Secure WiFi-Direct Using Key Exchange for IoT Device-to-Device Communications in a Smart Environment

被引:14
作者
Belghazi, Zakariae [1 ]
Benamar, Nabil [2 ]
Addaim, Adnane [1 ]
Kerrache, Chaker Abdelaziz [3 ]
机构
[1] Ibn Tofail Univ, Syst Engn Lab, ENSA Kenitra, ADSI Team, Kenitra 14000, Morocco
[2] Moulay Ismail Univ Meknes, Sch Technol, Meknes 50050, Morocco
[3] Univ Ghardaia, Dept Math & Comp Sci, Ghardaia 47000, Algeria
关键词
Internet of Things; D2D communication; WiFi-Direct; smart environments; man-in-the-middle attack; key exchange; D2D COMMUNICATION; PRIVACY;
D O I
10.3390/fi11120251
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid growth of Internet of Things (IoT) devices around the world, thousands of mobile users share many data with each other daily. IoT communication has been developed in the past few years to ensure direct connection among mobile users. However, wireless vulnerabilities exist that cause security concerns for IoT device-to-device (D2D) communication. This has become a serious debate, especially in smart environments where highly sensitive information is exchanged. In this paper, we study the security requirements in IoT D2D communication. In addition, we propose a novel authentication approach called Secure Key Exchange with QR Code (SeKeQ) to verify user identity by ensuring an automatic key comparison and providing a shared secret key using Diffie-Hellman key agreement with an SHA-256 hash. To evaluate the performance of SeKeQ, we ran a testbed using devices with a WiFi-Direct communication interface. The obtained results depict that our proposal can offer the required security functions including key exchange, data confidentiality, and integrity. In addition, our proposal can reach the same security performances as MANA (Manual Authentication) and UMAC (Universal-Hashing Message Authentication Code) but with 10 times fewer key computations and reduced memory occupancy.
引用
收藏
页数:15
相关论文
共 28 条
[21]  
Lee JS, 2007, IEEE IND ELEC, P46
[22]  
Mokhtarnameh R., 2010, International Journal of Computer Applications, V7, P5
[23]   A Comprehensive Study on the Trust Management Techniques in the Internet of Things [J].
Pourghebleh, Behrouz ;
Wakil, Karzan ;
Navimipour, Nima Jafari .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06) :9326-9337
[24]   Secure Communications and Protected Data for a Internet of Things Smart Toy Platform [J].
Rivera, Diego ;
Garcia, Antonio ;
Luisa Martin-Ruiz, Maria ;
Alarcos, Bernardo ;
Ramon Velasco, Juan ;
Gomez Oliva, Ana .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :3785-3795
[25]  
Shen WL, 2014, IEEE GLOB COMM CONF, P336, DOI 10.1109/GLOCOM.2014.7036830
[26]   A classification of location privacy attacks and approaches [J].
Wernke, Marius ;
Skvortsov, Pavel ;
Duerr, Frank ;
Rothermel, Kurt .
PERSONAL AND UBIQUITOUS COMPUTING, 2014, 18 (01) :163-175
[27]   A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks [J].
Yeh, Lo-Yao ;
Huang, Yu-Lun ;
Joseph, Anthony D. ;
Shieh, Shiuhpyng Winston ;
Tsaur, Woei-Jiunn .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2012, 61 (04) :1907-1924
[28]   SeDS: Secure Data Sharing Strategy for D2D Communication in LTE-Advanced Networks [J].
Zhang, Aiqing ;
Chen, Jianxin ;
Hu, Rose Qingyang ;
Qian, Yi .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (04) :2659-2672