| Literature DB >> 27916962 |
Jaeseung Lee1, Yunsick Sung2, Jong Hyuk Park3.
Abstract
The Internet of Things (IoT) is the intelligent technologies and services that mutually communicate information between humans and devices or between Internet-based devices. In IoT environments, various device information is collected from the user for intelligent technologies and services that control the devices. Recently, wireless sensor networks based on IoT environments are being used in sectors as diverse as medicine, the military, and commerce. Specifically, sensor techniques that collect relevant area data via mini-sensors after distributing smart dust in inaccessible areas like forests or military zones have been embraced as the future of information technology. IoT environments that utilize smart dust are composed of the sensor nodes that detect data using wireless sensors and transmit the detected data to middle nodes. Currently, since the sensors used in these environments are composed of mini-hardware, they have limited memory, processing power, and energy, and a variety of research that aims to make the best use of these limited resources is progressing. This paper proposes a method to utilize these resources while considering energy efficiency, and suggests lightweight mutual verification and key exchange methods based on a hash function that has no restrictions on operation quantity, velocity, and storage space. This study verifies the security and energy efficiency of this method through security analysis and function evaluation, comparing with existing approaches. The proposed method has great value in its applicability as a lightweight security technology for IoT environments.Entities:
Keywords: IoT; IoT authentication; lightweight authentication; sensor authentication; sensor network
Year: 2016 PMID: 27916962 PMCID: PMC5191025 DOI: 10.3390/s16122044
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Smart dust utilization.
Figure 2Group key generation and encryption.
Figure 3Group key distribution.
Figure 4Group key update method.
Proposed protocol parameters.
| Notation | Meaning |
|---|---|
| Nonce | |
| Middle Node | |
| Certificate Authority | |
| Node ID | |
| Middle Node ID | |
| 3n Bit Divided Value | |
| Session Key | |
| After distance bounding remaining bits | |
| Random bit | |
| Group Key Polynomial | |
| Group Key Encryption Polynomial | |
| Encrypted Polynomial to | |
| Encryption, Decryption |
Figure 5Initial authentication and device registration process.
Figure 6Group key updating process.
Initial simulation setup table.
| Initial Set Value for Simulation | |
|---|---|
| Number of sensor node | 10~200 |
| Placement area of the sensor | 20 m × 20 m |
| Position of the gateway | |
| Node initial energy | 1.0 |
| ETX, ERX | 25 nanoJ |
| Eamp | 50 picoJ |
| EDC | 5 nanoJ |
| Packet size | 2500 bit |
| Compressibility | 0.05 |
Figure 7Analysis of authentication time—client.
Figure 8Analysis of authentication time—server.