A lightweight authentication scheme for 6LoWPAN-based Internet-of -things

被引:2
|
作者
Thungon, Leki Chom [1 ,4 ]
Sahana, Subhas Chandra [2 ]
Hussain, Iftekhar [3 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Chennai Campus, Chennai, Tamil Nadu, India
[2] Natl Inst Technol Durgapur, Dept Comp Sci & Engn, Durgapur, West Bengal, India
[3] North Eastern Hill Univ, Dept Informat Technol, Shillong, India
[4] Vellore Inst Technol, Sch Comp Sci & Engn, Chennai Campus, Chennai 600127, Tamil Nadu, India
来源
INFORMATION SECURITY JOURNAL | 2024年 / 33卷 / 04期
关键词
6LoWPAN; authentication; AVISPA; security; XOR; USER AUTHENTICATION; SECURE;
D O I
10.1080/19393555.2024.2332962
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IPv6-based IoT networks, i.e. 6LoWPAN network, require authentication for security. The existing authentication schemes on symmetric-key based approaches for 6LoWPAN consume huge computational and processing overhead in the literature. In a large network, pre-deployment of the key leads to huge memory consumption due to storing many keys. Furthermore, in asymmetric key cryptography, operations with the public key are computationally expensive, which is unsuitable for resource-constrained devices. We proposed a lightweight key exchange and authentication scheme for 6LoWPAN to mutually authenticate the sensor nodes, the gateway, and the server with less computational overhead and without compromising any security credentials. The authentication scheme helps to generate a session key without storing any secrets in the 6LoWPAN devices. We utilized a one-way hash function and XOR operation to reduce overhead in multi-hop communication. The AVISPA verification tool and the formal verification show that the proposed method is resistant to well-known attacks. The proposed scheme outperforms relevant methods in computational overhead, communication cost, and computation time.
引用
收藏
页码:443 / 453
页数:11
相关论文
共 50 条
  • [31] A 6LoWPAN-Based Foundation for AAL-Applications
    Felsche, Matthias
    Schulz, Lars
    Schuster, Andrea
    Schwetlick, Horst
    AMBIENT ASSISTED LIVING, 2011, 6693 : 131 - 136
  • [32] A Lightweight Authentication Scheme for E-health applications in the context of Internet of Things
    Khemissa, Hamza
    Tandjaoui, Djamel
    2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 90 - 95
  • [33] A Lightweight Combined Physical Layer Encryption and Authentication Scheme for Industrial Internet of Things
    Wang, Junjie
    Han, Gangtao
    Li, Shuangzhi
    Zhou, Fasheng
    Wang, Ning
    IEEE ACCESS, 2024, 12 : 6961 - 6970
  • [34] An efficient lightweight authentication scheme for human-centered industrial Internet of Things
    Singh, Jaya
    Gimekar, Ashish
    Venkatesan, Subramanian
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2023, 36 (12)
  • [35] SLAK: secure lightweight scheme for authentication and key-agreement in internet of things
    Nahnah, Oussama
    Cherbal, Sarra
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (02)
  • [36] Enhanced lightweight and secure certificateless authentication scheme (ELWSCAS) for Internet of Things environment
    Ali, Usman
    Bin Idris, Mohd Yamani Idna
    Frnda, Jaroslav
    Bin Ayub, Mohamad Nizam
    Khan, Muhammad Asghar
    Khan, Nauman
    Beegum, T. Rehannara
    Jasim, Ahmed A.
    Ullah, Insaf
    Babar, Mohammad
    INTERNET OF THINGS, 2023, 24
  • [37] Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things
    Wang, Chenyu
    Wang, Ding
    Duan, Yihe
    Tao, Xiaofeng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2961 - 2976
  • [38] Blockchain-Based Secure and Lightweight Authentication for Internet of Things
    Yang, Xu
    Yang, Xuechao
    Yi, Xun
    Khalil, Ibrahim
    Zhou, Xiaotong
    He, Debiao
    Huang, Xinyi
    Nepal, Surya
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05) : 3321 - 3332
  • [39] Identity-Based Authentication Scheme for the Internet of Things
    Salman, Ola
    Abdallah, Sarah
    Elhajj, Imad H.
    Chehab, Ali
    Kayssi, Ayman
    2016 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2016, : 1109 - 1111
  • [40] Directed Path Based Authentication Scheme for the Internet of Things
    Ning, Huansheng
    Liu, Hong
    Liu, Qing
    Ji, Genlin
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2012, 18 (09) : 1112 - 1131