Testbed evaluation of Lightweight Authentication Protocol (LAUP) for 6LoWPAN wireless sensor networks

被引:8
作者
Baskaran, Annie Gilda Roselin Arockia [1 ,2 ]
Nanda, Priyadarsi [1 ]
Nepal, Surya [2 ]
He, Sean [1 ]
机构
[1] Univ Technol Sydney, Sch Elect & Data Engn, Sydney, NSW, Australia
[2] CSIRO, Data61, Marsfield, NSW, Australia
关键词
authentication; session key; 6LoWPAN; SECURITY PROTOCOLS; INTERNET; THINGS; PRIVACY;
D O I
10.1002/cpe.4868
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
6LoWPAN networks involving wireless sensors consist of resource starving miniature sensor nodes. Since secured authentication is one of the important considerations, the use of asymmetric key distribution scheme may not be a perfect choice. Recent research shows that Lucky Thirteen attack has compromised Datagram Transport Layer Security (DTLS) with Cipher Block Chaining (CBC) mode for key establishment. Even though EAKES6Lo and S3 K techniques for key establishment follow the symmetric key establishment method, they strongly rely on a remote server and trust anchor. Our proposed Lightweight Authentication Protocol (LAUP) used a symmetric key method with no preshared keys and comprised of four flights to establish authentication and session key distribution between sensors and Edge Router in a 6LoWPAN environment. Each flight uses freshly derived keys from existing information such as PAN ID (Personal Area Network IDentification) and device identities. We formally verified our scheme using the Scyther security protocol verification tool. We simulated and evaluated the proposed LAUP protocol using COOJA simulator and achieved less computational time and low power consumption compared to existing authentication protocols such as the EAKES6Lo and SAKES. LAUP is evaluated using real-time testbed and achieved less computational time, which is supportive of our simulated results.
引用
收藏
页数:12
相关论文
共 26 条
  • [1] Al Fardan N.J., 2013, 2013 IEEE S SEC PRIV
  • [2] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
    Al-Fuqaha, Ala
    Guizani, Mohsen
    Mohammadi, Mehdi
    Aledhari, Mohammed
    Ayyash, Moussa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
  • [3] [Anonymous], 2013, P INT WORKSH AD SEC
  • [4] Casimier Cremers, 2006, SCYTHER SEMANTICS VE
  • [5] Cremers C, 2005, LECT NOTES COMPUT SC, V3466, P66
  • [6] Self-Healing in Unattended Wireless Sensor Networks
    Di Pietro, Roberto
    Ma, Di
    Soriente, Claudio
    Tsudik, Gene
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2012, 9 (01)
  • [7] Esfahani A., 2017, IEEE INTERNET THINGS
  • [8] Gheorghe L, 2010, 2010 INT C SYST NETW
  • [9] Han S, 2016, INTERNET OF THINGS
  • [10] Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis
    Hennebert, Christine
    Dos Santos, Jessye
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (05): : 384 - 398