Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks

被引:7
作者
Roselin, Annie Gilda [1 ,2 ]
Nanda, Priyadarsi [1 ]
Nepal, Surya [2 ]
机构
[1] Univ Technol Sydney, Fac Engn & IT, Sch Comp & Commun, Sydney, NSW, Australia
[2] CSIRO, Data61, Sydney, NSW, Australia
来源
2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS | 2017年
关键词
SECURITY PROTOCOLS; INTERNET; THINGS; CHALLENGES; PRIVACY;
D O I
10.1109/Trustcom/BigDataSE/ICESS.2017.260
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
6LoWPAN networks involving wireless sensors consist of resource starving miniature sensor nodes. Since secured authentication of these resource -constrained sensors is one of the important considerations during communication, use of asymmetric key distribution scheme may not be the perfect choice to achieve secure authentication. Recent research shows that Lucky Thirteen attack has compromised Datagram Transport Layer Security (DTLS) with Cipher Block Chaining (CBC) mode for key establishment. Even though EAKES6Lo and S3K techniques for key establishment follow the symmetric key establishment method, they strongly rely on a remote server and trust anchor for secure key distribution. Our proposed Lightweight Authentication Protocol (LAUP) used a symmetric key method with no preshared keys and comprised of four flights to establish authentication and session key distribution between sensors and Edge Router in a 6LoWPAN environment. Each flight uses freshly derived keys from existing information such as PAN ID (Personal Area Network IDentification) and device identities. We formally verified our scheme using the Scyther security protocol verification tool for authentication properties such as Aliveness, Secrecy, Non-Injective Agreement and Non-Injective Synchronization. We simulated and evaluated the proposed LAUP protocol using COOJA simulator with ContikiOS and achieved less computational time and low power consumption compared to existing authentication protocols such as the EAKES6Lo and SAKES.
引用
收藏
页码:371 / 378
页数:8
相关论文
共 24 条
[1]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[2]   Lucky Thirteen: Breaking the TLS and DTLS Record Protocols [J].
AlFardan, Nadhem J. ;
Paterson, Kenneth G. .
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, :526-540
[3]  
[Anonymous], 2012, WORKSH SMART OBJ SEC
[4]  
Cremers C.J.F., 2006, Scyther: Semantics and verification of security protocols
[5]   Self-Healing in Unattended Wireless Sensor Networks [J].
Di Pietro, Roberto ;
Ma, Di ;
Soriente, Claudio ;
Tsudik, Gene .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2012, 9 (01)
[6]  
Gheorghe L., 2010, Proceedings of the Fifth International Conference on Systems and Networks Communications (ICSNC 2010), P7, DOI 10.1109/ICSNC.2010.9
[7]   Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis [J].
Hennebert, Christine ;
Dos Santos, Jessye .
IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (05) :384-398
[8]  
Hussen HR, 2013, INT CONF UBIQ FUTUR, P246, DOI 10.1109/ICUFN.2013.6614820
[9]  
Instruments T., 2014, CC2520 DAT 2007
[10]  
Jara A. J., 2011, Proceedings of the 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), P491, DOI 10.1109/IMIS.2011.150