A new user authentication mechanism for IETF 6TiSCH protocol

Internet of Things (IoT) technology is expected to encompass many application areas. This broad range of applications present challenges such as reliability, low power and low latency. This paper presents an extension to the new bootstrapping mechanism in the IETF 6TiSCH protocol. It is aimed to distribute the keys used in the proposed method to the trusted nodes of the network to carry out an effective authentication and bootstrapping process. By using a distributed approach, we aim to reduce the communication cost of the standard IETF 6TiSCH authentication protocol and to reduce the message traffic on the network by keeping the authentication parameters at the edge of the network.

[1]  Mahesh Sooriyabandara,et al.  A Storage Centric Approach to Scalable Sensor Networks , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).

[2]  Maode Ma,et al.  A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks , 2016, IEEE Transactions on Industrial Informatics.

[3]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[4]  Adam Dunkels,et al.  Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[5]  Alireza Esfahani,et al.  A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment , 2019, IEEE Internet of Things Journal.

[6]  Jiang Zhu,et al.  Fog Computing: A Platform for Internet of Things and Analytics , 2014, Big Data and Internet of Things.

[7]  Antonio Pescapè,et al.  Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..

[8]  Carsten Bormann,et al.  The Constrained Application Protocol (CoAP) , 2014, RFC.

[9]  Adam Dunkels,et al.  Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.

[10]  Mahesh Sooriyabandara,et al.  Content centric routing in IoT networks and its integration in RPL , 2016, Comput. Commun..

[11]  Sateesh Addepalli,et al.  Fog computing and its role in the internet of things , 2012, MCC '12.

[12]  Ludwig Seitz,et al.  Object Security of CoAP (OSCOAP) , 2016 .