Secure and Fast Multiple Nodes Join Mechanism for IPv6-Based Industrial Wireless Network

More and more industrial devices are expected to connect to the internet seamlessly. IPv6-based industrial wireless network can solve the address resources limitation problem. It is a challenge about how to ensure the wireless node join security after introducing the IPv6. In this paper, we propose a multiple nodes join mechanism, which includes a timeslot allocation method and secure join process for the IPv6 over IEEE 802.15.4e network. The timeslot allocation method is designed in order to configure communication resources in the join process for the new nodes. The test platform is implemented to verify the feasibility of the mechanism. The result shows that the proposed mechanism can reduce the communication cost for multiple nodes join process and improve the efficiency.

[1]  Chang-Seop Park,et al.  Security Bootstrapping for Secure Join and Binding on the IEEE 802.15.4-Based LoWPAN , 2017, IEEE Internet of Things Journal.

[3]  Laurence T. Yang,et al.  Scalable and efficient key management for heterogeneous sensor networks , 2008, The Journal of Supercomputing.

[4]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[5]  Haibin Yu,et al.  Performance Analysis of the Industrial Wireless Networks Standard: WIA-PA , 2017, Mob. Networks Appl..

[6]  Stephen Deering,et al.  Internet Protocol Version 6(IPv6) , 1998 .

[7]  Michael Richardson Enabling secure network enrollment in RPL networks , 2019 .

[8]  Hemanta Kumar Kalita,et al.  HySecNJoining: A hybrid secure node joining algorithm for wireless sensor network , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).

[9]  Carsten Bormann,et al.  The Constrained Application Protocol (CoAP) , 2014, RFC.

[10]  Kris Pister,et al.  Minimal Security Framework for 6TiSCH , 2016 .

[11]  Qin Wang,et al.  6TiSCH Operation Sublayer (6top) Interface , 2015 .

[12]  Christian Esposito,et al.  Distributed Group Key Management for Event Notification Confidentiality Among Sensors , 2020, IEEE Transactions on Dependable and Secure Computing.

[13]  Diego Dujovne,et al.  6TiSCH: deterministic IP-enabled industrial internet (of things) , 2014, IEEE Communications Magazine.

[14]  Jürgen Falb,et al.  The Internet Protocol , 2005, The Industrial Information Technology Handbook.

[15]  Stefan Rainer,et al.  Security versus Power Consumption in Wireless Sensor Networks , 2006 .