Secure WiFi-Direct Using Key Exchange for IoT Device-to-Device Communications in a Smart Environment

被引:14
作者
Belghazi, Zakariae [1 ]
Benamar, Nabil [2 ]
Addaim, Adnane [1 ]
Kerrache, Chaker Abdelaziz [3 ]
机构
[1] Ibn Tofail Univ, Syst Engn Lab, ENSA Kenitra, ADSI Team, Kenitra 14000, Morocco
[2] Moulay Ismail Univ Meknes, Sch Technol, Meknes 50050, Morocco
[3] Univ Ghardaia, Dept Math & Comp Sci, Ghardaia 47000, Algeria
关键词
Internet of Things; D2D communication; WiFi-Direct; smart environments; man-in-the-middle attack; key exchange; D2D COMMUNICATION; PRIVACY;
D O I
10.3390/fi11120251
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid growth of Internet of Things (IoT) devices around the world, thousands of mobile users share many data with each other daily. IoT communication has been developed in the past few years to ensure direct connection among mobile users. However, wireless vulnerabilities exist that cause security concerns for IoT device-to-device (D2D) communication. This has become a serious debate, especially in smart environments where highly sensitive information is exchanged. In this paper, we study the security requirements in IoT D2D communication. In addition, we propose a novel authentication approach called Secure Key Exchange with QR Code (SeKeQ) to verify user identity by ensuring an automatic key comparison and providing a shared secret key using Diffie-Hellman key agreement with an SHA-256 hash. To evaluate the performance of SeKeQ, we ran a testbed using devices with a WiFi-Direct communication interface. The obtained results depict that our proposal can offer the required security functions including key exchange, data confidentiality, and integrity. In addition, our proposal can reach the same security performances as MANA (Manual Authentication) and UMAC (Universal-Hashing Message Authentication Code) but with 10 times fewer key computations and reduced memory occupancy.
引用
收藏
页数:15
相关论文
共 28 条
[1]  
[Anonymous], COMMUNICATIONS
[2]  
[Anonymous], 2017, ICT EXPRESS
[3]  
[Anonymous], HACKING REPORT WRITI
[4]  
[Anonymous], HMAC KEYEDHASHING ME
[5]   Context-Aware Configuration and Management of WiFi Direct Groups for Real Opportunistic Networks [J].
Arnaboldi, Valerio ;
Campana, Mattia G. ;
Delmastro, Franca .
2017 IEEE 14TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2017, :266-274
[6]  
Asadi A, 2013, IFIP WIREL DAY
[7]  
Bala K, 2015, International Journal of Computer Applications, V121, P975, DOI [10.5120/21504-4351, DOI 10.5120/21504-4351]
[8]   Towards a trusted unmanned aerial system using blockchain for the protection of critical infrastructure [J].
Barka, Ezedin ;
Kerrache, Chaker Abdelaziz ;
Benkraouda, Hadjer ;
Shuaib, Khaled ;
Ahmad, Farhan ;
Kurugollu, Fatih .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (08)
[9]   Privacy protection in pervasive systems: State of the art and technical challenges [J].
Bettini, Claudio ;
Riboni, Daniele .
PERVASIVE AND MOBILE COMPUTING, 2015, 17 :159-174
[10]  
Black J., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P216, DOI 10.1007/3-540-48405-1_14