Skip to main content
Erschienen in: Wireless Personal Communications 2/2020

03.08.2020

An Efficient Secure Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN in Unattended Scenarios

verfasst von: Lijun Gao, Lu Zhang, Lin Feng, Maode Ma

Erschienen in: Wireless Personal Communications | Ausgabe 2/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Machine-to-machine (M2M) is an important part of Internet of Things (IoT), and is used to describe those technologies applied in wireless communication automatically between mechanics or electronics instruments. With the rapid development and wide application of the Internet of Things, IETF is assigned to design IPv6 over low power wireless personal area network (6LoWPAN). The address of IPv6 is indefinite, which means it can satisfy addressing requirements for M2M. The 6LoWPAN standard has clarified important issues in M2M, but communication security has not been effectively resolved. In this article, we analyzed the existing security protocol for M2M communication in 6LoWPAN. The analysis result shows that the protocol has the defect of data leakage after the node is captured. In addition, the EAKES6Lo protocol is also vulnerable to sinkhole attacks and plaintext-chosen attacks. Based on the above analysis, an M2M communication mutual authentication protocol based on 6LoWPAN in unattended operation is proposed. The protocol establishes a reasonable secret key distribution mechanism and designs an anti-capture attack detection method for unattended nodes to resist attacks, such as replay attacks, sinkhole attacks, plaintext-chosen attacks, and physical capture attacks. Finally, the security of the protocol is proved by BAN.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Al-Karaki J. N., & Chen, K. -C. (2014). From M2M communications to the Internet of Things: Opportunities and challenges. Ad Hoc Network, 2014, pp. 1–2. Al-Karaki J. N., & Chen, K. -C. (2014). From M2M communications to the Internet of Things: Opportunities and challenges. Ad Hoc Network, 2014, pp. 1–2.
2.
Zurück zum Zitat Stojmenovic, I. (2014). Machine-to-machine communications with in-network data aggregation, processing, and actuation for large-scale cyberphysical systems. IEEE Internet Things, 1(2), 122–128. Stojmenovic, I. (2014). Machine-to-machine communications with in-network data aggregation, processing, and actuation for large-scale cyberphysical systems. IEEE Internet Things, 1(2), 122–128.
3.
Zurück zum Zitat Kim, J., Lee, J., Kim, J., & Yun, J. (2014). M2M service platforms: Survey, issues, and enabling technologies. IEEE Communications Surveys and Tutorials, 16(1), 61–76. Kim, J., Lee, J., Kim, J., & Yun, J. (2014). M2M service platforms: Survey, issues, and enabling technologies. IEEE Communications Surveys and Tutorials, 16(1), 61–76.
4.
Zurück zum Zitat Catarinucciet, L. (2015). An IoT-aware architecture for smart healthcare systems. IEEE Internet Things, 2(6), 515–526. Catarinucciet, L. (2015). An IoT-aware architecture for smart healthcare systems. IEEE Internet Things, 2(6), 515–526.
5.
Zurück zum Zitat Ko, J., Terzis, A., & Dawson-Haggerty, S. (2011). Connecting low-power and lossy networks to the internet. IEEE Communications Magazine, 49(4), 96–101. Ko, J., Terzis, A., & Dawson-Haggerty, S. (2011). Connecting low-power and lossy networks to the internet. IEEE Communications Magazine, 49(4), 96–101.
7.
Zurück zum Zitat Touati, F., & Mnaouer, A. B. (2016). Feasibility and performance evaluation of a 6LoWPANenabled platform for ubiquitous healthcare monitoring. Wireless Communications and Mobile Computing, 2016, pp. 1271–1281. Touati, F., & Mnaouer, A. B. (2016). Feasibility and performance evaluation of a 6LoWPANenabled platform for ubiquitous healthcare monitoring. Wireless Communications and Mobile Computing, 2016, pp. 1271–1281.
8.
Zurück zum Zitat Touati, F., Tabish, R., & Mnaouer, A. B. (2013). Towards u-health: an indoor 6LoWPAN based platform for real-time healthcare monitoring. In Proceedings of the 6th IEEE wireless and mobile networking conference (pp. 1–4). Touati, F., Tabish, R., & Mnaouer, A. B. (2013). Towards u-health: an indoor 6LoWPAN based platform for real-time healthcare monitoring. In Proceedings of the 6th IEEE wireless and mobile networking conference (pp. 1–4).
9.
Zurück zum Zitat Demirkan, H. (2013). A smart healthcare systems framework. IT Professional, 15(5), 38–45. Demirkan, H. (2013). A smart healthcare systems framework. IT Professional, 15(5), 38–45.
10.
Zurück zum Zitat Agoulmine, N., & Deen, M. J. (2011). U-health smart home. IEEE Nanotechnology Magazine, 5(3), 6–11. Agoulmine, N., & Deen, M. J. (2011). U-health smart home. IEEE Nanotechnology Magazine, 5(3), 6–11.
11.
Zurück zum Zitat Misra, S., Goswami, S., & Taneja, C. (2015). PKI adapted model for secure information dissemination in industrial control and automation 6LoWPANs, IEEE Access, 2015, pp. 875–889. Misra, S., Goswami, S., & Taneja, C. (2015). PKI adapted model for secure information dissemination in industrial control and automation 6LoWPANs, IEEE Access, 2015, pp. 875–889.
12.
Zurück zum Zitat Val, P. B., Valls, M. G., & Cunado, M. B. (2014). A simple data-muling protocol. IEEE Transactions on Industrial Informatics, 10(2), 895–902. Val, P. B., Valls, M. G., & Cunado, M. B. (2014). A simple data-muling protocol. IEEE Transactions on Industrial Informatics, 10(2), 895–902.
13.
Zurück zum Zitat Goswami, S., Misra, S., & Taneja, C. (2014). Securing intra-communication in 6LoWPAN: A PKI Integrated Scheme. In Proceedings of the advanced networks and telecommuncations systems, 2014, pp. 14–17. Goswami, S., Misra, S., & Taneja, C. (2014). Securing intra-communication in 6LoWPAN: A PKI Integrated Scheme. In Proceedings of the advanced networks and telecommuncations systems, 2014, pp. 14–17.
14.
Zurück zum Zitat Kasinathan, P., Pastrone, C., Spirito, M. A., & Vinkovits, M. (2013). Denial-ofservice detection in 6LoWPAN based Internet of Things. In Proceedings IEEE 9th international conference on wireless and mobile computing, Networking and Communications. 2013, pp. 600–607. Kasinathan, P., Pastrone, C., Spirito, M. A., & Vinkovits, M. (2013). Denial-ofservice detection in 6LoWPAN based Internet of Things. In Proceedings IEEE 9th international conference on wireless and mobile computing, Networking and Communications. 2013, pp. 600–607.
15.
Zurück zum Zitat Cervantes, C., Poplade, D., & Nogueira, M. (2015). Detection of Sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In Proceedings of the integrated network management, 2015, pp.11–15. Cervantes, C., Poplade, D., & Nogueira, M. (2015). Detection of Sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In Proceedings of the integrated network management, 2015, pp.11–15.
16.
Zurück zum Zitat Raza, S., Duquennoy, S., & Höglund, J. (2015). Secure communication for the Internet of Things a comparison of link-layer security and IPsec for 6LoWPAN. Security & Communication Networks, 7(12), 2654–2668. Raza, S., Duquennoy, S., & Höglund, J. (2015). Secure communication for the Internet of Things a comparison of link-layer security and IPsec for 6LoWPAN. Security & Communication Networks, 7(12), 2654–2668.
17.
Zurück zum Zitat H. R. Hussen, G. A. Tizazu, T. Miao, L. Taekkyeun, C. Youngjun, and K. Ki-Hyung, SAKES: Secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6LoWPAN). in Proceedings of the international conference on ubiquitous and future networks, 2013, pp. 246–251. H. R. Hussen, G. A. Tizazu, T. Miao, L. Taekkyeun, C. Youngjun, and K. Ki-Hyung, SAKES: Secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6LoWPAN). in Proceedings of the international conference on ubiquitous and future networks, 2013, pp. 246–251.
18.
Zurück zum Zitat Chen, S. & Ma, M. (2013). A dynamic-encryption authentication scheme for M2M security in cyber-physical systems. In Proceedings of the 2013 IEEE global communications conference, 2013, pp. 2897–2901. Chen, S. & Ma, M. (2013). A dynamic-encryption authentication scheme for M2M security in cyber-physical systems. In Proceedings of the 2013 IEEE global communications conference, 2013, pp. 2897–2901.
19.
Zurück zum Zitat Fu, A., Zhang, Y., Zhu, Z., Jing, Q., & Feng, J. (2012). An efficient handover authentication scheme with privacy preservation for IEEE 802. 16 m network. Computers & Security, 2012, pp. 741–749. Fu, A., Zhang, Y., Zhu, Z., Jing, Q., & Feng, J. (2012). An efficient handover authentication scheme with privacy preservation for IEEE 802. 16 m network. Computers & Security, 2012, pp. 741–749.
20.
Zurück zum Zitat Zhang, X., Li, G., & Han, W. (2015). Ticket-based authentication for fast handover in wireless mesh networks. Wireless Personal Communications, 85(3), 1509–1523. Zhang, X., Li, G., & Han, W. (2015). Ticket-based authentication for fast handover in wireless mesh networks. Wireless Personal Communications, 85(3), 1509–1523.
21.
Zurück zum Zitat Qiu, Y., & Ma, M. (2016). A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks. IEEE Transactions on Industrial Informatics, 12(6), 2074–2085. Qiu, Y., & Ma, M. (2016). A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks. IEEE Transactions on Industrial Informatics, 12(6), 2074–2085.
22.
Zurück zum Zitat Muhammad, T., & Ghulam, A. (2020). S6AE: Securing 6LoWPAN using authenticated encryption scheme. Sensors, 20(9), 1–23. Muhammad, T., & Ghulam, A. (2020). S6AE: Securing 6LoWPAN using authenticated encryption scheme. Sensors, 20(9), 1–23.
23.
Zurück zum Zitat Verma, A., & Ranga, V. (2020). Mitigation of DIS flooding attacks in RPL based 6LoWPAN networks. Transactions on emerging telecommunications technologies, 2020, 31(2). Verma, A., & Ranga, V. (2020). Mitigation of DIS flooding attacks in RPL based 6LoWPAN networks. Transactions on emerging telecommunications technologies, 2020, 31(2).
24.
Zurück zum Zitat Baskaran, A. G., Nanda, P., & Nepal, S. (2019). Testbed evaluation of Lightweight Authentication Protocol (LAUP) for 6LoWPAN wireless sensor networks. Concurrency and Computation: Practice and Experience, 2019, 31(23). Baskaran, A. G., Nanda, P., & Nepal, S. (2019). Testbed evaluation of Lightweight Authentication Protocol (LAUP) for 6LoWPAN wireless sensor networks. Concurrency and Computation: Practice and Experience, 2019, 31(23).
25.
Zurück zum Zitat Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., McCann, J. A., & Kin, L. (2013). A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities. IEEE Wireless Communications, 20(6), 91–98. Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., McCann, J. A., & Kin, L. (2013). A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities. IEEE Wireless Communications, 20(6), 91–98.
26.
Zurück zum Zitat Park, S., Kim, K., Haddad, W., Chakrabarti, S., & Laganier, J. (2011). IPv6 over low power WPAN security analysis. IETF Internet Draft Draft-6lowpanSecurity-Analysis-05, 2011. Park, S., Kim, K., Haddad, W., Chakrabarti, S., & Laganier, J. (2011). IPv6 over low power WPAN security analysis. IETF Internet Draft Draft-6lowpanSecurity-Analysis-05, 2011.
Metadaten
Titel
An Efficient Secure Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN in Unattended Scenarios
verfasst von
Lijun Gao
Lu Zhang
Lin Feng
Maode Ma
Publikationsdatum
03.08.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07645-z

Weitere Artikel der Ausgabe 2/2020

Wireless Personal Communications 2/2020 Zur Ausgabe

Neuer Inhalt