Secure Group Mobility Support for 6LoWPAN Networks

The Internet Protocol version 6 (IPv6) over low power wireless personal area networks (6LoWPANs) has introduced IP technologies to wireless sensor networks, which significantly promotes the development of the Internet of Things. To support effective mobility management of these resource constrained IP-based sensor nodes, the Proxy Mobile IPv6 has been proposed as a standard to minimize the communication overhead of those nodes. Although the standard has specified some issues of security and mobility in 6LoWPANs, the issues of supporting secure group handovers have not been addressed much by the currently existing solutions. To further reduce the handover latency and signaling overhead, a fast group authentication scheme is proposed in this paper to support secure and seamless handovers for multiple resource constrained 6LoWPAN devices. With the consideration of mobile sensors with limited energy, only simple hash functions and symmetric encryption algorithms are used. The security analysis and the performance evaluation show that the proposed 6LoWPAN group handover scheme could enhance the security functionalities with high efficiency to achieve a fast authentication for handovers.

[1]  Mats Björkman,et al.  Interoperability in heterogeneous Low-Power Wireless Networks for Health Monitoring Systems , 2016, 2016 IEEE International Conference on Communications Workshops (ICC).

[2]  Carsten Bormann,et al.  From 6LoWPAN to 6Lo: Expanding the Universe of IPv6-Supported Technologies for the Internet of Things , 2017, IEEE Communications Magazine.

[3]  Xuemin Shen,et al.  SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks , 2014, 2014 IEEE International Conference on Communications (ICC).

[4]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[5]  Deepthi Sasidharan,et al.  Handover Efficiency Improvement in Proxy Mobile IPv6(PMIPv6) Networks , 2015 .

[6]  Rajeev Koodli Mobile IPv6 Fast Handovers , 2009, RFC.

[7]  Ejaz Ahmed,et al.  Green industrial networking: recent advances, taxonomy, and open research challenges , 2016, IEEE Communications Magazine.

[8]  Vlado Handziski,et al.  Industrial Wireless IP-Based Cyber –Physical Systems , 2016, Proceedings of the IEEE.

[9]  Marc Stevens,et al.  The First Collision for Full SHA-1 , 2017, CRYPTO.

[10]  Wang Lulu,et al.  Low-power Wireless Sensor Network protocol of Mobile Health based on IPv6 , 2016, 2016 35th Chinese Control Conference (CCC).

[11]  Thomas Narten,et al.  Neighbor Discovery for IP Version 6 (IPv6) , 1996, RFC.

[12]  Jin Cao,et al.  G2RHA:Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks , 2017, IEEE Transactions on Vehicular Technology.

[13]  Yi Mu,et al.  A secure mobility support scheme for 6LoWPAN wireless sensor networks , 2014, Secur. Commun. Networks.

[14]  Tiago Gomes,et al.  A 6LoWPAN Accelerator for Internet of Things Endpoint Devices , 2018, IEEE Internet of Things Journal.

[15]  Elaine B. Barker,et al.  SP 800-131A. Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths , 2011 .

[16]  Fang-Yie Leu,et al.  Comments on “SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks” , 2018, IEEE Systems Journal.

[17]  Hyunseung Choo,et al.  A novel scheme for preventing Out-Of-Order Packets in fast handover for Proxy Mobile IPv6 , 2014, The International Conference on Information Networking 2014 (ICOIN2014).

[18]  Carsten Bormann,et al.  Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) , 2012, RFC.

[19]  Frank Xia,et al.  Fast Handovers for Proxy Mobile IPv6 , 2010, RFC.

[20]  Choong Seon Hong,et al.  A 6LoWPAN Sensor Node Mobility Scheme Based on Proxy Mobile IPv6 , 2012, IEEE Transactions on Mobile Computing.

[21]  David E. Culler,et al.  Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.

[22]  Mi Wen,et al.  Group-Based Authentication and Key Agreement With Dynamic Policy Updating for MTC in LTE-A Networks , 2016, IEEE Internet of Things Journal.

[23]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[24]  Elaine B. Barker Recommendation for Key Management - Part 1 General , 2014 .

[25]  Pascal Thubert,et al.  Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks , 2011, RFC.

[26]  Jon Crowcroft,et al.  Optimized 6LoWPAN Fragmentation Header , 2016 .

[27]  Jin Cao,et al.  UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[28]  Bo Huang,et al.  A Novel Group-Based Handover Authentication Scheme with Privacy Preservation for Mobile WiMAX Networks , 2012, IEEE Communications Letters.

[29]  Elaine B. Barker,et al.  Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths , 2011 .

[30]  Chih-Shun Hsu,et al.  An enhanced group mobility protocol for 6LoWPAN-based wireless body area networks , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[31]  François-Xavier Standaert,et al.  On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[32]  Meng Chang Chen,et al.  SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks , 2013, IEEE Systems Journal.

[33]  Joel J. P. C. Rodrigues,et al.  Network Admission Control Solution for 6LoWPAN Networks Based on Symmetric Key Mechanisms , 2016, IEEE Transactions on Industrial Informatics.

[34]  Basavaraj Patil,et al.  Proxy Mobile IPv6 , 2008, RFC.

[35]  Dong Zheng,et al.  SEIP: Secure and seamless IP communications for group-oriented machine to machine communications , 2017, Peer-to-Peer Networking and Applications.

[36]  Fernando Gont A Method for Generating Semantically Opaque Interface Identifiers with IPv6 Stateless Address Autoconfiguration (SLAAC) , 2014, RFC.

[37]  Abderrezak Rachedi,et al.  A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology , 2016, Comput. Commun..

[38]  Jin Cao,et al.  GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks , 2015, 2015 IEEE International Conference on Communications (ICC).