{"title":"在基于tsch的工业物联网网络中保护小区调度功能","authors":"Karnish N.A. Tapadar, Manas Khatua, Tamarapalli Venkatesh","doi":"10.1016/j.adhoc.2025.103864","DOIUrl":null,"url":null,"abstract":"<div><div>6TiSCH is a widely adopted low-power networking standard for Industrial IoT applications that provides highly reliable communication with low latency. Cell scheduling is one of the crucial components in 6TiSCH networks, as it determines packet transmission schedules based on time and channel allocation policy. The IETF published the Minimal Scheduling Function (MSF) and associated 6top (6P) protocol to manage cell schedules dynamically. However, security of the 6TiSCH architecture, particularly the vulnerabilities within the MSF and its associated 6P, has not been fully explored in the literature. This paper identifies vulnerabilities present in the MSF and 6P protocol, and demonstrates the feasibility of two different types of attack called <em>cell depletion attack</em> and <em>schedule instability attack</em>. In both attacks, the main objective of adversary is to consume scheduling resources and make the schedule unstable by performing unnecessary and incorrect 6P transactions. These attacks disrupt the communication schedule of victim nodes as well as victims’ successors, thus causing schedule instability, reduced reliability and increased energy consumption. The Minimal Security Framework standardized by IETF cannot handle such attacks on the MSF. Therefore, this paper proposes a comprehensive strategy (SCSF-WELA) that combines rule-based approach and Weak Estimation Learning Automata (WELA) to detect and prevent malicious behaviour by an attacker. The proposed solution integrates into the standard MSF without additional communication overhead. Through extensive simulations using the 6TiSCH simulator, we verify that the impact of these attacks is significant as they can increase schedule instability by four times and the 6P messaging overhead by 42% in a 60-node network. Furthermore, the proposed <em>SCSF-WELA</em> contermeasure shows substantial improvements in network stability, energy efficiency, and overall performance under those attacks.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"175 ","pages":"Article 103864"},"PeriodicalIF":4.4000,"publicationDate":"2025-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Securing cell scheduling function in TSCH-based industrial IoT networks\",\"authors\":\"Karnish N.A. Tapadar, Manas Khatua, Tamarapalli Venkatesh\",\"doi\":\"10.1016/j.adhoc.2025.103864\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>6TiSCH is a widely adopted low-power networking standard for Industrial IoT applications that provides highly reliable communication with low latency. Cell scheduling is one of the crucial components in 6TiSCH networks, as it determines packet transmission schedules based on time and channel allocation policy. The IETF published the Minimal Scheduling Function (MSF) and associated 6top (6P) protocol to manage cell schedules dynamically. However, security of the 6TiSCH architecture, particularly the vulnerabilities within the MSF and its associated 6P, has not been fully explored in the literature. This paper identifies vulnerabilities present in the MSF and 6P protocol, and demonstrates the feasibility of two different types of attack called <em>cell depletion attack</em> and <em>schedule instability attack</em>. In both attacks, the main objective of adversary is to consume scheduling resources and make the schedule unstable by performing unnecessary and incorrect 6P transactions. These attacks disrupt the communication schedule of victim nodes as well as victims’ successors, thus causing schedule instability, reduced reliability and increased energy consumption. The Minimal Security Framework standardized by IETF cannot handle such attacks on the MSF. Therefore, this paper proposes a comprehensive strategy (SCSF-WELA) that combines rule-based approach and Weak Estimation Learning Automata (WELA) to detect and prevent malicious behaviour by an attacker. The proposed solution integrates into the standard MSF without additional communication overhead. Through extensive simulations using the 6TiSCH simulator, we verify that the impact of these attacks is significant as they can increase schedule instability by four times and the 6P messaging overhead by 42% in a 60-node network. Furthermore, the proposed <em>SCSF-WELA</em> contermeasure shows substantial improvements in network stability, energy efficiency, and overall performance under those attacks.</div></div>\",\"PeriodicalId\":55555,\"journal\":{\"name\":\"Ad Hoc Networks\",\"volume\":\"175 \",\"pages\":\"Article 103864\"},\"PeriodicalIF\":4.4000,\"publicationDate\":\"2025-04-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Ad Hoc Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S157087052500112X\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ad Hoc Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S157087052500112X","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Securing cell scheduling function in TSCH-based industrial IoT networks
6TiSCH is a widely adopted low-power networking standard for Industrial IoT applications that provides highly reliable communication with low latency. Cell scheduling is one of the crucial components in 6TiSCH networks, as it determines packet transmission schedules based on time and channel allocation policy. The IETF published the Minimal Scheduling Function (MSF) and associated 6top (6P) protocol to manage cell schedules dynamically. However, security of the 6TiSCH architecture, particularly the vulnerabilities within the MSF and its associated 6P, has not been fully explored in the literature. This paper identifies vulnerabilities present in the MSF and 6P protocol, and demonstrates the feasibility of two different types of attack called cell depletion attack and schedule instability attack. In both attacks, the main objective of adversary is to consume scheduling resources and make the schedule unstable by performing unnecessary and incorrect 6P transactions. These attacks disrupt the communication schedule of victim nodes as well as victims’ successors, thus causing schedule instability, reduced reliability and increased energy consumption. The Minimal Security Framework standardized by IETF cannot handle such attacks on the MSF. Therefore, this paper proposes a comprehensive strategy (SCSF-WELA) that combines rule-based approach and Weak Estimation Learning Automata (WELA) to detect and prevent malicious behaviour by an attacker. The proposed solution integrates into the standard MSF without additional communication overhead. Through extensive simulations using the 6TiSCH simulator, we verify that the impact of these attacks is significant as they can increase schedule instability by four times and the 6P messaging overhead by 42% in a 60-node network. Furthermore, the proposed SCSF-WELA contermeasure shows substantial improvements in network stability, energy efficiency, and overall performance under those attacks.
期刊介绍:
The Ad Hoc Networks is an international and archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in ad hoc and sensor networking areas. The Ad Hoc Networks considers original, high quality and unpublished contributions addressing all aspects of ad hoc and sensor networks. Specific areas of interest include, but are not limited to:
Mobile and Wireless Ad Hoc Networks
Sensor Networks
Wireless Local and Personal Area Networks
Home Networks
Ad Hoc Networks of Autonomous Intelligent Systems
Novel Architectures for Ad Hoc and Sensor Networks
Self-organizing Network Architectures and Protocols
Transport Layer Protocols
Routing protocols (unicast, multicast, geocast, etc.)
Media Access Control Techniques
Error Control Schemes
Power-Aware, Low-Power and Energy-Efficient Designs
Synchronization and Scheduling Issues
Mobility Management
Mobility-Tolerant Communication Protocols
Location Tracking and Location-based Services
Resource and Information Management
Security and Fault-Tolerance Issues
Hardware and Software Platforms, Systems, and Testbeds
Experimental and Prototype Results
Quality-of-Service Issues
Cross-Layer Interactions
Scalability Issues
Performance Analysis and Simulation of Protocols.