Cargando…

An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained Io...

Descripción completa

Detalles Bibliográficos
Autores principales: Kim, Ki-Wook, Han, Youn-Hee, Min, Sung-Gi
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2017
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5676616/
https://www.ncbi.nlm.nih.gov/pubmed/28934152
http://dx.doi.org/10.3390/s17102170
_version_ 1783277088479903744
author Kim, Ki-Wook
Han, Youn-Hee
Min, Sung-Gi
author_facet Kim, Ki-Wook
Han, Youn-Hee
Min, Sung-Gi
author_sort Kim, Ki-Wook
collection PubMed
description Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.
format Online
Article
Text
id pubmed-5676616
institution National Center for Biotechnology Information
language English
publishDate 2017
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-56766162017-11-17 An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks Kim, Ki-Wook Han, Youn-Hee Min, Sung-Gi Sensors (Basel) Article Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism. MDPI 2017-09-21 /pmc/articles/PMC5676616/ /pubmed/28934152 http://dx.doi.org/10.3390/s17102170 Text en © 2017 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Kim, Ki-Wook
Han, Youn-Hee
Min, Sung-Gi
An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks
title An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks
title_full An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks
title_fullStr An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks
title_full_unstemmed An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks
title_short An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks
title_sort authentication and key management mechanism for resource constrained devices in ieee 802.11-based iot access networks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5676616/
https://www.ncbi.nlm.nih.gov/pubmed/28934152
http://dx.doi.org/10.3390/s17102170
work_keys_str_mv AT kimkiwook anauthenticationandkeymanagementmechanismforresourceconstraineddevicesinieee80211basediotaccessnetworks
AT hanyounhee anauthenticationandkeymanagementmechanismforresourceconstraineddevicesinieee80211basediotaccessnetworks
AT minsunggi anauthenticationandkeymanagementmechanismforresourceconstraineddevicesinieee80211basediotaccessnetworks
AT kimkiwook authenticationandkeymanagementmechanismforresourceconstraineddevicesinieee80211basediotaccessnetworks
AT hanyounhee authenticationandkeymanagementmechanismforresourceconstraineddevicesinieee80211basediotaccessnetworks
AT minsunggi authenticationandkeymanagementmechanismforresourceconstraineddevicesinieee80211basediotaccessnetworks