Abstract
An Internet of Things (IoT) network is a worldwide network connecting billions of devices with each other over the Internet. IPv6 Low power Wireless Personal Area Network (6LoWPAN) is an enabling technology for a complete end-to-end IoTs architecture. A 6LoWPAN contains small devices that communicate with other small devices or other powerful devices over the Internet. Communication privacy is a feature that allows the communicating users to make sure that there is no other entity that is spying on them. As such, it is a very important feature for the success of IoT applications. While traditionally privacy has been dealt with by hiding the content of the data content exchanged between the communicating pairs through the use of encryption, it has been shown that this cannot be sufficient in many application scenarios. It has been shown that metadata information such as the ones included in packet headers for the sake of the operation of communication protocols, such as IP addresses, reveal information such as the identities of the communicating pairs, which in some applications is considered critical information.
While there are many surveys in the literature dealing with communication privacy in the IoT, to our knowledge, little has been done on communication-flow identifiers privacy preservation in 6LoWPAN-based IoT networks. In this survey, we thoroughly expose the prime focus of the existing solutions on communication identifiers privacy in 6LoWPANs, clarifying the important information about: at which layer solutions operate, based on which protocol, against which attack, for which application, based on simulations or real prototypes, which sensitive information or communication identifiers are protected, which Privacy-Preserving Technique (PPT) is used, and how long is the duration of the protection against privacy attacks. We provide a comprehensive coverage on all of these aspects focusing on the main design guidelines that drove existing solutions while showing their merits and shortcomings.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Atlam, H.F., Wills, G.B.: IoT security, privacy, safety and ethics. In: Farsi, M., Daneshkhah, A., Hosseinian-Far, A., Jahankhani, H. (eds.) Digital Twin Technologies and Smart Cities, pp. 123–149. Springer, Cham (2020)
Brilli, L., Pecorella, T., Pierucci, L., Fantacci, R.: A novel 6LoWPAN-ND extension to enhance privacy in IEEE 802.15.4 networks. In: 2016 IEEE Global Communications Conference (GLOBECOM), pp. 1–6. IEEE (2016)
Bugeja, J., Jacobsson, A., Davidsson, P.: On privacy and security challenges in smart connected homes. In: 2016 European Intelligence and Security Informatics Conference (EISIC), pp. 172–175. IEEE (2016)
Conti, M., Dehghantanha, A., Franke, K., Watson, S.: Internet of Things security and forensics: challenges and opportunities (2018)
Da Xu, L., He, W., Li, S.: Internet of Things in industries: a survey. IEEE Trans. Ind. Inform. 10(4), 2233–2243 (2014)
Dos Santos, J., Hennebert, C., Fonbonne, J., Lauradoux, C.: Ephemeral: lightweight pseudonyms for 6LoWPAN MAC addresses. In: IEEE PIMRC (2016)
Dunlop, M., Groat, S., Urbanski, W., Marchany, R., Tront, J.: MT6D: a moving target IPv6 defense. In: MILCOM 2011 - 2011 Military Communications Conference, pp. 1321–1326. IEEE (2011)
Tails Foundation: Tails-Privacy for anyone anywhere (2019). https://tails.boum.org/index.en.html. Accessed Nov 2019
Haus, M., Waqas, M., Ding, A.Y., Li, Y., Tarkoma, S., Ott, J.: Security and privacy in Device-to-Device (D2D) communication: a review. IEEE Commun. Surv. Tutor. 19(2), 1054–1079 (2017)
Hennebert, C., Dos Santos, J.: Security protocols and privacy issues into 6LoWPAN stack: a synthesis. IEEE Internet Things J. 1(5), 384–398 (2014)
Hennebert, C., Santos, J.D.: Security protocols and privacy issues into 6LoWPAN stack: a synthesis. IEEE Internet Things J. 1(5), 384–398 (2014). https://doi.org/10.1109/JIOT.2014.2359538
Hiller, J., Pennekamp, J., Dahlmanns, M., Henze, M., Panchenko, A., Wehrle, K.: Tailoring onion routing to the Internet of Things: security and privacy in untrusted environments. In: 2019 IEEE 27th International Conference on Network Protocols (ICNP), pp. 1–12. IEEE (2019)
Hoang, N.P., Pishva, D.: A TOR-based anonymous communication approach to secure smart home appliances. In: 2015 17th International Conference on Advanced Communication Technology (ICACT), pp. 517–525. IEEE (2015)
Hossain, M., Islam, S.R., Ali, F., Kwak, K.S., Hasan, R.: An Internet of Things-based health prescription assistant and its security system design. Future Gener. Comput. Syst. 82, 422–439 (2018)
Kouachi, A.I., Sahraoui, S., Bachir, A.: Per packet flow anonymization in 6LoWPAN IoT networks. In: 2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 1–7. IEEE (2018)
Kusek, M.: Internet of Things: today and tomorrow. In: 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 0335–0338. IEEE (2018)
Kwak, B.O., Chung, T.S.: Trust domain based trustworthy networking. In: 2017 International Conference on Information and Communication Technology Convergence (ICTC), pp. 1247–1259. IEEE (2017)
Lee, T., Pappas, C., Szalachowski, P., Perrig, A.: Communication based on per-packet one-time addresses. In: 2016 IEEE 24th International Conference on Network Protocols (ICNP), pp. 1–10. IEEE (2016)
Loukil, F., Ghedira-Guegan, C., Benharkat, A.N., Boukadi, K., Maamar, Z.: Privacy-aware in the IoT applications: a systematic literature review. In: OTM Confederated International Conferences “On the Move to Meaningful Internet Systems”, pp. 552–569. Springer (2017)
Malandrino, D., Petta, A., Scarano, V., Serra, L., Spinelli, R., Krishnamurthy, B.: Privacy awareness about information leakage: Who knows what about me? In: Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society. pp. 279–284 (2013)
Mavani, M., Asawa, K.: Privacy enabled disjoint and dynamic address auto-configuration protocol for 6LoWPAN. Ad Hoc Netw. 79, 72–86 (2018)
Mavani, M., Asawa, K.: Resilient against spoofing in 6LoWPAN networks by temporary-private IPv6 addresses. Peer-to-Peer Netw. Appl. 13, 333–347 (2019)
Narten, T., Simpson, W.A., Nordmark, E., Soliman, H.: Neighbor discovery for IPversion 6 (IPv6). RFC 4861 (2007)
Protskaya, Y.: Security in the Internet of Things. Ph.D. thesis, Università degli Studi di Parma. Dipartimento di Ingegneria e architettura (2020)
Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE J. Sel. Areas Commun. 16(4), 482–494 (1998)
Selvaraj, S., Sundaravaradhan, S.: Challenges and opportunities in IoT healthcare systems: a systematic review. SN Appl. Sci. 2(1), 139 (2020)
Sen, A.A.A., Eassa, F.A., Jambi, K., Yamin, M.: Preserving privacy in Internet of Things: a survey. Int. J. Inf. Technol. 10(2), 189–200 (2018)
Sha, K., Wei, W., Yang, T.A., Wang, Z., Shi, W.: On security challenges and open issues in Internet of Things. Future Gener. Comput. Syst. 83, 326–337 (2018)
Shelby, Z., Bormann, C.: 6LoWPAN. Wiley, Chichester (2009). https://doi.org/10.1002/9780470686218, https://doi.org/10.1002/9780470686218
Snader, R., Kravets, R., Harris III, A.F.: CryptoCoP: lightweight, energy-efficient encryption and privacy for wearable devices. In: Proceedings of the 2016 Workshop on Wearable Systems and Applications, pp. 7–12. ACM (2016)
Staudemeyer, R.C., Pöhls, H.C., Wójcik, M.: The road to privacy in IoT: beyond encryption and signatures, towards unobservable communication. In: 2018 IEEE 19th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), pp. 14–20. IEEE (2018)
Tamò-Larrieux, A.: Technical tools and designs for data protection. In: Tamò-Larrieux, A. (ed.) Designing for Privacy and Its Legal Framework, pp. 101–148. Springer, Cham (2018)
Anonymizer Team: IP Rotation for Commercial Enterprises (2020). https://www.anonymizer.com/. Accessed Apr 2020
Statista Team: Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions) (2020). https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/. Accessed Apr 2020
Tourangeau, R.: Confidentiality, privacy, and anonymity. In: Vannette, D., Krosnick, J. (eds.) The Palgrave Handbook of Survey Research, pp. 501–507. Springer, Cham (2018)
Wang, S., Du, Y., Lu, T., Wu, J., Wang, T.: A survey of anonymous communication methods in Internet of Things. In: 2019 IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC), pp. 627–633. IEEE (2019)
Wang, X., Mu, Y.: Addressing and privacy support for 6LoWPAN. IEEE Sens. J. 15(9), 5193–5201 (2015)
Wang, X., Mu, Y.: Communication security and privacy support in 6LoWPAN. J. Inf. Secur. Appl. 34, 108–119 (2017)
Yang, Q., Lu, R., Challal, Y., Laurent, M.: Security and privacy in emerging wireless networks. Secu. Commun. Netw. 2017 (2017)
Yang, Y., Wu, L., Yin, G., Li, L., Zhao, H.: A survey on security and privacy issues in Internet-of-Things. IEEE Internet Things J. 4(5), 1250–1258 (2017)
Zeitz, K., Cantrell, M., Marchany, R., Tront, J.: Changing the game: a micro moving target IPv6 defense for the Internet of Things. IEEE Wirel. Commun. Lett. 7(4), 578–581 (2018)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Kouachi, A.I., Bachir, A. (2021). Communication-Flow Privacy-Preservation in 6LoWPANs-Based IoT Networks. In: Chikhi, S., Amine, A., Chaoui, A., Saidouni, D., Kholladi, M. (eds) Modelling and Implementation of Complex Systems. MISC 2020. Lecture Notes in Networks and Systems, vol 156. Springer, Cham. https://doi.org/10.1007/978-3-030-58861-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-58861-8_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-58860-1
Online ISBN: 978-3-030-58861-8
eBook Packages: EngineeringEngineering (R0)