Cargando…
A secure remote user authentication scheme for 6LoWPAN-based Internet of Things
One of the significant challenges in the Internet of Things (IoT) is the provisioning of guaranteed security and privacy, considering the fact that IoT devices are resource-limited. Oftentimes, in IoT applications, remote users need to obtain real-time data, with guaranteed security and privacy, fro...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8575280/ https://www.ncbi.nlm.nih.gov/pubmed/34748568 http://dx.doi.org/10.1371/journal.pone.0258279 |
_version_ | 1784595646375788544 |
---|---|
author | Abbas, Ghulam Tanveer, Muhammad Abbas, Ziaul Haq Waqas, Muhammad Baker, Thar Al-Jumeily OBE, Dhiya |
author_facet | Abbas, Ghulam Tanveer, Muhammad Abbas, Ziaul Haq Waqas, Muhammad Baker, Thar Al-Jumeily OBE, Dhiya |
author_sort | Abbas, Ghulam |
collection | PubMed |
description | One of the significant challenges in the Internet of Things (IoT) is the provisioning of guaranteed security and privacy, considering the fact that IoT devices are resource-limited. Oftentimes, in IoT applications, remote users need to obtain real-time data, with guaranteed security and privacy, from resource-limited network nodes through the public Internet. For this purpose, the users need to establish a secure link with the network nodes. Though the IPv6 over low-power wireless personal area networks (6LoWPAN) adaptation layer standard offers IPv6 compatibility for resource-limited wireless networks, the fundamental 6LoWPAN structure ignores security and privacy characteristics. Thus, there is a pressing need to design a resource-efficient authenticated key exchange (AKE) scheme for ensuring secure communication in 6LoWPAN-based resource-limited networks. This paper proposes a resource-efficient secure remote user authentication scheme for 6LoWPAN-based IoT networks, called SRUA-IoT. SRUA-IoT achieves the authentication of remote users and enables the users and network entities to establish private session keys between themselves for indecipherable communication. To this end, SRUA-IoT uses a secure hash algorithm, exclusive-OR operation, and symmetric encryption primitive. We prove through informal security analysis that SRUA-IoT is secured against a variety of malicious attacks. We also prove the security strength of SRUA-IoT through formal security analysis conducted by employing the random oracle model. Additionally, we prove through Scyther-based validation that SRUA-IoT is resilient against various attacks. Likewise, we demonstrate that SRUA-IoT reduces the computational cost of the nodes and communication overheads of the network. |
format | Online Article Text |
id | pubmed-8575280 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | Public Library of Science |
record_format | MEDLINE/PubMed |
spelling | pubmed-85752802021-11-09 A secure remote user authentication scheme for 6LoWPAN-based Internet of Things Abbas, Ghulam Tanveer, Muhammad Abbas, Ziaul Haq Waqas, Muhammad Baker, Thar Al-Jumeily OBE, Dhiya PLoS One Research Article One of the significant challenges in the Internet of Things (IoT) is the provisioning of guaranteed security and privacy, considering the fact that IoT devices are resource-limited. Oftentimes, in IoT applications, remote users need to obtain real-time data, with guaranteed security and privacy, from resource-limited network nodes through the public Internet. For this purpose, the users need to establish a secure link with the network nodes. Though the IPv6 over low-power wireless personal area networks (6LoWPAN) adaptation layer standard offers IPv6 compatibility for resource-limited wireless networks, the fundamental 6LoWPAN structure ignores security and privacy characteristics. Thus, there is a pressing need to design a resource-efficient authenticated key exchange (AKE) scheme for ensuring secure communication in 6LoWPAN-based resource-limited networks. This paper proposes a resource-efficient secure remote user authentication scheme for 6LoWPAN-based IoT networks, called SRUA-IoT. SRUA-IoT achieves the authentication of remote users and enables the users and network entities to establish private session keys between themselves for indecipherable communication. To this end, SRUA-IoT uses a secure hash algorithm, exclusive-OR operation, and symmetric encryption primitive. We prove through informal security analysis that SRUA-IoT is secured against a variety of malicious attacks. We also prove the security strength of SRUA-IoT through formal security analysis conducted by employing the random oracle model. Additionally, we prove through Scyther-based validation that SRUA-IoT is resilient against various attacks. Likewise, we demonstrate that SRUA-IoT reduces the computational cost of the nodes and communication overheads of the network. Public Library of Science 2021-11-08 /pmc/articles/PMC8575280/ /pubmed/34748568 http://dx.doi.org/10.1371/journal.pone.0258279 Text en © 2021 Abbas et al https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. |
spellingShingle | Research Article Abbas, Ghulam Tanveer, Muhammad Abbas, Ziaul Haq Waqas, Muhammad Baker, Thar Al-Jumeily OBE, Dhiya A secure remote user authentication scheme for 6LoWPAN-based Internet of Things |
title | A secure remote user authentication scheme for 6LoWPAN-based Internet of Things |
title_full | A secure remote user authentication scheme for 6LoWPAN-based Internet of Things |
title_fullStr | A secure remote user authentication scheme for 6LoWPAN-based Internet of Things |
title_full_unstemmed | A secure remote user authentication scheme for 6LoWPAN-based Internet of Things |
title_short | A secure remote user authentication scheme for 6LoWPAN-based Internet of Things |
title_sort | secure remote user authentication scheme for 6lowpan-based internet of things |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8575280/ https://www.ncbi.nlm.nih.gov/pubmed/34748568 http://dx.doi.org/10.1371/journal.pone.0258279 |
work_keys_str_mv | AT abbasghulam asecureremoteuserauthenticationschemefor6lowpanbasedinternetofthings AT tanveermuhammad asecureremoteuserauthenticationschemefor6lowpanbasedinternetofthings AT abbasziaulhaq asecureremoteuserauthenticationschemefor6lowpanbasedinternetofthings AT waqasmuhammad asecureremoteuserauthenticationschemefor6lowpanbasedinternetofthings AT bakerthar asecureremoteuserauthenticationschemefor6lowpanbasedinternetofthings AT aljumeilyobedhiya asecureremoteuserauthenticationschemefor6lowpanbasedinternetofthings AT abbasghulam secureremoteuserauthenticationschemefor6lowpanbasedinternetofthings AT tanveermuhammad secureremoteuserauthenticationschemefor6lowpanbasedinternetofthings AT abbasziaulhaq secureremoteuserauthenticationschemefor6lowpanbasedinternetofthings AT waqasmuhammad secureremoteuserauthenticationschemefor6lowpanbasedinternetofthings AT bakerthar secureremoteuserauthenticationschemefor6lowpanbasedinternetofthings AT aljumeilyobedhiya secureremoteuserauthenticationschemefor6lowpanbasedinternetofthings |