Abstract

IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) has an ample share in the Internet of Things. Sensor nodes in 6LoWPAN collect vital information from the environment and transmit to a central server through the public Internet. Therefore, it is inevitable to secure communications and allow legitimate sensor nodes to access network resources. This paper presents a lightweight Authentication and Key Exchange (AKE) scheme for 6LoWPAN using an authenticated encryption algorithm and hash function. Upon successful authentication, sensor nodes and the central server can establish the secret key for secure communications. The proposed scheme ensures header verification during the AKE process without using IP security protocol and, thus, has low communication and computational overheads. The logical correctness of the proposed scheme is validated through Burrows–Abadi–Needham logic. Furthermore, automatic security analyses by using AVISPA illustrate that the proposed scheme is resistant to various malicious attacks in 6LoWPANs.

Highlights

  • Low Power Wireless Personal Area Networks (LoWPANs) are an essential part of the Internet of Things (IoT) and are composed of resource-constrained devices tractable with the IEEE 802.15.4 standard

  • The main idea here is to use ASCON to achieve the cumulative functionality of Advanced Encryption Standard (AES) + Message Authentication Code (MAC) by using a single algorithm (i.e., ASCON), which generates its own MAC to be validated at the destination

  • We have found that the implementation of ASCON, in conjunction with SHA-256, in 6LoWPANs is promising to secure communications

Read more

Summary

Introduction

Low Power Wireless Personal Area Networks (LoWPANs) are an essential part of the Internet of Things (IoT) and are composed of resource-constrained devices tractable with the IEEE 802.15.4 standard. LoWPAN is a promising technology [1,2] having potential applications in smart grids, home automation, e-health-care, battlefield, and security surveillance. Such networks are constricted in storage capacity, transmission range, computational capabilities, power resources, and data rate. To make IPv6 frame size tractable with the IEEE 802.15.4 physical layer, the Internet engineering task force has standardized an IPv6 over LoWPAN (6LoWPAN) adaption layer [7].

Related Work
Contribution and Paper Organization
Network Model and Security Assumptions
Hash Function
The Proposed S6AE Scheme
Sensor Registration Phase
Sponge State Generation
Associative Data Generation
Authentication and Key Exchange
Step AKE-1
Step AKE-2
Step AKE-4
Step AKE-5
Step AKE-6
Step AKE-7
Handover Phase
Step HP-1
Step HP-2 n and T each of 32
Step HP-3
Security Analysis
Header Verification
DoS Attack
Replay Attack
Sensor Impersonation Attack
Server Impersonation Attack
Identity Privacy Preservation
Sybil Attack
Crypt-Analysis Using BAN Logic
Formal Verification
Crypt-Analysis Using AVISPA
Performance Evaluation
Security Comparison
Computational Overhead
Communication Overhead and Energy Consumption
Storage Overhead Comparison
Discussion
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call