S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme

IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) has an ample share in the Internet of Things. Sensor nodes in 6LoWPAN collect vital information from the environment and transmit to a central server through the public Internet. Therefore, it is inevitable to secure communications and allow legitimate sensor nodes to access network resources. This paper presents a lightweight Authentication and Key Exchange (AKE) scheme for 6LoWPAN using an authenticated encryption algorithm and hash function. Upon successful authentication, sensor nodes and the central server can establish the secret key for secure communications. The proposed scheme ensures header verification during the AKE process without using IP security protocol and, thus, has low communication and computational overheads. The logical correctness of the proposed scheme is validated through Burrows–Abadi–Needham logic. Furthermore, automatic security analyses by using AVISPA illustrate that the proposed scheme is resistant to various malicious attacks in 6LoWPANs.

[1]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[2]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[3]  Utz Roedig,et al.  Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).

[4]  Sugata Sanyal,et al.  Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.

[5]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[6]  Jessye Dos Santos,et al.  Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis , 2014, IEEE Internet of Things Journal.

[7]  Weisong Shi,et al.  On security challenges and open issues in Internet of Things , 2018, Future Gener. Comput. Syst..

[8]  Yanli Li,et al.  Green content communications in 6LoWPAN , 2020, IET Networks.

[9]  Sebastian Mödersheim,et al.  The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.

[10]  Aref Meddeb,et al.  6LowPSec: An end-to-end security protocol for 6LoWPAN , 2018, Ad Hoc Networks.

[11]  Avinash Sharma,et al.  Security of 6LoWPAN IoT Networks in Hospitals for Medical Data Exchange , 2019 .

[12]  Priyadarsi Nanda,et al.  Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.

[13]  Tero Kivinen,et al.  More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE) , 2003, RFC.

[14]  Ludwig Seitz,et al.  S3K: Scalable Security With Symmetric Keys—DTLS Key Establishment for the Internet of Things , 2016, IEEE Transactions on Automation Science and Engineering.

[15]  Pascal Thubert,et al.  Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks , 2011, RFC.

[16]  Ki-Hyung Kim,et al.  SAKES: Secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6L0WPAN) , 2013, 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN).

[17]  Maode Ma,et al.  A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks , 2016, IEEE Transactions on Industrial Informatics.

[18]  Ingrid Moerman,et al.  IETF Standardization in the Field of the Internet of Things (IoT): A Survey , 2013, J. Sens. Actuator Networks.

[19]  Devesh Pratap Singh,et al.  Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges , 2020, IEEE Access.

[20]  Kris Gaj,et al.  Comparison of cost of protection against differential power analysis of selected authenticated ciphers , 2018, 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[21]  Carsten Bormann,et al.  From 6LoWPAN to 6Lo: Expanding the Universe of IPv6-Supported Technologies for the Internet of Things , 2017, IEEE Communications Magazine.

[22]  François-Xavier Standaert,et al.  On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[23]  Yi Mu,et al.  Communication security and privacy support in 6LoWPAN , 2017, J. Inf. Secur. Appl..

[24]  Manoel Camillo Penna,et al.  SDN Architecture for 6LoWPAN Wireless Sensor Networks , 2018, Sensors.

[25]  David E. Culler,et al.  Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.

[26]  Yacine Challal,et al.  Security in device-to-device communications: a survey , 2018, IET Networks.

[27]  Alexandre Adomnicai,et al.  Masking the Lightweight Authenticated Ciphers ACORN and Ascon in Software , 2018, IACR Cryptol. ePrint Arch..

[28]  Myung-Ki Shin,et al.  Transmission of IPv6 Packets over IEEE 802.16 , 2006 .

[29]  Dushantha Nalin K. Jayakody,et al.  A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions , 2020, IEEE Communications Surveys & Tutorials.

[30]  Houbing Song,et al.  Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures , 2019, IEEE Communications Surveys & Tutorials.

[31]  Meng Chang Chen,et al.  SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks , 2013, IEEE Systems Journal.

[32]  Tiago Gomes,et al.  A 6LoWPAN Accelerator for Internet of Things Endpoint Devices , 2018, IEEE Internet of Things Journal.