Abstract

Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

Highlights

  • The rapid growth of the Internet of Things (IoT) is facilitating the investigation of various wireless communication technologies for small devices with low cost air interfaces

  • Where TPreamble&Header is the duration of the PHY preamble and header transmission, NLTF is the number of long training symbols, Tsym is the duration of a symbol, NES is the number of encoders, K is the number of aggregated frames, L f rame is the length of the sending frame, Ldeli is size of the delimiter between aggregated frames, and NDBPS represents the number of data bits per symbol in the channel bandwidth (CBW) and the modulation and coding scheme (MCS) used for the transmission

  • The proposed AKM mechanism establishes an security association (SA) between a resource-constrained IoT device and an access point (AP) of an accessing network. It minimizes the number of cryptographic processes required on the

Read more

Summary

Introduction

The rapid growth of the Internet of Things (IoT) is facilitating the investigation of various wireless communication technologies for small devices with low cost air interfaces. The access network domain and the IoT service domains do not trust each other They need to confirm the service authority and establish a secure communication channel through an authentication and key management (AKM) mechanism. We propose a new AKM mechanism for an IoT access network to establish a security association (SA) between a resource-constrained IoT device and an AP. The proposed mechanism is based on the IEEE 802.11 key management with the 802.1X authentication mechanism It introduces a station-side authentication server (SAS). The IoT devices delegate most of the burden of authentication and key derivation to the SAS and only need to verify mutual authenticity with the AP by using basic encryption and decryption functions that devices already possess for data security.

IoT Authentication Architecture
Proposed Authentication and Key Management Procedure
Phase A
Phase B
Phase C
Phase D
Security Evaluation
Mutual Authentication and Secure Key Agreement
Protection from Eavesdropping
Protection from Replay Attacks
Protection from Man-in-Middle Attacks
Minimizing the Impact of a Compromised Device
Resistance of SAS to DDoS Attack
Related Work
Performance Analysis of the Proposed Mechanism
Comparison of Computation Costs
Comparison of Network Costs
Memory Consumption of STA
Findings
Conclusions and Future Work
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call