Abstract | ||
---|---|---|
Ensuring security and privacy in the Internet of Things (IoT) while taking into account the resource-constrained nature of IoT devices is challenging. In smart home (SH) IoT applications, remote users (RUs) need to communicate securely with resource-constrained network entities through the public Internet to procure real-time information. While the 6LoWPAN adaptation-layer standard provides resource-efficient IPv6 compatibility to low-power wireless networks, the basic 6LoWPAN design does not include security and privacy features. A resource-efficient authenticated key exchange (AKE) scheme becomes imperative for 6LoWPAN-based resource-constrained networks to render indecipherable communication functionality. This article presents a lightweight user AKE scheme for 6LoWPAN-based SH networks (LAKE-6SH) to achieve authenticity of RUs and establish private session keys between the users and network entities by employing the SHA-256 hash function, exclusive-OR operation, and a simple authenticated encryption primitive. Informal security validation illustrates that LAKE-6SH is protected against different pernicious security attacks. The security is further validated formally through the random oracle model. Moreover, through Scyther validation, it is demonstrated that LAKE-6SH is secure. In addition, it is demonstrated that LAKE-6SH renders better security features aside from its low communication and computational overheads. |
Year | DOI | Venue |
---|---|---|
2022 | 10.1109/JIOT.2021.3085595 | IEEE Internet of Things Journal |
Keywords | DocType | Volume |
Access control,authentication,internet of Things (IoT),privacy,security | Journal | 9 |
Issue | ISSN | Citations |
4 | 2327-4662 | 1 |
PageRank | References | Authors |
0.36 | 0 | 6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Muhammad Tanveer | 1 | 4 | 2.43 |
Ghulam Abbas | 2 | 79 | 26.10 |
Ziaul Haq Abbas | 3 | 54 | 15.37 |
Muhammad Bilal | 4 | 154 | 42.74 |
Amrit Mukherjee | 5 | 14 | 6.01 |
Kyung Sup Kwak | 6 | 92 | 12.10 |