Cargando…
S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme
IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) has an ample share in the Internet of Things. Sensor nodes in 6LoWPAN collect vital information from the environment and transmit to a central server through the public Internet. Therefore, it is inevitable to secure communications and al...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7248872/ https://www.ncbi.nlm.nih.gov/pubmed/32397469 http://dx.doi.org/10.3390/s20092707 |
_version_ | 1783538471434977280 |
---|---|
author | Tanveer, Muhammad Abbas, Ghulam Abbas, Ziaul Haq Waqas, Muhammad Muhammad, Fazal Kim, Sunghwan |
author_facet | Tanveer, Muhammad Abbas, Ghulam Abbas, Ziaul Haq Waqas, Muhammad Muhammad, Fazal Kim, Sunghwan |
author_sort | Tanveer, Muhammad |
collection | PubMed |
description | IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) has an ample share in the Internet of Things. Sensor nodes in 6LoWPAN collect vital information from the environment and transmit to a central server through the public Internet. Therefore, it is inevitable to secure communications and allow legitimate sensor nodes to access network resources. This paper presents a lightweight Authentication and Key Exchange (AKE) scheme for 6LoWPAN using an authenticated encryption algorithm and hash function. Upon successful authentication, sensor nodes and the central server can establish the secret key for secure communications. The proposed scheme ensures header verification during the AKE process without using IP security protocol and, thus, has low communication and computational overheads. The logical correctness of the proposed scheme is validated through Burrows–Abadi–Needham logic. Furthermore, automatic security analyses by using AVISPA illustrate that the proposed scheme is resistant to various malicious attacks in 6LoWPANs. |
format | Online Article Text |
id | pubmed-7248872 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-72488722020-06-10 S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme Tanveer, Muhammad Abbas, Ghulam Abbas, Ziaul Haq Waqas, Muhammad Muhammad, Fazal Kim, Sunghwan Sensors (Basel) Article IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) has an ample share in the Internet of Things. Sensor nodes in 6LoWPAN collect vital information from the environment and transmit to a central server through the public Internet. Therefore, it is inevitable to secure communications and allow legitimate sensor nodes to access network resources. This paper presents a lightweight Authentication and Key Exchange (AKE) scheme for 6LoWPAN using an authenticated encryption algorithm and hash function. Upon successful authentication, sensor nodes and the central server can establish the secret key for secure communications. The proposed scheme ensures header verification during the AKE process without using IP security protocol and, thus, has low communication and computational overheads. The logical correctness of the proposed scheme is validated through Burrows–Abadi–Needham logic. Furthermore, automatic security analyses by using AVISPA illustrate that the proposed scheme is resistant to various malicious attacks in 6LoWPANs. MDPI 2020-05-09 /pmc/articles/PMC7248872/ /pubmed/32397469 http://dx.doi.org/10.3390/s20092707 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Tanveer, Muhammad Abbas, Ghulam Abbas, Ziaul Haq Waqas, Muhammad Muhammad, Fazal Kim, Sunghwan S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme |
title | S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme |
title_full | S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme |
title_fullStr | S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme |
title_full_unstemmed | S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme |
title_short | S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme |
title_sort | s6ae: securing 6lowpan using authenticated encryption scheme |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7248872/ https://www.ncbi.nlm.nih.gov/pubmed/32397469 http://dx.doi.org/10.3390/s20092707 |
work_keys_str_mv | AT tanveermuhammad s6aesecuring6lowpanusingauthenticatedencryptionscheme AT abbasghulam s6aesecuring6lowpanusingauthenticatedencryptionscheme AT abbasziaulhaq s6aesecuring6lowpanusingauthenticatedencryptionscheme AT waqasmuhammad s6aesecuring6lowpanusingauthenticatedencryptionscheme AT muhammadfazal s6aesecuring6lowpanusingauthenticatedencryptionscheme AT kimsunghwan s6aesecuring6lowpanusingauthenticatedencryptionscheme |