Abstract

Secure communication in Low power and Lossy Network (LLN) requires the authentication of the identities of nodes for that node to join the network. Since LLN may consist of many different nodes, where some nodes may contain sensitive and subtle information such as military data, monitoring data, or health data, that node needs to be authenticated before it can deliver any data packet. Even though LLN uses an Internet connection, current authentication for Internet protocols cannot be adopted directly into LLN due to LLN’s limited resources. LLN relies on the authentication provided by Routing Protocol for LLN (RPL), which is based on symmetric cryptography. Nevertheless, RPL reserves a mode for future work in terms of public cryptography. In this study, we propose an authentication protocol for LLN that utilizes Elliptic Curve Cryptography (ECC) called as TPAL.

Highlights

  • Nowadays, we live in an environment surrounded by electronic devices

  • We suggest that the key disclosure and key graph construction be guided by the routing protocol which in this case is Routing Protocol for LLN (RPL)

  • Two-Phase Authentication Level (TPAL) will enhance the security mode option provided in RPL especially the Authenticated Mode (AM) which makes our protocol suitable to be deployed in the future to support the emerging technologies of IoT

Read more

Summary

Introduction

We live in an environment surrounded by electronic devices. These devices may be owned by us or other people. LLN’s connections are often portrayed as having high data loss, low data rate, and usually unstable delivery rate These characteristics of LLNs which quite different than the network that using an unlimited power source, making security, much challenging to be managed (Delgado-Mohatar et al, 2011). Asymmetric cryptography has the feasibility to be adopted into Wireless Sensor Network (WSN) as proven by numerous researchers (Guicheng and Zhen 2013; Noack, 2014; Santoso and Vun, 2015; Jiang et al, 2016; Li et al, 2017) Their studies showed that this type of cryptography has a remarkable authentication reliability, which can avert security threat such as the Man-In-TheMiddle attack. RFC6550 for Routing Protocol for LLN (RPL) mentions that the authentication mode must not be based on symmetric cryptography but does not state on how asymmetric cryptography can be utilized here (Brandt et al, 2012).

Related Works
Validate credentials
Analysis and Discussion
SUMMARY SAFE
Conclusion
Funding Information

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.