Skip to main content

Communication-Flow Privacy-Preservation in 6LoWPANs-Based IoT Networks

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 156))

Abstract

An Internet of Things (IoT) network is a worldwide network connecting billions of devices with each other over the Internet. IPv6 Low power Wireless Personal Area Network (6LoWPAN) is an enabling technology for a complete end-to-end IoTs architecture. A 6LoWPAN contains small devices that communicate with other small devices or other powerful devices over the Internet. Communication privacy is a feature that allows the communicating users to make sure that there is no other entity that is spying on them. As such, it is a very important feature for the success of IoT applications. While traditionally privacy has been dealt with by hiding the content of the data content exchanged between the communicating pairs through the use of encryption, it has been shown that this cannot be sufficient in many application scenarios. It has been shown that metadata information such as the ones included in packet headers for the sake of the operation of communication protocols, such as IP addresses, reveal information such as the identities of the communicating pairs, which in some applications is considered critical information.

While there are many surveys in the literature dealing with communication privacy in the IoT, to our knowledge, little has been done on communication-flow identifiers privacy preservation in 6LoWPAN-based IoT networks. In this survey, we thoroughly expose the prime focus of the existing solutions on communication identifiers privacy in 6LoWPANs, clarifying the important information about: at which layer solutions operate, based on which protocol, against which attack, for which application, based on simulations or real prototypes, which sensitive information or communication identifiers are protected, which Privacy-Preserving Technique (PPT) is used, and how long is the duration of the protection against privacy attacks. We provide a comprehensive coverage on all of these aspects focusing on the main design guidelines that drove existing solutions while showing their merits and shortcomings.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Atlam, H.F., Wills, G.B.: IoT security, privacy, safety and ethics. In: Farsi, M., Daneshkhah, A., Hosseinian-Far, A., Jahankhani, H. (eds.) Digital Twin Technologies and Smart Cities, pp. 123–149. Springer, Cham (2020)

    Chapter  Google Scholar 

  2. Brilli, L., Pecorella, T., Pierucci, L., Fantacci, R.: A novel 6LoWPAN-ND extension to enhance privacy in IEEE 802.15.4 networks. In: 2016 IEEE Global Communications Conference (GLOBECOM), pp. 1–6. IEEE (2016)

    Google Scholar 

  3. Bugeja, J., Jacobsson, A., Davidsson, P.: On privacy and security challenges in smart connected homes. In: 2016 European Intelligence and Security Informatics Conference (EISIC), pp. 172–175. IEEE (2016)

    Google Scholar 

  4. Conti, M., Dehghantanha, A., Franke, K., Watson, S.: Internet of Things security and forensics: challenges and opportunities (2018)

    Google Scholar 

  5. Da Xu, L., He, W., Li, S.: Internet of Things in industries: a survey. IEEE Trans. Ind. Inform. 10(4), 2233–2243 (2014)

    Article  Google Scholar 

  6. Dos Santos, J., Hennebert, C., Fonbonne, J., Lauradoux, C.: Ephemeral: lightweight pseudonyms for 6LoWPAN MAC addresses. In: IEEE PIMRC (2016)

    Google Scholar 

  7. Dunlop, M., Groat, S., Urbanski, W., Marchany, R., Tront, J.: MT6D: a moving target IPv6 defense. In: MILCOM 2011 - 2011 Military Communications Conference, pp. 1321–1326. IEEE (2011)

    Google Scholar 

  8. Tails Foundation: Tails-Privacy for anyone anywhere (2019). https://tails.boum.org/index.en.html. Accessed Nov 2019

  9. Haus, M., Waqas, M., Ding, A.Y., Li, Y., Tarkoma, S., Ott, J.: Security and privacy in Device-to-Device (D2D) communication: a review. IEEE Commun. Surv. Tutor. 19(2), 1054–1079 (2017)

    Article  Google Scholar 

  10. Hennebert, C., Dos Santos, J.: Security protocols and privacy issues into 6LoWPAN stack: a synthesis. IEEE Internet Things J. 1(5), 384–398 (2014)

    Article  Google Scholar 

  11. Hennebert, C., Santos, J.D.: Security protocols and privacy issues into 6LoWPAN stack: a synthesis. IEEE Internet Things J. 1(5), 384–398 (2014). https://doi.org/10.1109/JIOT.2014.2359538

    Article  Google Scholar 

  12. Hiller, J., Pennekamp, J., Dahlmanns, M., Henze, M., Panchenko, A., Wehrle, K.: Tailoring onion routing to the Internet of Things: security and privacy in untrusted environments. In: 2019 IEEE 27th International Conference on Network Protocols (ICNP), pp. 1–12. IEEE (2019)

    Google Scholar 

  13. Hoang, N.P., Pishva, D.: A TOR-based anonymous communication approach to secure smart home appliances. In: 2015 17th International Conference on Advanced Communication Technology (ICACT), pp. 517–525. IEEE (2015)

    Google Scholar 

  14. Hossain, M., Islam, S.R., Ali, F., Kwak, K.S., Hasan, R.: An Internet of Things-based health prescription assistant and its security system design. Future Gener. Comput. Syst. 82, 422–439 (2018)

    Article  Google Scholar 

  15. Kouachi, A.I., Sahraoui, S., Bachir, A.: Per packet flow anonymization in 6LoWPAN IoT networks. In: 2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 1–7. IEEE (2018)

    Google Scholar 

  16. Kusek, M.: Internet of Things: today and tomorrow. In: 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 0335–0338. IEEE (2018)

    Google Scholar 

  17. Kwak, B.O., Chung, T.S.: Trust domain based trustworthy networking. In: 2017 International Conference on Information and Communication Technology Convergence (ICTC), pp. 1247–1259. IEEE (2017)

    Google Scholar 

  18. Lee, T., Pappas, C., Szalachowski, P., Perrig, A.: Communication based on per-packet one-time addresses. In: 2016 IEEE 24th International Conference on Network Protocols (ICNP), pp. 1–10. IEEE (2016)

    Google Scholar 

  19. Loukil, F., Ghedira-Guegan, C., Benharkat, A.N., Boukadi, K., Maamar, Z.: Privacy-aware in the IoT applications: a systematic literature review. In: OTM Confederated International Conferences “On the Move to Meaningful Internet Systems”, pp. 552–569. Springer (2017)

    Google Scholar 

  20. Malandrino, D., Petta, A., Scarano, V., Serra, L., Spinelli, R., Krishnamurthy, B.: Privacy awareness about information leakage: Who knows what about me? In: Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society. pp. 279–284 (2013)

    Google Scholar 

  21. Mavani, M., Asawa, K.: Privacy enabled disjoint and dynamic address auto-configuration protocol for 6LoWPAN. Ad Hoc Netw. 79, 72–86 (2018)

    Article  Google Scholar 

  22. Mavani, M., Asawa, K.: Resilient against spoofing in 6LoWPAN networks by temporary-private IPv6 addresses. Peer-to-Peer Netw. Appl. 13, 333–347 (2019)

    Article  Google Scholar 

  23. Narten, T., Simpson, W.A., Nordmark, E., Soliman, H.: Neighbor discovery for IPversion 6 (IPv6). RFC 4861 (2007)

    Google Scholar 

  24. Protskaya, Y.: Security in the Internet of Things. Ph.D. thesis, Università degli Studi di Parma. Dipartimento di Ingegneria e architettura (2020)

    Google Scholar 

  25. Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE J. Sel. Areas Commun. 16(4), 482–494 (1998)

    Article  Google Scholar 

  26. Selvaraj, S., Sundaravaradhan, S.: Challenges and opportunities in IoT healthcare systems: a systematic review. SN Appl. Sci. 2(1), 139 (2020)

    Article  Google Scholar 

  27. Sen, A.A.A., Eassa, F.A., Jambi, K., Yamin, M.: Preserving privacy in Internet of Things: a survey. Int. J. Inf. Technol. 10(2), 189–200 (2018)

    Google Scholar 

  28. Sha, K., Wei, W., Yang, T.A., Wang, Z., Shi, W.: On security challenges and open issues in Internet of Things. Future Gener. Comput. Syst. 83, 326–337 (2018)

    Article  Google Scholar 

  29. Shelby, Z., Bormann, C.: 6LoWPAN. Wiley, Chichester (2009). https://doi.org/10.1002/9780470686218, https://doi.org/10.1002/9780470686218

  30. Snader, R., Kravets, R., Harris III, A.F.: CryptoCoP: lightweight, energy-efficient encryption and privacy for wearable devices. In: Proceedings of the 2016 Workshop on Wearable Systems and Applications, pp. 7–12. ACM (2016)

    Google Scholar 

  31. Staudemeyer, R.C., Pöhls, H.C., Wójcik, M.: The road to privacy in IoT: beyond encryption and signatures, towards unobservable communication. In: 2018 IEEE 19th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), pp. 14–20. IEEE (2018)

    Google Scholar 

  32. Tamò-Larrieux, A.: Technical tools and designs for data protection. In: Tamò-Larrieux, A. (ed.) Designing for Privacy and Its Legal Framework, pp. 101–148. Springer, Cham (2018)

    Chapter  Google Scholar 

  33. Anonymizer Team: IP Rotation for Commercial Enterprises (2020). https://www.anonymizer.com/. Accessed Apr 2020

  34. Statista Team: Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions) (2020). https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/. Accessed Apr 2020

  35. Tourangeau, R.: Confidentiality, privacy, and anonymity. In: Vannette, D., Krosnick, J. (eds.) The Palgrave Handbook of Survey Research, pp. 501–507. Springer, Cham (2018)

    Chapter  Google Scholar 

  36. Wang, S., Du, Y., Lu, T., Wu, J., Wang, T.: A survey of anonymous communication methods in Internet of Things. In: 2019 IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC), pp. 627–633. IEEE (2019)

    Google Scholar 

  37. Wang, X., Mu, Y.: Addressing and privacy support for 6LoWPAN. IEEE Sens. J. 15(9), 5193–5201 (2015)

    Article  Google Scholar 

  38. Wang, X., Mu, Y.: Communication security and privacy support in 6LoWPAN. J. Inf. Secur. Appl. 34, 108–119 (2017)

    Google Scholar 

  39. Yang, Q., Lu, R., Challal, Y., Laurent, M.: Security and privacy in emerging wireless networks. Secu. Commun. Netw. 2017 (2017)

    Google Scholar 

  40. Yang, Y., Wu, L., Yin, G., Li, L., Zhao, H.: A survey on security and privacy issues in Internet-of-Things. IEEE Internet Things J. 4(5), 1250–1258 (2017)

    Article  Google Scholar 

  41. Zeitz, K., Cantrell, M., Marchany, R., Tront, J.: Changing the game: a micro moving target IPv6 defense for the Internet of Things. IEEE Wirel. Commun. Lett. 7(4), 578–581 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Asma Iman Kouachi or Abdelmalik Bachir .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kouachi, A.I., Bachir, A. (2021). Communication-Flow Privacy-Preservation in 6LoWPANs-Based IoT Networks. In: Chikhi, S., Amine, A., Chaoui, A., Saidouni, D., Kholladi, M. (eds) Modelling and Implementation of Complex Systems. MISC 2020. Lecture Notes in Networks and Systems, vol 156. Springer, Cham. https://doi.org/10.1007/978-3-030-58861-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-58861-8_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-58860-1

  • Online ISBN: 978-3-030-58861-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics