobile Computing and Networking
– start-page: 28
  year: 2007
  end-page: 32
  ident: b29
  article-title: Software-based on-line energy estimation for sensor nodes
  publication-title: 4th Workshop on Embedded Networked Sensors
– start-page: 168
  year: 2020
  end-page: 175
  ident: b22
  article-title: Specification-based distributed detection of rank-related attacks in RPL-based resource-constrained real-time wireless networks
  publication-title: 2020 IEEE Conference on Industrial Cyberphysical Systems (ICPS), Vol. 1
– year: 2019
  ident: b13
  article-title: Object Security for Constrained RESTful Environments (OSCORE)
– year: 2012
  ident: b8
  article-title: RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks
– year: 2014
  ident: b9
  article-title: The Constrained Application Protocol (CoAP)
– start-page: 83
  year: 2016
  end-page: 90
  ident: b25
  article-title: Interplay of link quality estimation and RPL performance: An experimental study
  publication-title: 13th Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks
– year: 2021
  ident: b1
  article-title: An Architecture for IPv6 over the Time-Slotted Channel Hopping Mode of IEEE 802.15.4 (6TiSCH)
– start-page: 641
  year: 2006
  end-page: 648
  ident: b27
  article-title: Cross-level sensor network simulation with COOJA
  publication-title: 31st IEEE Conference on Local Computer Networks
– start-page: 68
  year: 2020
  end-page: 77
  ident: b5
  article-title: Evaluation of feasibility and impact of attacks against the 6top protocol in 6TiSCH networks
  publication-title: 21st International Symposium on ”a World of Wireless, Mobile and Multimedia Networks” (WoWMoM)
– year: 2012
  ident: b11
  article-title: The Minimum Rank with Hysteresis Objective Function
– start-page: 7
  year: 2018
  end-page: 12
  ident: b30
  article-title: On predicting the battery lifetime of IoT devices: Experiences from the SPHERE deployments
  publication-title: 7th International Workshop on Real-World Embedded Wireless Systems and Networks
– volume: 13
  start-page: 1
  year: 2021
  end-page: 16
  ident: b14
  article-title: Evaluating the performance of the OSCORE security protocol in constrained IoT environments
  publication-title: Internet Things
– year: 2020
  ident: b10
  article-title: IEEE 802.15.4-2020 - IEEE Standard for Low-Rate Wireless Networks
– year: 2007
  ident: b7
  article-title: Transmission of IPv6 Packets over IEEE 802.15.4 Networks
– volume: 1
  start-page: 1
  year: 2020
  end-page: 31
  ident: b16
  article-title: An evaluation of the 6TiSCH distributed resource management mode
  publication-title: ACM Trans. Internet Things
– start-page: 7
  year: 2018
  ident: 10.1016/j.comcom.2022.07.054_b30
  article-title: On predicting the battery lifetime of IoT devices: Experiences from the SPHERE deployments
– start-page: 28
  year: 2007
  ident: 10.1016/j.comcom.2022.07.054_b29
  article-title: Software-based on-line energy estimation for sensor nodes
– start-page: 1
  year: 2017
  ident: 10.1016/j.comcom.2022.07.054_b31
  article-title: Performance evaluation the 6top protocol and analysis of its interplay with routing
– volume: 13
  start-page: 1
  year: 2021
  ident: 10.1016/j.comcom.2022.07.054_b14
  article-title: Evaluating the performance of the OSCORE security protocol in constrained IoT environments
  publication-title: Internet Things
  doi: 10.1016/j.iot.2020.100333
– volume: 15
  start-page: 1
  issue: 1
  year: 2019
  ident: 10.1016/j.comcom.2022.07.054_b24
  article-title: DISH: Distributed shuffling against selective jamming attack in IEEE 802.15.4e TSCH networks
  publication-title: ACM Trans. Sensor Netw.
  doi: 10.1145/3241052
– year: 2019
  ident: 10.1016/j.comcom.2022.07.054_b13
– year: 2018
  ident: 10.1016/j.comcom.2022.07.054_b6
– start-page: 68
  year: 2020
  ident: 10.1016/j.comcom.2022.07.054_b5
  article-title: Evaluation of feasibility and impact of attacks against the 6top protocol in 6TiSCH networks
– year: 2014
  ident: 10.1016/j.comcom.2022.07.054_b9
– start-page: 227
  year: 2018
  ident: 10.1016/j.comcom.2022.07.054_b19
  article-title: Network formation for industrial IoT: Evaluation, limits and recommendations
– year: 2020
  ident: 10.1016/j.comcom.2022.07.054_b10
– volume: 18
  start-page: 98
  issue: 1
  year: 2019
  ident: 10.1016/j.comcom.2022.07.054_b18
  article-title: Improving network formation in 6TiSCH networks
  publication-title: IEEE Trans. Mob. Comput.
  doi: 10.1109/TMC.2018.2828835
– start-page: 641
  year: 2006
  ident: 10.1016/j.comcom.2022.07.054_b27
  article-title: Cross-level sensor network simulation with COOJA
– year: 2012
  ident: 10.1016/j.comcom.2022.07.054_b8
– start-page: 168
  year: 2020
  ident: 10.1016/j.comcom.2022.07.054_b22
  article-title: Specification-based distributed detection of rank-related attacks in RPL-based resource-constrained real-time wireless networks
– year: 2016
  ident: 10.1016/j.comcom.2022.07.054_b26
– year: 2021
  ident: 10.1016/j.comcom.2022.07.054_b2
– volume: 1
  start-page: 1
  issue: 4
  year: 2020
  ident: 10.1016/j.comcom.2022.07.054_b16
  article-title: An evaluation of the 6TiSCH distributed resource management mode
  publication-title: ACM Trans. Internet Things
  doi: 10.1145/3395927
– year: 2021
  ident: 10.1016/j.comcom.2022.07.054_b1
– volume: 27
  start-page: 3927
  issue: 6
  year: 2021
  ident: 10.1016/j.comcom.2022.07.054_b17
  article-title: Selfishness in secure internet of things networks: 6TiSCH case study
  publication-title: Wirel. Netw.
  doi: 10.1007/s11276-021-02711-1
– start-page: 102
  year: 2016
  ident: 10.1016/j.comcom.2022.07.054_b23
  article-title: Security vulnerabilities and countermeasures for time synchronization in IEEE 802.15.4e networks
– start-page: 419
  year: 2003
  ident: 10.1016/j.comcom.2022.07.054_b12
  article-title: A high-throughput path metric for multi-hop wireless routing
– start-page: 1
  year: 2004
  ident: 10.1016/j.comcom.2022.07.054_b4
– start-page: 243
  year: 2019
  ident: 10.1016/j.comcom.2022.07.054_b20
  article-title: Improving link quality estimation accuracy in 6TiSCH networks
– start-page: 83
  year: 2016
  ident: 10.1016/j.comcom.2022.07.054_b25
  article-title: Interplay of link quality estimation and RPL performance: An experimental study
– volume: 11
  start-page: 86
  issue: 1
  year: 2012
  ident: 10.1016/j.comcom.2022.07.054_b28
  article-title: Fast data collection in tree-based wireless sensor networks
  publication-title: IEEE Trans. Mob. Comput.
  doi: 10.1109/TMC.2011.22
– start-page: 121
  year: 2019
  ident: 10.1016/j.comcom.2022.07.054_b15
  article-title: ALICE: Autonomous link-based cell scheduling for TSCH
– year: 2021
  ident: 10.1016/j.comcom.2022.07.054_b3
– volume: 26
  start-page: 1190
  issue: 5
  year: 2022
  ident: 10.1016/j.comcom.2022.07.054_b21
  article-title: Effect of DIS attack on 6TiSCH network formation
  publication-title: IEEE Commun. Lett.
  doi: 10.1109/LCOMM.2022.3155992
– year: 2007
  ident: 10.1016/j.comcom.2022.07.054_b7
– year: 2012
  ident: 10.1016/j.comcom.2022.07.054_b11
SSID ssj0004773
Score 2.4059324
Snippet The 6TiSCH architecture defined by the IETF provides a standard solution for extending the Internet of Things (IoT) paradigm to industrial applications with...
SourceID swepub
crossref
elsevier
SourceType Open Access Repository
Enrichment Source
Index Database
Publisher
StartPage 411
SubjectTerms 6P Vulnerabilities
6p vulnerability
6TiSCH
Availability
Energy utilization
Impact analysis
Impact mitigation
Industrial internet of thing
Industrial Internet of Things
Internet of things
Internet protocols
Minimal scheduling function
MSF
Network architecture
Network security
Power management (telecommunication)
Scheduling algorithms
Scheduling functions
Security
Standard solutions
Title Vulnerabilities of the 6P protocol for the Industrial Internet of Things: Impact analysis and mitigation
URI https://dx.doi.org/10.1016/j.comcom.2022.07.054
https://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-60173
https://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-60318
Volume 194
WOSCitedRecordID wos000860367900011&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: ScienceDirect database
  customDbUrl:
  eissn: 1873-703X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0004773
  issn: 1873-703X
  databaseCode: AIEXJ
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELag5QAHxFO0PORDr5Gya28cc1uVAkWo2kNZ7c1KHAdSbZNVkkX9-Z2x4yRlhbocuESR13nI8-14MvrmG0JOZrGGbTPSELmFYYC1kkGicxlkeir5BDfI3Fr6u7i4iFcruehyuo1tJyDKMr65kZv_amoYA2Nj6ew_mLu_KQzAORgdjmB2OO5l-OV2jUrSlvRaOElZDC6jBXKx2goM31MLR307XGbQWF6A6-WJuYJzV0OZeOUSzLJfF06Wo7OnVznoukMgR32oOBmI9EgnaR11wPbyMM3AEVpiMt_9dprU66rPJhS403YVRbofnpcJhLSNnf-l2DZmszHj5AV893oanPe3sWABOJ3VHYcs-cilcueMd1y9yzpcoaWQ94N3dzKsfNja7ohofyqWc1XVP1VdKNtb-yE5nIqZBF94OD8_W30b6mmFYyYg9ZVFVoKsf1Fffmk5grvP_mt4M9ahtbHL5TPytPvooHMHlufkgSlfkCcjKcqX5NcfsKFVTgEiNFpQDxsKsLFjA2yohw1Od7D5SB1oqAcNnGR0AM0r8uPz2eXp16DrwhFoPuVtIDKWh5OYZxB7iyxjszQ1XGdJHhtsnZCKPMuTMM4MmxjYMOIcOxawVOYync0MM-w1OSir0rwhFKJ9CA91xFH0KGVCijDRcAWTnJmcx0eE-cVTupOox04pa-W5iFfKLbnCJVehULDkRyTor9o4iZZ75gtvF9WFmS58VACte648cWbsn7OLq4lg-0wD-B3vN-0teTz8c96Rg7bemvfkkf7dFk39oYPuLc6BvGE
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Vulnerabilities+of+the+6P+protocol+for+the+Industrial+Internet+of+Things%3A+Impact+analysis+and+mitigation&rft.jtitle=Computer+communications&rft.au=Righetti%2C+Francesca&rft.au=Vallati%2C+Carlo&rft.au=Tiloca%2C+Marco&rft.au=Anastasi%2C+Giuseppe&rft.date=2022-10-01&rft.issn=1873-703X&rft.volume=194&rft.spage=411&rft_id=info:doi/10.1016%2Fj.comcom.2022.07.054&rft.externalDocID=oai_DiVA_org_ri_60318
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0140-3664&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0140-3664&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0140-3664&client=summon