Vulnerabilities of the 6P protocol for the Industrial Internet of Things: Impact analysis and mitigation
The 6TiSCH architecture defined by the IETF provides a standard solution for extending the Internet of Things (IoT) paradigm to industrial applications with stringent reliability and timeliness requirements. In this context, communication security is another crucial requirement, which is currently l...
Uloženo v:
| Vydáno v: | Computer communications Ročník 194; s. 411 - 432 |
|---|---|
| Hlavní autoři: | , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Elsevier B.V
01.10.2022
|
| Témata: | |
| ISSN: | 0140-3664, 1873-703X, 1873-703X |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | The 6TiSCH architecture defined by the IETF provides a standard solution for extending the Internet of Things (IoT) paradigm to industrial applications with stringent reliability and timeliness requirements. In this context, communication security is another crucial requirement, which is currently less investigated in the literature. In this article, we present a deep assessment of the security vulnerabilities of 6P, the protocol used for resource negotiation at the core of the 6TiSCH architecture. Specifically, we highlight two possible attacks against 6P, namely the Traffic Dispersion and the Overloading attacks. These two attacks effectively and stealthy alter the communication schedule of victim nodes and severely thwart network basic functionalities and efficiency, by specifically impacting network availability and energy consumption of victim nodes. To assess the impact of the attacks two analytical models have been defined, while, to demonstrate their feasibility, they have been implemented in Contiki-NG. The implementation has been used to quantitatively evaluate the impact of the two attacks by both simulations and measurements in a real testbed. Our results show that the impact of both attacks may be very significant. The impact, however, strongly depends on the position of the victim node(s) in the network and it is highly influenced by the dynamics of the routing protocol. We have investigated mitigation strategies to alleviate this impact and proposed an extended version of the Minimal Scheduling Function (MSF), i.e., the reference scheduling algorithm for 6TiSCH. This allows network nodes to early detect anomalies in their schedules possibly due to an Overloading attack, and thus curb the attack impact by appropriately revising their schedule. |
|---|---|
| AbstractList | The 6TiSCH architecture defined by the IETF provides a standard solution for extending the Internet of Things (IoT) paradigm to industrial applications with stringent reliability and timeliness requirements. In this context, communication security is another crucial requirement, which is currently less investigated in the literature. In this article, we present a deep assessment of the security vulnerabilities of 6P, the protocol used for resource negotiation at the core of the 6TiSCH architecture. Specifically, we highlight two possible attacks against 6P, namely the Traffic Dispersion and the Overloading attacks. These two attacks effectively and stealthy alter the communication schedule of victim nodes and severely thwart network basic functionalities and efficiency, by specifically impacting network availability and energy consumption of victim nodes. To assess the impact of the attacks two analytical models have been defined, while, to demonstrate their feasibility, they have been implemented in Contiki-NG. The implementation has been used to quantitatively evaluate the impact of the two attacks by both simulations and measurements in a real testbed. Our results show that the impact of both attacks may be very significant. The impact, however, strongly depends on the position of the victim node(s) in the network and it is highly influenced by the dynamics of the routing protocol. We have investigated mitigation strategies to alleviate this impact and proposed an extended version of the Minimal Scheduling Function (MSF), i.e., the reference scheduling algorithm for 6TiSCH. This allows network nodes to early detect anomalies in their schedules possibly due to an Overloading attack, and thus curb the attack impact by appropriately revising their schedule. The 6TiSCH architecture defined by the IETF provides a standard solution for extending the Internet of Things (IoT) paradigm to industrial applications with stringent reliability and timeliness requirements. In this context, communication security is another crucial requirement, which is currently less investigated in the literature. In this article, we present a deep assessment of the security vulnerabilities of 6P, the protocol used for resource negotiation at the core of the 6TiSCH architecture. Specifically, we highlight two possible attacks against 6P, namely the Traffic Dispersion and the Overloading attacks. These two attacks effectively and stealthy alter the communication schedule of victim nodes and severely thwart network basic functionalities and efficiency, by specifically impacting network availability and energy consumption of victim nodes. To assess the impact of the attacks two analytical models have been defined, while, to demonstrate their feasibility, they have been implemented in Contiki-NG. The implementation has been used to quantitatively evaluate the impact of the two attacks by both simulations and measurements in a real testbed. Our results show that the impact of both attacks may be very significant. The impact, however, strongly depends on the position of the victim node(s) in the network and it is highly influenced by the dynamics of the routing protocol. We have investigated mitigation strategies to alleviate this impact and proposed an extended version of the Minimal Scheduling Function (MSF), i.e., the reference scheduling algorithm for 6TiSCH. This allows network nodes to early detect anomalies in their schedules possibly due to an Overloading attack, and thus curb the attack impact by appropriately revising their schedule. |
| Author | Anastasi, Giuseppe Vallati, Carlo Righetti, Francesca Tiloca, Marco |
| Author_xml | – sequence: 1 givenname: Francesca orcidid: 0000-0003-3892-8368 surname: Righetti fullname: Righetti, Francesca email: francesca.righetti@ing.unipi.it organization: Department of Information Engineering, University of Pisa, Via Girolamo Caruso 16, 56126, Pisa, Italy – sequence: 2 givenname: Carlo surname: Vallati fullname: Vallati, Carlo email: carlo.vallati@unipi.it organization: Department of Information Engineering, University of Pisa, Via Girolamo Caruso 16, 56126, Pisa, Italy – sequence: 3 givenname: Marco orcidid: 0000-0001-8842-9810 surname: Tiloca fullname: Tiloca, Marco email: marco.tiloca@ri.se organization: RISE Cybersecurity, RISE Research Institutes of Sweden, Kista, Sweden – sequence: 4 givenname: Giuseppe surname: Anastasi fullname: Anastasi, Giuseppe email: giuseppe.anastasi@unipi.it organization: Department of Information Engineering, University of Pisa, Via Girolamo Caruso 16, 56126, Pisa, Italy |
| BackLink | https://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-60173$$DView record from Swedish Publication Index https://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-60318$$DView record from Swedish Publication Index |
| BookMark | eNqVUcFqGzEQFSWFOmn_oIe9l92MVvJqnUMhpG1qCCSHJPQmtNLIHrOWjCSn5O-7jtNLDy2FgXkM771h5p2ykxADMvaRQ8OBd-ebxsbtVE0LbduAamAu37AZ75WoFYgfJ2wGXEItuk6-Y6c5bwBAKiVmbP24HwMmM9BIhTBX0VdljVV3V-1SLNHGsfIxvcyWwe1zSWTGCRZMAcuBfr-msMoX1XK7M7ZUJpjxOVOegKu2k-nKFIrhPXvrzZjxw2s_Yw_fvt5ffa9vbq-XV5c3tZWtLLVywgPvpWtFq5wT82FAaZ3xPfZKykF55w30DgVHAar3C9l1Ylj4xTCfo0Bxxj4dffNP3O0HvUu0NelZR0P6Cz1e6phWOpHuQPD-P9hciYl9cWTbFHNO6LWl8nJdSYZGzUEf8tAbfcxDH_LQoPSUxySWf4h_L_uH7PNRhtPTngiTzpYwWHSU0BbtIv3d4BcTwKvV |
| CitedBy_id | crossref_primary_10_1016_j_comnet_2024_110759 crossref_primary_10_1109_ACCESS_2025_3545918 crossref_primary_10_1016_j_cose_2023_103383 crossref_primary_10_1016_j_adhoc_2025_103864 crossref_primary_10_1016_j_jii_2024_100623 crossref_primary_10_1016_j_adhoc_2023_103162 |
| Cites_doi | 10.1016/j.iot.2020.100333 10.1145/3241052 10.1109/TMC.2018.2828835 10.1145/3395927 10.1007/s11276-021-02711-1 10.1109/TMC.2011.22 10.1109/LCOMM.2022.3155992 |
| ContentType | Journal Article |
| Copyright | 2022 Elsevier B.V. |
| Copyright_xml | – notice: 2022 Elsevier B.V. |
| DBID | AAYXX CITATION ADTPV AOWAS D8T ZZAVC |
| DOI | 10.1016/j.comcom.2022.07.054 |
| DatabaseName | CrossRef SwePub SwePub Articles SWEPUB Freely available online SwePub Articles full text |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1873-703X |
| EndPage | 432 |
| ExternalDocumentID | oai_DiVA_org_ri_60318 oai_DiVA_org_ri_60173 10_1016_j_comcom_2022_07_054 S0140366422003085 |
| GroupedDBID | --K --M .DC .~1 0R~ 1B1 1~. 1~5 4.4 457 4G. 5GY 5VS 7-5 71M 77K 8P~ 9JN AABNK AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAXUO AAYFN ABBOA ABFNM ABMAC ABYKQ ACDAQ ACGFS ACRLP ACZNC ADBBV ADEZE ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD AXJTR BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EO8 EO9 EP2 EP3 FDB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ IHE J1W JJJVA KOM LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 ROL RPZ RXW SDF SDG SDP SES SPC SPCBC SST SSV SSZ T5K WH7 ZMT ~G- 07C 29F 77I 9DU AAQXK AATTM AAXKI AAYWO AAYXX ABJNI ABWVN ABXDB ACLOT ACNNM ACRPL ACVFH ADCNI ADJOM ADMUD ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AI. AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP ASPBG AVWKF AZFZN CITATION EFKBS EJD F0J FEDTE FGOYB HLZ HVGLF HZ~ R2- SBC SEW TAE UHS VH1 VOH WUQ XPP ZY4 ~HD ADTPV AOWAS D8T ZZAVC |
| ID | FETCH-LOGICAL-c424t-7d3f0184d2327dd35bbe4cdaf8e8744b7fdfa08de31e3078f94663b9f9b55e3e3 |
| ISICitedReferencesCount | 6 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000860367900011&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0140-3664 1873-703X |
| IngestDate | Wed Sep 24 03:38:21 EDT 2025 Wed Sep 24 03:24:49 EDT 2025 Sat Nov 29 07:22:48 EST 2025 Tue Nov 18 21:22:03 EST 2025 Fri Feb 23 02:38:12 EST 2024 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Availability MSF 6P 6TiSCH Security 6P vulnerabilities Industrial Internet of Things |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c424t-7d3f0184d2327dd35bbe4cdaf8e8744b7fdfa08de31e3078f94663b9f9b55e3e3 |
| ORCID | 0000-0001-8842-9810 0000-0003-3892-8368 |
| OpenAccessLink | https://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-60173 |
| PageCount | 22 |
| ParticipantIDs | swepub_primary_oai_DiVA_org_ri_60318 swepub_primary_oai_DiVA_org_ri_60173 crossref_citationtrail_10_1016_j_comcom_2022_07_054 crossref_primary_10_1016_j_comcom_2022_07_054 elsevier_sciencedirect_doi_10_1016_j_comcom_2022_07_054 |
| PublicationCentury | 2000 |
| PublicationDate | 2022-10-01 |
| PublicationDateYYYYMMDD | 2022-10-01 |
| PublicationDate_xml | – month: 10 year: 2022 text: 2022-10-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationTitle | Computer communications |
| PublicationYear | 2022 |
| Publisher | Elsevier B.V |
| Publisher_xml | – name: Elsevier B.V |
| References | Thubert (b1) 2021 Fafoutis, Elsts, Vafeas, Oikonomou, Piechocki (b30) 2018 Boufenneche, Zitouni, George, Gharbi (b17) 2021; 27 Gunnarsson, Brorsson, Palombini, Seitz, Tiloca (b14) 2021; 13 Fanucchi, Righetti, Vallati, Staehle, Anastasi (b20) 2019 Vallati, Ancillotti, Bruno, Mingozzi, Anastasi (b25) 2016 Kim, Kim, Kim (b15) 2019 Gnawali, Levis (b11) 2012 Vallati, Brienza, Anastasi, Das (b18) 2019; 18 Durmaz Incel, Ghosh, Krishnamachari, Chintalapudi (b28) 2012; 11 Righetti, Vallati, Anastasi, Das (b31) 2017 De Couto, Aguayo, Bicket, Morris (b12) 2003 Althubaity, Gong, Raymond, Nixon, Ammar, Han (b22) 2020 Righetti, Vallati, Das, Anastasi (b16) 2020; 1 Dunkels, Osterlind, Tsiftes, He (b29) 2007 Carignani, Righetti, Vallati, Tiloca, Anastasi (b5) 2020 Montenegro, Kushalnagar, Hui, Culler (b7) 2007 (b4) 2004 Winter, Thubert, Brandt, Hui, Kelsey, Levis, Pister, Struik, Vasseur, Alexander (b8) 2012 Kalita, Brighente, Khatua, Conti (b21) 2022; 26 (b10) 2020 Chang, Vučinić, Vilajosana, Duquennoy, Dujovne (b2) 2021 (b26) 2016 Shelby, Hartke, Bormann (b9) 2014 Yang, Wang, Wan, He (b23) 2016 Fanucchi, Staehle, Knorr (b19) 2018 Tiloca, Guglielmo, Dini, Anastasi, Das (b24) 2019; 15 Vučinić, Simon, Pister, Richardson (b3) 2021 Wang, Vilajosana, Watteyne (b6) 2018 Selander, Mattsson, Palombini, Seitz (b13) 2019 Osterlind, Dunkels, Eriksson, Finne, Voigt (b27) 2006 Chang (10.1016/j.comcom.2022.07.054_b2) 2021 Righetti (10.1016/j.comcom.2022.07.054_b31) 2017 Righetti (10.1016/j.comcom.2022.07.054_b16) 2020; 1 (10.1016/j.comcom.2022.07.054_b4) 2004 Althubaity (10.1016/j.comcom.2022.07.054_b22) 2020 Vučinić (10.1016/j.comcom.2022.07.054_b3) 2021 Durmaz Incel (10.1016/j.comcom.2022.07.054_b28) 2012; 11 Yang (10.1016/j.comcom.2022.07.054_b23) 2016 Gnawali (10.1016/j.comcom.2022.07.054_b11) 2012 Fanucchi (10.1016/j.comcom.2022.07.054_b19) 2018 Dunkels (10.1016/j.comcom.2022.07.054_b29) 2007 Montenegro (10.1016/j.comcom.2022.07.054_b7) 2007 De Couto (10.1016/j.comcom.2022.07.054_b12) 2003 Fanucchi (10.1016/j.comcom.2022.07.054_b20) 2019 Vallati (10.1016/j.comcom.2022.07.054_b25) 2016 Osterlind (10.1016/j.comcom.2022.07.054_b27) 2006 Boufenneche (10.1016/j.comcom.2022.07.054_b17) 2021; 27 Gunnarsson (10.1016/j.comcom.2022.07.054_b14) 2021; 13 (10.1016/j.comcom.2022.07.054_b10) 2020 Wang (10.1016/j.comcom.2022.07.054_b6) 2018 Shelby (10.1016/j.comcom.2022.07.054_b9) 2014 Selander (10.1016/j.comcom.2022.07.054_b13) 2019 Fafoutis (10.1016/j.comcom.2022.07.054_b30) 2018 Kalita (10.1016/j.comcom.2022.07.054_b21) 2022; 26 Thubert (10.1016/j.comcom.2022.07.054_b1) 2021 (10.1016/j.comcom.2022.07.054_b26) 2016 Tiloca (10.1016/j.comcom.2022.07.054_b24) 2019; 15 Winter (10.1016/j.comcom.2022.07.054_b8) 2012 Kim (10.1016/j.comcom.2022.07.054_b15) 2019 Vallati (10.1016/j.comcom.2022.07.054_b18) 2019; 18 Carignani (10.1016/j.comcom.2022.07.054_b5) 2020 |
| References_xml | – volume: 18 start-page: 98 year: 2019 end-page: 110 ident: b18 article-title: Improving network formation in 6TiSCH networks publication-title: IEEE Trans. Mob. Comput. – year: 2021 ident: b2 article-title: 6TiSCH Minimal Scheduling Function (MSF) – start-page: 121 year: 2019 end-page: 132 ident: b15 article-title: ALICE: Autonomous link-based cell scheduling for TSCH publication-title: 18th International Conference on Information Processing in Sensor Networks – start-page: 227 year: 2018 end-page: 234 ident: b19 article-title: Network formation for industrial IoT: Evaluation, limits and recommendations publication-title: 23rd International Conference on Emerging Technologies and Factory Automation (ETFA) – year: 2016 ident: b26 article-title: Zolertia re-mote – volume: 27 start-page: 3927 year: 2021 end-page: 3946 ident: b17 article-title: Selfishness in secure internet of things networks: 6TiSCH case study publication-title: Wirel. Netw. – year: 2018 ident: b6 article-title: 6TiSCH Operation Sublayer (6top) Protocol (6P) – volume: 26 start-page: 1190 year: 2022 end-page: 1193 ident: b21 article-title: Effect of DIS attack on 6TiSCH network formation publication-title: IEEE Commun. Lett. – start-page: 243 year: 2019 end-page: 250 ident: b20 article-title: Improving link quality estimation accuracy in 6TiSCH networks publication-title: 6th International Conference on Internet of Things: Systems, Management and Security (IOTSMS) – start-page: 102 year: 2016 end-page: 107 ident: b23 article-title: Security vulnerabilities and countermeasures for time synchronization in IEEE 802.15.4e networks publication-title: 3rd International Conference on Cyber Security and Cloud Computing (CSCloud) – year: 2021 ident: b3 article-title: Constrained Join Protocol (CoJP) for 6TiSCH – start-page: 1 year: 2017 end-page: 6 ident: b31 article-title: Performance evaluation the 6top protocol and analysis of its interplay with routing publication-title: 2017 IEEE International Conference on Smart Computing (SMARTCOMP) – start-page: 1 year: 2004 end-page: 9 ident: b4 article-title: Standards for Security Categorization of Federal Information and Information Systems – volume: 11 start-page: 86 year: 2012 end-page: 99 ident: b28 article-title: Fast data collection in tree-based wireless sensor networks publication-title: IEEE Trans. Mob. Comput. – volume: 15 start-page: 1 year: 2019 end-page: 28 ident: b24 article-title: DISH: Distributed shuffling against selective jamming attack in IEEE 802.15.4e TSCH networks publication-title: ACM Trans. Sensor Netw. – start-page: 419 year: 2003 end-page: 434 ident: b12 article-title: A high-throughput path metric for multi-hop wireless routing publication-title: 9th Annual International Conference on Mobile Computing and Networking – start-page: 28 year: 2007 end-page: 32 ident: b29 article-title: Software-based on-line energy estimation for sensor nodes publication-title: 4th Workshop on Embedded Networked Sensors – start-page: 168 year: 2020 end-page: 175 ident: b22 article-title: Specification-based distributed detection of rank-related attacks in RPL-based resource-constrained real-time wireless networks publication-title: 2020 IEEE Conference on Industrial Cyberphysical Systems (ICPS), Vol. 1 – year: 2019 ident: b13 article-title: Object Security for Constrained RESTful Environments (OSCORE) – year: 2012 ident: b8 article-title: RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks – year: 2014 ident: b9 article-title: The Constrained Application Protocol (CoAP) – start-page: 83 year: 2016 end-page: 90 ident: b25 article-title: Interplay of link quality estimation and RPL performance: An experimental study publication-title: 13th Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks – year: 2021 ident: b1 article-title: An Architecture for IPv6 over the Time-Slotted Channel Hopping Mode of IEEE 802.15.4 (6TiSCH) – start-page: 641 year: 2006 end-page: 648 ident: b27 article-title: Cross-level sensor network simulation with COOJA publication-title: 31st IEEE Conference on Local Computer Networks – start-page: 68 year: 2020 end-page: 77 ident: b5 article-title: Evaluation of feasibility and impact of attacks against the 6top protocol in 6TiSCH networks publication-title: 21st International Symposium on ”a World of Wireless, Mobile and Multimedia Networks” (WoWMoM) – year: 2012 ident: b11 article-title: The Minimum Rank with Hysteresis Objective Function – start-page: 7 year: 2018 end-page: 12 ident: b30 article-title: On predicting the battery lifetime of IoT devices: Experiences from the SPHERE deployments publication-title: 7th International Workshop on Real-World Embedded Wireless Systems and Networks – volume: 13 start-page: 1 year: 2021 end-page: 16 ident: b14 article-title: Evaluating the performance of the OSCORE security protocol in constrained IoT environments publication-title: Internet Things – year: 2020 ident: b10 article-title: IEEE 802.15.4-2020 - IEEE Standard for Low-Rate Wireless Networks – year: 2007 ident: b7 article-title: Transmission of IPv6 Packets over IEEE 802.15.4 Networks – volume: 1 start-page: 1 year: 2020 end-page: 31 ident: b16 article-title: An evaluation of the 6TiSCH distributed resource management mode publication-title: ACM Trans. Internet Things – start-page: 7 year: 2018 ident: 10.1016/j.comcom.2022.07.054_b30 article-title: On predicting the battery lifetime of IoT devices: Experiences from the SPHERE deployments – start-page: 28 year: 2007 ident: 10.1016/j.comcom.2022.07.054_b29 article-title: Software-based on-line energy estimation for sensor nodes – start-page: 1 year: 2017 ident: 10.1016/j.comcom.2022.07.054_b31 article-title: Performance evaluation the 6top protocol and analysis of its interplay with routing – volume: 13 start-page: 1 year: 2021 ident: 10.1016/j.comcom.2022.07.054_b14 article-title: Evaluating the performance of the OSCORE security protocol in constrained IoT environments publication-title: Internet Things doi: 10.1016/j.iot.2020.100333 – volume: 15 start-page: 1 issue: 1 year: 2019 ident: 10.1016/j.comcom.2022.07.054_b24 article-title: DISH: Distributed shuffling against selective jamming attack in IEEE 802.15.4e TSCH networks publication-title: ACM Trans. Sensor Netw. doi: 10.1145/3241052 – year: 2019 ident: 10.1016/j.comcom.2022.07.054_b13 – year: 2018 ident: 10.1016/j.comcom.2022.07.054_b6 – start-page: 68 year: 2020 ident: 10.1016/j.comcom.2022.07.054_b5 article-title: Evaluation of feasibility and impact of attacks against the 6top protocol in 6TiSCH networks – year: 2014 ident: 10.1016/j.comcom.2022.07.054_b9 – start-page: 227 year: 2018 ident: 10.1016/j.comcom.2022.07.054_b19 article-title: Network formation for industrial IoT: Evaluation, limits and recommendations – year: 2020 ident: 10.1016/j.comcom.2022.07.054_b10 – volume: 18 start-page: 98 issue: 1 year: 2019 ident: 10.1016/j.comcom.2022.07.054_b18 article-title: Improving network formation in 6TiSCH networks publication-title: IEEE Trans. Mob. Comput. doi: 10.1109/TMC.2018.2828835 – start-page: 641 year: 2006 ident: 10.1016/j.comcom.2022.07.054_b27 article-title: Cross-level sensor network simulation with COOJA – year: 2012 ident: 10.1016/j.comcom.2022.07.054_b8 – start-page: 168 year: 2020 ident: 10.1016/j.comcom.2022.07.054_b22 article-title: Specification-based distributed detection of rank-related attacks in RPL-based resource-constrained real-time wireless networks – year: 2016 ident: 10.1016/j.comcom.2022.07.054_b26 – year: 2021 ident: 10.1016/j.comcom.2022.07.054_b2 – volume: 1 start-page: 1 issue: 4 year: 2020 ident: 10.1016/j.comcom.2022.07.054_b16 article-title: An evaluation of the 6TiSCH distributed resource management mode publication-title: ACM Trans. Internet Things doi: 10.1145/3395927 – year: 2021 ident: 10.1016/j.comcom.2022.07.054_b1 – volume: 27 start-page: 3927 issue: 6 year: 2021 ident: 10.1016/j.comcom.2022.07.054_b17 article-title: Selfishness in secure internet of things networks: 6TiSCH case study publication-title: Wirel. Netw. doi: 10.1007/s11276-021-02711-1 – start-page: 102 year: 2016 ident: 10.1016/j.comcom.2022.07.054_b23 article-title: Security vulnerabilities and countermeasures for time synchronization in IEEE 802.15.4e networks – start-page: 419 year: 2003 ident: 10.1016/j.comcom.2022.07.054_b12 article-title: A high-throughput path metric for multi-hop wireless routing – start-page: 1 year: 2004 ident: 10.1016/j.comcom.2022.07.054_b4 – start-page: 243 year: 2019 ident: 10.1016/j.comcom.2022.07.054_b20 article-title: Improving link quality estimation accuracy in 6TiSCH networks – start-page: 83 year: 2016 ident: 10.1016/j.comcom.2022.07.054_b25 article-title: Interplay of link quality estimation and RPL performance: An experimental study – volume: 11 start-page: 86 issue: 1 year: 2012 ident: 10.1016/j.comcom.2022.07.054_b28 article-title: Fast data collection in tree-based wireless sensor networks publication-title: IEEE Trans. Mob. Comput. doi: 10.1109/TMC.2011.22 – start-page: 121 year: 2019 ident: 10.1016/j.comcom.2022.07.054_b15 article-title: ALICE: Autonomous link-based cell scheduling for TSCH – year: 2021 ident: 10.1016/j.comcom.2022.07.054_b3 – volume: 26 start-page: 1190 issue: 5 year: 2022 ident: 10.1016/j.comcom.2022.07.054_b21 article-title: Effect of DIS attack on 6TiSCH network formation publication-title: IEEE Commun. Lett. doi: 10.1109/LCOMM.2022.3155992 – year: 2007 ident: 10.1016/j.comcom.2022.07.054_b7 – year: 2012 ident: 10.1016/j.comcom.2022.07.054_b11 |
| SSID | ssj0004773 |
| Score | 2.4059324 |
| Snippet | The 6TiSCH architecture defined by the IETF provides a standard solution for extending the Internet of Things (IoT) paradigm to industrial applications with... |
| SourceID | swepub crossref elsevier |
| SourceType | Open Access Repository Enrichment Source Index Database Publisher |
| StartPage | 411 |
| SubjectTerms | 6P Vulnerabilities 6p vulnerability 6TiSCH Availability Energy utilization Impact analysis Impact mitigation Industrial internet of thing Industrial Internet of Things Internet of things Internet protocols Minimal scheduling function MSF Network architecture Network security Power management (telecommunication) Scheduling algorithms Scheduling functions Security Standard solutions |
| Title | Vulnerabilities of the 6P protocol for the Industrial Internet of Things: Impact analysis and mitigation |
| URI | https://dx.doi.org/10.1016/j.comcom.2022.07.054 https://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-60173 https://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-60318 |
| Volume | 194 |
| WOSCitedRecordID | wos000860367900011&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: ScienceDirect database customDbUrl: eissn: 1873-703X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0004773 issn: 1873-703X databaseCode: AIEXJ dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELag5QAHxFO0PORDr5Gya28cc1uVAkWo2kNZ7c1KHAdSbZNVkkX9-Z2x4yRlhbocuESR13nI8-14MvrmG0JOZrGGbTPSELmFYYC1kkGicxlkeir5BDfI3Fr6u7i4iFcruehyuo1tJyDKMr65kZv_amoYA2Nj6ew_mLu_KQzAORgdjmB2OO5l-OV2jUrSlvRaOElZDC6jBXKx2goM31MLR307XGbQWF6A6-WJuYJzV0OZeOUSzLJfF06Wo7OnVznoukMgR32oOBmI9EgnaR11wPbyMM3AEVpiMt_9dprU66rPJhS403YVRbofnpcJhLSNnf-l2DZmszHj5AV893oanPe3sWABOJ3VHYcs-cilcueMd1y9yzpcoaWQ94N3dzKsfNja7ohofyqWc1XVP1VdKNtb-yE5nIqZBF94OD8_W30b6mmFYyYg9ZVFVoKsf1Fffmk5grvP_mt4M9ahtbHL5TPytPvooHMHlufkgSlfkCcjKcqX5NcfsKFVTgEiNFpQDxsKsLFjA2yohw1Od7D5SB1oqAcNnGR0AM0r8uPz2eXp16DrwhFoPuVtIDKWh5OYZxB7iyxjszQ1XGdJHhtsnZCKPMuTMM4MmxjYMOIcOxawVOYync0MM-w1OSir0rwhFKJ9CA91xFH0KGVCijDRcAWTnJmcx0eE-cVTupOox04pa-W5iFfKLbnCJVehULDkRyTor9o4iZZ75gtvF9WFmS58VACte648cWbsn7OLq4lg-0wD-B3vN-0teTz8c96Rg7bemvfkkf7dFk39oYPuLc6BvGE |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Vulnerabilities+of+the+6P+protocol+for+the+Industrial+Internet+of+Things%3A+Impact+analysis+and+mitigation&rft.jtitle=Computer+communications&rft.au=Righetti%2C+Francesca&rft.au=Vallati%2C+Carlo&rft.au=Tiloca%2C+Marco&rft.au=Anastasi%2C+Giuseppe&rft.date=2022-10-01&rft.issn=1873-703X&rft.volume=194&rft.spage=411&rft_id=info:doi/10.1016%2Fj.comcom.2022.07.054&rft.externalDocID=oai_DiVA_org_ri_60318 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0140-3664&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0140-3664&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0140-3664&client=summon |