LAKE-6SH: Lightweight User Authenticated Key Exchange for 6LoWPAN-Based Smart Homes

被引:40
|
作者
Tanveer, Muhammad [1 ]
Abbas, Ghulam [2 ]
Abbas, Ziaul Haq [3 ]
Bilal, Muhammad [4 ]
Mukherjee, Amrit [5 ]
Kwak, Kyung Sup [6 ]
机构
[1] GIK Inst Engn Sci & Technol, Telecommun & Networking Res Ctr, Topi 23640, Pakistan
[2] GIK Inst Engn Sci & Technol, Fac Comp Sci & Engn, Topi 23640, Pakistan
[3] GIK Inst Engn Sci & Technol, Fac Elect Engn, Topi 23640, Pakistan
[4] Hankuk Univ Foreign Studies, Dept Comp Engn, Yongin 17035, South Korea
[5] Anhui Univ, Informat Mat & Intelligent Sensing Lab, Hefei 212013, Peoples R China
[6] Inha Univ, Informat & Commun Engn, Incheon 22212, South Korea
基金
新加坡国家研究基金会;
关键词
Access control; authentication; internet of Things (IoT); privacy; security; ESTABLISHMENT SCHEME; AGREEMENT SCHEME; PROVABLY SECURE; INTERNET; THINGS; PROTOCOL; ENVIRONMENT; NETWORKS; DESIGN;
D O I
10.1109/JIOT.2021.3085595
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ensuring security and privacy in the Internet of Things (IoT) while taking into account the resource-constrained nature of IoT devices is challenging. In smart home (SH) IoT applications, remote users (RUs) need to communicate securely with resource-constrained network entities through the public Internet to procure real-time information. While the 6LoWPAN adaptation-layer standard provides resource-efficient IPv6 compatibility to low-power wireless networks, the basic 6LoWPAN design does not include security and privacy features. A resource-efficient authenticated key exchange (AKE) scheme becomes imperative for 6LoWPAN-based resource-constrained networks to render indecipherable communication functionality. This article presents a lightweight user AKE scheme for 6LoWPAN-based SH networks (LAKE-6SH) to achieve authenticity of RUs and establish private session keys between the users and network entities by employing the SHA-256 hash function, exclusive-OR operation, and a simple authenticated encryption primitive. Informal security validation illustrates that LAKE-6SH is protected against different pernicious security attacks. The security is further validated formally through the random oracle model. Moreover, through Scyther validation, it is demonstrated that LAKE-6SH is secure. In addition, it is demonstrated that LAKE-6SH renders better security features aside from its low communication and computational overheads.
引用
收藏
页码:2578 / 2591
页数:14
相关论文
共 9 条
  • [1] A lightweight authentication scheme for 6LoWPAN-based Internet-of -things
    Thungon, Leki Chom
    Sahana, Subhas Chandra
    Hussain, Iftekhar
    INFORMATION SECURITY JOURNAL, 2024, 33 (04): : 443 - 453
  • [2] A lightweight certificate-based authentication scheme for 6LoWPAN-based internet of things
    Thungon, Leki Chom
    Sahana, Subhas Chandra
    Hussain, Md. Iftekhar
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (11): : 12523 - 12548
  • [3] A lightweight certificate-based authentication scheme for 6LoWPAN-based internet of things
    Leki Chom Thungon
    Subhas Chandra Sahana
    Md. Iftekhar Hussain
    The Journal of Supercomputing, 2023, 79 : 12523 - 12548
  • [4] A secure remote user authentication scheme for 6LoWPAN-based Internet of Things
    Abbas, Ghulam
    Tanveer, Muhammad
    Abbas, Ziaul Haq
    Waqas, Muhammad
    Baker, Thar
    Obe, Dhiya Al-Jumeily
    PLOS ONE, 2021, 16 (11):
  • [5] Design and Implementation of a 6LoWPAN-Based Lightweight Wireless Embedded Internet Platform for IoT Applications
    Xu, Sendren Sheng-Dong
    Pancev, I. Gede Darco
    Baihaqi, Muhammad Yeza
    JOURNAL OF INTERNET TECHNOLOGY, 2023, 24 (02): : 323 - 332
  • [6] LAKE-BSG: Lightweight authenticated key exchange scheme for blockchain-enabled smart
    Badshah, Akhtar
    Waqas, Muhammad
    Abbas, Ghulam
    Muhammad, Fazal
    Abbas, Ziaul Haq
    Vimal, S.
    Bilal, Muhammad
    SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS, 2022, 52
  • [7] SKIA-SH: A Symmetric Key-Based Improved Lightweight Authentication Scheme for Smart Homes
    Alzahrani, Bander A.
    Barnawi, Ahmed
    Albarakati, Abdullah
    Irshad, Azeem
    Khan, Muhammad Asghar
    Chaudhry, Shehzad Ashraf
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [8] Designing an Enhanced User Authenticated Key Management Scheme for 6G-Based Industrial Applications
    Darman, Ijaz
    Mahmood, Musaria Karim
    Chaudhry, Shehzad Ashraf
    Khan, Sajjad Ahmad
    Lim, Huhnkuk
    IEEE ACCESS, 2022, 10 : 92774 - 92787
  • [9] A lightweight authentication and key exchange mechanism for IPv6 over low-power wireless personal area networks-based Internet of things
    Chom Thungon, Leki
    Ahmed, Nurzaman
    Chandra Sahana, Subhas
    Hussain, Md. Iftekhar
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (05)