Abstract

IPv6 over Low Power Wireless Personal Area Network (6LoWPAN) provides IP connectivity to the highly constrained nodes in the Internet of Things (IoTs). 6LoWPAN allows nodes with limited battery power and storage capacity to carry IPv6 datagrams over the lossy and error-prone radio links offered by the IEEE 802.15.4 standard, thus acting as an adoption layer between the IPv6 protocol and IEEE 802.15.4 network. The data link layer of IEEE 802.15.4 in 6LoWPAN is based on AES (Advanced Encryption Standard), but the 6LoWPAN standard lacks and has omitted the security and privacy requirements at higher layers. The sensor nodes in 6LoWPAN can join the network without requiring the authentication procedure. Therefore, from security perspectives, 6LoWPAN is vulnerable to many attacks such as replay attack, Man-in-the-Middle attack, Impersonation attack, and Modification attack. This paper proposes a secure and efficient cluster-based authentication scheme (CBAS) for highly constrained sensor nodes in 6LoWPAN. In this approach, sensor nodes are organized into a cluster and communicate with the central network through a dedicated sensor node. The main objective of CBAS is to provide efficient and authentic communication among the 6LoWPAN nodes. To ensure the low signaling overhead during the registration, authentication, and handover procedures, we also introduce lightweight and efficient registration, de-registration, initial authentication, and handover procedures, when a sensor node or group of sensor nodes join or leave a cluster. Our security analysis shows that the proposed CBAS approach protects against various security attacks, including Identity Confidentiality attack, Modification attack, Replay attack, Man-in-the-middle attack, and Impersonation attack. Our simulation experiments show that CBAS has reduced the registration delay by 11%, handoff authentication delay by 32%, and signaling cost by 37% compared to the SGMS (Secure Group Mobility Scheme) and LAMS (Light-Wight Authentication & Mobility Scheme).

Highlights

  • The Internet of Things (IoTs) is the new complex network that is connecting billions of smart devices and enabling access to information “anytime” and “anywhere” and using “anything” and “anyone”

  • The Supervisory-Node communicates with the MAG directly on behalf of the sensor nodes in the cluster

  • Our simulation experiments show that cluster-based authentication scheme (CBAS) shows better performance in terms of low signaling cost during the registration and handover procedure compared to the state-of-the-art protocols

Read more

Summary

Introduction

The Internet of Things (IoTs) is the new complex network that is connecting billions of smart devices and enabling access to information “anytime” and “anywhere” and using “anything” and “anyone”. According to [1], the number of IoT devices worldwide are predicted to reach more than 25.4 billion in 2030 This results in limitations for the devices connected via the wireless communication links such as high cost, low battery power, high energy consumption, limited communication distance, limited IP addresses, and weak security [2,3,4]. Based on the IPv6 and IEEE 802.15.4 standard the IETF (Internet Engineering Task Force) has developed a standard called 6LoWPAN (IPv6 over low Power Wireless Personal Area Networks) for highly constrained nodes interconnected via the lossy links. From security perspectives, 6LoWPAN is vulnerable to many attacks such as replay attack, Man-in-the-Middle attack, Impersonation attack, and Modification attack

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call