logo SBA

ETD

Archivio digitale delle tesi discusse presso l’Università di Pisa

Tesi etd-01222020-120934


Tipo di tesi
Tesi di laurea magistrale
Autore
CARIGNANI, GIOELE
URN
etd-01222020-120934
Titolo
Evaluation of feasibility and impact of security attacks against network schedules in 6TiSCH networks
Dipartimento
INGEGNERIA DELL'INFORMAZIONE
Corso di studi
COMPUTER ENGINEERING
Relatori
relatore Prof. Anastasi, Giuseppe
relatore Ing. Vallati, Carlo
relatore Ing. Tiloca, Marco
relatore Ing. Righetti, Francesca
Parole chiave
  • 6TiSCH
  • 6top
  • IEEE 802.15.4
  • Industrial Internet of Things
  • Security
Data inizio appello
21/02/2020
Consultabilità
Non consultabile
Data di rilascio
21/02/2090
Riassunto
Novel wireless technologies are enabling the adoption of wireless solutions for the industrial environment, moving toward the Industrial Internet of Things (IIoT) paradigm. Industrial applications such as industrial control and remote supervision systems, composed by sensors, actuators and field devices, have stringent requirements in terms of communication reliability, security and timeliness. In order to fulfill this requirements and foster the integration of industrial applications into the IPv6 infrastructure, the IETF IPv6 over the TSCH mode of IEEE802.15.4 (6TiSCH) Working Group is currently defining the 6TiSCH architecture to enable industrial-grade IPv6 networks. Although many different aspects of the architecture have been investigated in literature, i.e., communication resource management, routing strategies definition, an in-depth analysis of the security features included in its design is still missing. In this thesis the security vulnerabilities of the 6top protocol (6P), defined in the 6TiSCH Operation Sublayer for the negotiation of communication resources, are assessed. Firstly, two possible attacks that can impair network performance are defined. Then both of them are implemented on the Contiki-NG Operating System to test their feasibility and asses their impact on a simple deployment with three Zolertia RE-Mote sensor nodes. Finally, since the preliminary analysis showed that both attacks can significantly reduce network performance, a set of simulations using Cooja were carried out, in order to assess the impact of the attacks on larger networks. The results show that both attacks reduce reliability in the overall network and increase energy consumption of the network nodes.
File