Cargando…

A secure remote user authentication scheme for 6LoWPAN-based Internet of Things

One of the significant challenges in the Internet of Things (IoT) is the provisioning of guaranteed security and privacy, considering the fact that IoT devices are resource-limited. Oftentimes, in IoT applications, remote users need to obtain real-time data, with guaranteed security and privacy, fro...

Descripción completa

Detalles Bibliográficos
Autores principales: Abbas, Ghulam, Tanveer, Muhammad, Abbas, Ziaul Haq, Waqas, Muhammad, Baker, Thar, Al-Jumeily OBE, Dhiya
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8575280/
https://www.ncbi.nlm.nih.gov/pubmed/34748568
http://dx.doi.org/10.1371/journal.pone.0258279
_version_ 1784595646375788544
author Abbas, Ghulam
Tanveer, Muhammad
Abbas, Ziaul Haq
Waqas, Muhammad
Baker, Thar
Al-Jumeily OBE, Dhiya
author_facet Abbas, Ghulam
Tanveer, Muhammad
Abbas, Ziaul Haq
Waqas, Muhammad
Baker, Thar
Al-Jumeily OBE, Dhiya
author_sort Abbas, Ghulam
collection PubMed
description One of the significant challenges in the Internet of Things (IoT) is the provisioning of guaranteed security and privacy, considering the fact that IoT devices are resource-limited. Oftentimes, in IoT applications, remote users need to obtain real-time data, with guaranteed security and privacy, from resource-limited network nodes through the public Internet. For this purpose, the users need to establish a secure link with the network nodes. Though the IPv6 over low-power wireless personal area networks (6LoWPAN) adaptation layer standard offers IPv6 compatibility for resource-limited wireless networks, the fundamental 6LoWPAN structure ignores security and privacy characteristics. Thus, there is a pressing need to design a resource-efficient authenticated key exchange (AKE) scheme for ensuring secure communication in 6LoWPAN-based resource-limited networks. This paper proposes a resource-efficient secure remote user authentication scheme for 6LoWPAN-based IoT networks, called SRUA-IoT. SRUA-IoT achieves the authentication of remote users and enables the users and network entities to establish private session keys between themselves for indecipherable communication. To this end, SRUA-IoT uses a secure hash algorithm, exclusive-OR operation, and symmetric encryption primitive. We prove through informal security analysis that SRUA-IoT is secured against a variety of malicious attacks. We also prove the security strength of SRUA-IoT through formal security analysis conducted by employing the random oracle model. Additionally, we prove through Scyther-based validation that SRUA-IoT is resilient against various attacks. Likewise, we demonstrate that SRUA-IoT reduces the computational cost of the nodes and communication overheads of the network.
format Online
Article
Text
id pubmed-8575280
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-85752802021-11-09 A secure remote user authentication scheme for 6LoWPAN-based Internet of Things Abbas, Ghulam Tanveer, Muhammad Abbas, Ziaul Haq Waqas, Muhammad Baker, Thar Al-Jumeily OBE, Dhiya PLoS One Research Article One of the significant challenges in the Internet of Things (IoT) is the provisioning of guaranteed security and privacy, considering the fact that IoT devices are resource-limited. Oftentimes, in IoT applications, remote users need to obtain real-time data, with guaranteed security and privacy, from resource-limited network nodes through the public Internet. For this purpose, the users need to establish a secure link with the network nodes. Though the IPv6 over low-power wireless personal area networks (6LoWPAN) adaptation layer standard offers IPv6 compatibility for resource-limited wireless networks, the fundamental 6LoWPAN structure ignores security and privacy characteristics. Thus, there is a pressing need to design a resource-efficient authenticated key exchange (AKE) scheme for ensuring secure communication in 6LoWPAN-based resource-limited networks. This paper proposes a resource-efficient secure remote user authentication scheme for 6LoWPAN-based IoT networks, called SRUA-IoT. SRUA-IoT achieves the authentication of remote users and enables the users and network entities to establish private session keys between themselves for indecipherable communication. To this end, SRUA-IoT uses a secure hash algorithm, exclusive-OR operation, and symmetric encryption primitive. We prove through informal security analysis that SRUA-IoT is secured against a variety of malicious attacks. We also prove the security strength of SRUA-IoT through formal security analysis conducted by employing the random oracle model. Additionally, we prove through Scyther-based validation that SRUA-IoT is resilient against various attacks. Likewise, we demonstrate that SRUA-IoT reduces the computational cost of the nodes and communication overheads of the network. Public Library of Science 2021-11-08 /pmc/articles/PMC8575280/ /pubmed/34748568 http://dx.doi.org/10.1371/journal.pone.0258279 Text en © 2021 Abbas et al https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
spellingShingle Research Article
Abbas, Ghulam
Tanveer, Muhammad
Abbas, Ziaul Haq
Waqas, Muhammad
Baker, Thar
Al-Jumeily OBE, Dhiya
A secure remote user authentication scheme for 6LoWPAN-based Internet of Things
title A secure remote user authentication scheme for 6LoWPAN-based Internet of Things
title_full A secure remote user authentication scheme for 6LoWPAN-based Internet of Things
title_fullStr A secure remote user authentication scheme for 6LoWPAN-based Internet of Things
title_full_unstemmed A secure remote user authentication scheme for 6LoWPAN-based Internet of Things
title_short A secure remote user authentication scheme for 6LoWPAN-based Internet of Things
title_sort secure remote user authentication scheme for 6lowpan-based internet of things
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8575280/
https://www.ncbi.nlm.nih.gov/pubmed/34748568
http://dx.doi.org/10.1371/journal.pone.0258279
work_keys_str_mv AT abbasghulam asecureremoteuserauthenticationschemefor6lowpanbasedinternetofthings
AT tanveermuhammad asecureremoteuserauthenticationschemefor6lowpanbasedinternetofthings
AT abbasziaulhaq asecureremoteuserauthenticationschemefor6lowpanbasedinternetofthings
AT waqasmuhammad asecureremoteuserauthenticationschemefor6lowpanbasedinternetofthings
AT bakerthar asecureremoteuserauthenticationschemefor6lowpanbasedinternetofthings
AT aljumeilyobedhiya asecureremoteuserauthenticationschemefor6lowpanbasedinternetofthings
AT abbasghulam secureremoteuserauthenticationschemefor6lowpanbasedinternetofthings
AT tanveermuhammad secureremoteuserauthenticationschemefor6lowpanbasedinternetofthings
AT abbasziaulhaq secureremoteuserauthenticationschemefor6lowpanbasedinternetofthings
AT waqasmuhammad secureremoteuserauthenticationschemefor6lowpanbasedinternetofthings
AT bakerthar secureremoteuserauthenticationschemefor6lowpanbasedinternetofthings
AT aljumeilyobedhiya secureremoteuserauthenticationschemefor6lowpanbasedinternetofthings