| Literature DB >> 32397469 |
Muhammad Tanveer1, Ghulam Abbas2, Ziaul Haq Abbas3, Muhammad Waqas2,4, Fazal Muhammad5, Sunghwan Kim6.
Abstract
IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) has an ample share in the Internet of Things. Sensor nodes in 6LoWPAN collect vital information from the environment and transmit to a central server through the public Internet. Therefore, it is inevitable to secure communications and allow legitimate sensor nodes to access network resources. This paper presents a lightweight Authentication and Key Exchange (AKE) scheme for 6LoWPAN using an authenticated encryption algorithm and hash function. Upon successful authentication, sensor nodes and the central server can establish the secret key for secure communications. The proposed scheme ensures header verification during the AKE process without using IP security protocol and, thus, has low communication and computational overheads. The logical correctness of the proposed scheme is validated through Burrows-Abadi-Needham logic. Furthermore, automatic security analyses by using AVISPA illustrate that the proposed scheme is resistant to various malicious attacks in 6LoWPANs.Entities:
Keywords: IPv6 over Low Power Wireless Personal Area Networks; authentication and key exchange; security
Year: 2020 PMID: 32397469 PMCID: PMC7248872 DOI: 10.3390/s20092707
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 16LoWPAN network architecture.
Figure 2ASCON architecture.
List of notations.
| Notation | Description |
|---|---|
| Central server and 6LoWPAN sensor node | |
| Pseudo-identities of sensor node and 6LDR, respectively | |
| Secret real-identities of 6LoWPAN sensor nodes and secret parameter used in authentication process | |
| Encryption and decryption of message | |
| Authentication parameter generated by encryption and decryption algorithm at | |
| Timestamps at | |
| Initialization vectors at | |
| ASCON initialization states at | |
| Initialization states at | |
| Keys for | |
| MAC addresses of | |
| Timestamp and random number used in handover phase, respectively | |
| Cryptographic hash-function, bit-wise XOR, and concatenation, respectively |
Figure 3S6AE authentication and key establishment phase.
Figure 4The S6AE handover process.
Ban Logic notations.
| Feature | Description |
|---|---|
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| If |
Ban Logic inference rules.
| Notation | Description | ||
|---|---|---|---|
| Message-Meaning-Rule |
| ||
| Jurisdiction-Rule |
| ||
| Belief-Rule |
| ||
| Nonce-Verification-Rule |
| ||
| Freshness-Rule |
|
Figure 5AVISPA OFMC and CL-AtSe back-end simulation results.
Simulation parameters.
| Parameter | Size (Bits) | ||||
|---|---|---|---|---|---|
| Encryption Algorithm | ASCON-128a | ||||
|
| 64 | ||||
|
| 64 | ||||
|
| 64 | ||||
|
| 64 | ||||
|
| 64 | ||||
| timestamp | 32 | ||||
| HASH Function | SHA-256 | ||||
| Random numbers | 64 |
Comparison of security properties.
| SAKES | EAKES6Lo | S6AE | |
|---|---|---|---|
| Header Verification | × | × | ✓ |
| Replay attack | ✓ | ✓ | ✓ |
| Compromised attack | × | ✓ | ✓ |
| IP-Spoofing attack | × | × | ✓ |
| Unlinkability | × | ✓ | ✓ |
| Forward secrecy | × | ✓ | ✓ |
| Sybil attack | ✓ | ✓ | ✓ |
| Impersonation attack | ✓ | ✓ | ✓ |
| DOS attack | ✓ | ✓ | ✓ |
| MITM attack | ✓ | ✓ | ✓ |
| Identity Privacy Preservation | × | × | ✓ |
| Mutual authentication | ✓ | ✓ | ✓ |
| Mobility | × | ✓ | ✓ |
Figure 6Computational overhead.
Computational overheads.
| Scheme |
| 6LDR | 6LAR |
| Total Time |
|---|---|---|---|---|---|
| SAKES |
|
| - |
| |
| EAKES6Lo |
|
|
|
| |
| S6AE |
|
|
|
|
Communication overhead.
| Security Schemes | |||
|---|---|---|---|
| Exchanged Messages | EAKES6Lo | SAKES | S6AE |
|
| 672 bits | 688 bits | 496 bits |
|
| 784 bits | 2176 bits | 528 bits |
Transmission energy consumption.
| Proposed Scheme | Energy Consumption | ||||
|---|---|---|---|---|---|
| S6AE | |||||
| EAKES6Lo | |||||
| SAKES |
Figure 7Energy consumption overhead.
Storage cost comparison.
| Storage Cost | SAKES | EAKES6Lo | S6AE |
|---|---|---|---|
| Sensor ( | 272 bytes | 88 bytes | 46 bytes |
| Server ( | 272 bytes | 80 bytes | 54 bytes |
Handover overhead.
| Computational Overhead | Communication Overhead | |||||
|---|---|---|---|---|---|---|
| Scheme | Computational Time | Time Cost (ms) |
|
| No. of Messages | Energy Cost (mJ) |
| EAKES6Lo |
| 11.9366 | 704 bits | 672 bits | 6 | 1.05 |
| S6AE |
| 0.2544 | 480 bits | 418 bits | 6 | 0.68 |
| SAKES | n/a | - | n/a | n/a | n/a | n/a |