tions and identified globally (e.g. by an IP address).
In the context of the IoT, the global Internet archi-
tecture is starting to encompass sensing devices, and
in consequence 6LBR (6LoWPAN border routers) are
assumed to be always accessible, end-to-end message
security is required and devices are globally identified
by IPv6 addresses (Palattella et al., 2013). Consid-
ering such goals, we consider a set of representative
attacks against devices using CoAP, which we eval-
uate in the context of a framework for application-
layer (CoAP) intrusion detection and reaction. The
article is structured as follows. We begin by dis-
cussing intrusion detection prevention in the IoT in
the next Section, and in Section III we discuss our
framework, together with its main components and
the messaging format employed for security-related
management procedures. In Section IV we focus on
intrusion detection and reaction mechanisms imple-
mented and evaluated later in the article, in Section V.
Finally, in Section VI we conclude our discussion.
2 INTRUSION DETECTION AND
PREVENTION USING CoAP
In classic approaches on intrusion detection and
prevention in the Internet three complementary ap-
proaches are normally considered: signature-based,
anomaly-based and specification-based systems. A
signature or misuse-based IDS first defines patterns of
the known attacks and checks the traffic against such
known attacks. Mechanisms in this class are usually
characterized by low-false alarm rates, although they
need to store large data sets (signatures and also the
data to be analyzed) and are limited in detecting new
attacks. In anomaly-based intrusion detection, normal
network behaviors are first classified, and compared
with monitored operations and communications, in
order to detect anomalous activities. This class of sys-
tems possess the ability to detect new attacks but can
be characterized by a high false-alarm rate. Finally,
specification-based systems are a variant of anomaly-
based systems, and work by specifying normal net-
work operations in detail and monitoring any break-
ing of that specification. Such system decrease the
false detection rate but on the other hand the opera-
tion patterns must be usually created by specialists.
The current trend in IDS research in the context of
the IoT is to combine these before mentioned meth-
ods, in order to jointly benefit from the qualities of
the various approaches. Other useful characteriza-
tion of intrusion detection and prevention is in what
respects the topology of the employed architecture,
which may be either distributed, centralized or hybrid.
In the former, the role of detection and reaction to at-
tacks may be supported by various devices in the net-
work, while in distributed systems one single system
is responsible for such tasks. A hybrid system com-
bines distributed intrusion detection supported by de-
vices in the network with a central manager, usually
responsible for more complex analysis and decisions
operations. In this article, we consider the imple-
mentation of a hybrid intrusion detection and preven-
tion architecture employing signature-based, as well
as DoS detection. Looking at recent (less than five
years) research proposals dealing with intrusion de-
tection and prevention in 6LoWPAN and CoAP envi-
ronments, we find proposals mostly focused on pro-
tecting against attacks on routing using RPL in 6LoW-
PAN environments. A first approach towards IDS in
IoT environments is presented in (Raza et al., 2013),
in the form of SVELTE, a system designed to protect
WSN from attacks against routing operations, in par-
ticular spoofed or altered information, sinkhole and
selective-forwarding. Attacks are detected by main-
taining a dedicated routing information in the 6LBR,
which is constructed from RPL information and also
from information reported by the various sensors, for
the purpose of detecting inconsistencies in the rout-
ing tree. SVELTE is mostly focused on RPL-based
6LoWPAN networks, and this proposal doesnt ad-
dress security against attacks at the network and upper
layers, neither DoS or other types of attacks. In (Le
et al., 2012) the authors focus again on threats against
RPL, and propose a two-layer IDS architecture de-
signed to detect internal attacks on routing operations,
based on three components: an RPL specification-
based monitor, an anomaly-based used in cooperation
with the specification-based to monitor the node per-
formance and a statistical-based component to reveal
the attacker source. Although this work performs a
good job in discussing the applicability of WSN IDS
systems to IoT 6LoWPAN environments, it is mostly
focused on internal attacks against RPL. Also, the de-
scribed system model is also not materialized in the
form of concrete detection and reaction mechanisms.
In (Lee et al., 2014) the authors propose an intrusion
detection method based on evaluating over time the
energy consumption of sensing devices. The authors
classify sensing devices with irregular energy con-
sumptions as malicious attackers, by considering en-
ergy consumption models built for communications
in a 6LoWPAN network, in both the mesh-under and
route-over operation modes of IEEE 802.15.4. From
simulation, the authors state that this strategy may al-
low to detect misbehaving nodes and that such nodes
may thus be excluded from operations in the network.
One limitation of this approach is that IoT applica-
Intrusion Detection and Prevention with Internet-integrated CoAP Sensing Applications
165