LAKE-6SH: Lightweight User Authenticated Key Exchange for 6LoWPAN-Based Smart Homes

被引:43
作者
Tanveer, Muhammad [1 ]
Abbas, Ghulam [2 ]
Abbas, Ziaul Haq [3 ]
Bilal, Muhammad [4 ]
Mukherjee, Amrit [5 ]
Kwak, Kyung Sup [6 ]
机构
[1] GIK Inst Engn Sci & Technol, Telecommun & Networking Res Ctr, Topi 23640, Pakistan
[2] GIK Inst Engn Sci & Technol, Fac Comp Sci & Engn, Topi 23640, Pakistan
[3] GIK Inst Engn Sci & Technol, Fac Elect Engn, Topi 23640, Pakistan
[4] Hankuk Univ Foreign Studies, Dept Comp Engn, Yongin 17035, South Korea
[5] Anhui Univ, Informat Mat & Intelligent Sensing Lab, Hefei 212013, Peoples R China
[6] Inha Univ, Informat & Commun Engn, Incheon 22212, South Korea
基金
新加坡国家研究基金会;
关键词
Access control; authentication; internet of Things (IoT); privacy; security; ESTABLISHMENT SCHEME; AGREEMENT SCHEME; PROVABLY SECURE; INTERNET; THINGS; PROTOCOL; ENVIRONMENT; NETWORKS; DESIGN;
D O I
10.1109/JIOT.2021.3085595
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ensuring security and privacy in the Internet of Things (IoT) while taking into account the resource-constrained nature of IoT devices is challenging. In smart home (SH) IoT applications, remote users (RUs) need to communicate securely with resource-constrained network entities through the public Internet to procure real-time information. While the 6LoWPAN adaptation-layer standard provides resource-efficient IPv6 compatibility to low-power wireless networks, the basic 6LoWPAN design does not include security and privacy features. A resource-efficient authenticated key exchange (AKE) scheme becomes imperative for 6LoWPAN-based resource-constrained networks to render indecipherable communication functionality. This article presents a lightweight user AKE scheme for 6LoWPAN-based SH networks (LAKE-6SH) to achieve authenticity of RUs and establish private session keys between the users and network entities by employing the SHA-256 hash function, exclusive-OR operation, and a simple authenticated encryption primitive. Informal security validation illustrates that LAKE-6SH is protected against different pernicious security attacks. The security is further validated formally through the random oracle model. Moreover, through Scyther validation, it is demonstrated that LAKE-6SH is secure. In addition, it is demonstrated that LAKE-6SH renders better security features aside from its low communication and computational overheads.
引用
收藏
页码:2578 / 2591
页数:14
相关论文
共 39 条
[1]   General classification of the authenticated encryption schemes for the CAESAR competition [J].
Abed, Farzaneh ;
Forler, Christian ;
Lucks, Stefan .
COMPUTER SCIENCE REVIEW, 2016, 22 :13-26
[2]   Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles [J].
Ali, Zeeshan ;
Chaudhry, Shehzad Ashraf ;
Ramzan, Muhammad Sher ;
Al-Turjman, Fadi .
IEEE ACCESS, 2020, 8 :43711-43724
[3]   A robust and anonymous patient monitoring system using wireless medical sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Kumar, Neeraj .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 :483-495
[4]   Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Leng, Lu ;
Kumar, Neeraj .
COMPUTER NETWORKS, 2016, 101 :42-62
[5]  
[Anonymous], 2020, ASCON REFRENCE CODE
[6]   A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment [J].
Banerjee, Soumya ;
Odelu, Vanga ;
Das, Ashok Kumar ;
Srinivas, Jangirala ;
Kumar, Neeraj ;
Chattopadhyay, Samiran ;
Choo, Kim-Kwang Raymond .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8739-8752
[7]   Secure WiFi-Direct Using Key Exchange for IoT Device-to-Device Communications in a Smart Environment [J].
Belghazi, Zakariae ;
Benamar, Nabil ;
Addaim, Adnane ;
Kerrache, Chaker Abdelaziz .
FUTURE INTERNET, 2019, 11 (12)
[8]   An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks [J].
Challa, Sravani ;
Das, Ashok Kumar ;
Odelu, Vanga ;
Kumar, Neeraj ;
Kumari, Saru ;
Khan, Muhammad Khurram ;
Vasilakos, Athanasios V. .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 69 :534-554
[9]   Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications [J].
Challa, Sravani ;
Wazid, Mohammad ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Reddy, Alavalapati Goutham ;
Yoon, Eun-Jun ;
Yoo, Kee-Young .
IEEE ACCESS, 2017, 5 :3028-3043
[10]   A Lightweight Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: LightPriAuth [J].
Chen, Yuwen ;
Lopez, Lourdes ;
Martinez, Jose-Fernan ;
Castillejo, Pedro .
JOURNAL OF SENSORS, 2018, 2018