An Authentication and Key Establishment Scheme to Enhance Security for M2M in 6LoWPANs

被引:0
|
作者
Qiu, Yue [1 ]
Ma, Maode [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore, Singapore
关键词
6LoWPAN; Authentication; M2M; PCL;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of wireless communication technologies, machine-to-machine (M2M) communications, which is an essential part of the Internet of Things (IoT), allows wireless and wired systems to monitor environments without human intervention. To extend the use of M2M applications, the standard of Internet Protocol version 6 (IPv6) over Low power Wireless Personal Area Networks (6LoWPAN), developed by The Internet Engineering Task Force (IETF), would be applied into M2M communication to enable IP-based M2M sensing devices to connect to the open Internet. Although the 6LoWPAN standard has specified important issues in the communication, security functionalities at different protocol layers have not been detailed. In this paper, we propose an enhanced authentication and key establishment scheme for 6LoWPAN networks in M2M communications. The security proof by the Protocol Composition Logic (PCL) and the formal verification by the Simple Promela Interpreter (SPIN) show that the proposed scheme in 6LoWPAN could enhance the security functionality with the ability to prevent malicious attacks such as replay attacks, man-in-the-middle attacks, impersonation attacks, Sybil attacks, and etc.
引用
收藏
页码:2671 / 2676
页数:6
相关论文
共 50 条
  • [1] A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks
    Qiu, Yue
    Ma, Maode
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (06) : 2074 - 2085
  • [2] An Efficient Secure Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN in Unattended Scenarios
    Gao, Lijun
    Zhang, Lu
    Feng, Lin
    Ma, Maode
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 115 (02) : 1603 - 1621
  • [3] An Efficient Secure Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN in Unattended Scenarios
    Lijun Gao
    Lu Zhang
    Lin Feng
    Maode Ma
    [J]. Wireless Personal Communications, 2020, 115 : 1603 - 1621
  • [4] The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment
    Hu, Liang
    Chi, Ling
    Li, Hong-tu
    Yuan, Wei
    Sun, Yuyu
    Chu, Jian-feng
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (01): : 131 - 146
  • [5] A Chaos-based Authentication and Key Management Scheme for M2M Communication
    Boubakri, Wided
    Abdallah, Walid
    Boudriga, Noureddine
    [J]. 2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 366 - 371
  • [6] Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks
    Coruh, Ugur
    Bayat, Oguz
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [7] SAKES: Secure Authentication and Key Establishment Scheme for M2M Communication in the IP-Based Wireless Sensor Network (6LoWPAN)
    Hussen, Hassen Redwan
    Tizazu, Gebere Akele
    Ting, Miao
    Lee, Taekkyeun
    Choi, Youngjun
    Kim, Ki-Hyung
    [J]. 2013 FIFTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2013, : 246 - 251
  • [8] Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security
    Doh, Inshil
    Chae, Kijoon
    Lim, Jiyoung
    Chung, Min Young
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2015, 21 (04): : 543 - 558
  • [9] A Dynamic-Encryption Authentication Scheme for M2M Security in Cyber-Physical Systems
    Chen, Shuo
    Ma, Maode
    [J]. 2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 2897 - 2901
  • [10] An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems
    Chen, Shuo
    Ma, Maode
    Luo, Zhenxing
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (10) : 1146 - 1157