| Literature DB >> 28934152 |
Ki-Wook Kim1, Youn-Hee Han2, Sung-Gi Min3.
Abstract
Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.Entities:
Keywords: IEEE 802.11ah; Internet of Things (IoT); access network security; authentication and key management (AKM); resource constrained device
Year: 2017 PMID: 28934152 PMCID: PMC5676616 DOI: 10.3390/s17102170
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1IEEE 802.11ah Network Model.
Figure 2Sequence Diagram of the New Node Attachment in IEEE 802.11 with IEEE 802.1X.
Notations for the Figure 2.
| Symbol | Definitions |
|---|---|
| RSNE | Robust Security Network Element defined at IEEE 802.11 |
| MSK | Master Session Key established via IEEE 802.1X |
| PMK | Pairwise Master Key derived from MSK |
| KDF | Key Derivation Function |
| PTK | Session keys shared between a STA and an AP |
| P | Pairwise key exchange (pairwise bit set) |
| ANonce | Nonce value generated by the AP |
| SNonce | Nonce value generated by the STA |
| MIC | Message Integrity Code |
Figure 3IoT Authentication Architecture.
Figure 4Sequence Diagram of the Proposed Protocol.
Notations for the Figure 4.
| Symbol | Definitions |
|---|---|
| IDE | IoT Domain Element |
| NID | Network Identity Set TLV defined at IEEE 802.1X |
| STA-ID | MAC address of the station |
| AP-ID | MAC address of the AP |
| SAS-ID | An identifier of a SAS |
| PMKID | PMK Identifier defined at IEEE 802.11 |
| PSK | Pre-shared key between a STA and the SAS to which the STA belongs |
| PTK_SAS | Session keys shared between an AP and a SAS |
| {PTK}_PSK | A PTK encrypted by the PSK |
| APNonce | Nonce value generated by the AP |
| SASNonce | Nonce value generated by the SAS |
| AUTH | MIC of the EAPOL-Start message |
| ⟶ | Message sent via unsecured channel |
| ⟹ | Message sent via secured channel |
Computation cost of STA in IEEE 802.11 with IEEE 802.1X AKM.
| Cryptographic Process | Algorithm | Input Size (Byte) | CPU Cycle | |
|---|---|---|---|---|
| EAP-TLS | Authentication | RSA 1024 | 128 | 108.8 M |
| Key exchange | RSA 1024 | 48 | 2.4 M | |
| KDF | PMK→PTK | HMAC-SHA1x4 | 72 | 2800.4 |
| PMKID | HMAC-SHA1 | 34 | 1073.2 | |
| 4-way HSK | Key data | AES key wrap | 64 | 522.8 |
| 64 | 522.8 | |||
| 64 | 522.8 | |||
| MIC | HMAC-SHA1 | 143 | 1713.6 | |
| 143 | 1713.6 | |||
| 99 | 1528.8 | |||
Computation cost of STA in the proposed AKM.
| Cryptographic Process | Algorithm | Input Size (Byte) | CPU Cycle |
|---|---|---|---|
| AUTH (Msg D4) | AES-CMAC | 194 | 1102.6 |
| Key data protection | AES-CTR | 130 | 1021 |
| MIC (Msg D3∼D5) | AES-CMAC | 229 | 1221.6 |
Parameter assumption of IEEE 802.11ah message transfer delay calculation.
| Parameters | Values | Note |
|---|---|---|
| 160 | At CBW 1 MHz | |
| 264 | At CBW 1 MHz | |
| 0 | Idle medium | |
| 1.7 | 500 m distance | |
| 560 | At CBW 1 MHz | |
| 1 | At single spatial stream | |
| 40 | At normal guard interval | |
| 1 | Fixed for binary convolution coding | |
| 1 | No frame aggregation | |
| 4 | Fixed at 11 ah | |
| 6 | At CBW 1 MHz with MCS10 |
Network cost of STA in 802.11 AKM and the proposed AKM over IEEE 802.11ah network.
| Network Process | # of msg | Sum of | Sum of Calculated | |
|---|---|---|---|---|
| 802.11 | Open Association | 5 | 597 | 49.01 |
| IEEE 802.1X | 16 | 6040 | 376.96 | |
| 4-way HSK | 4 | 622 | 46.91 | |
| proposed | Open Association | 6 | 747 | 60.45 |
| Establishing SA | 3 | 551 | 39.68 |
Memory consumption of STA due to cryptographic algorithms.
| AKM Mechanism | Cryptographic | Binary Size | Memory |
|---|---|---|---|
| IEEE 802.11 AKM | RSA | 6472 | 14,960 |
| Proposed AKM | AES | 5096 | 5096 |