Research output: Contribution to Journal/Magazine › Journal article › peer-review
Research output: Contribution to Journal/Magazine › Journal article › peer-review
}
TY - JOUR
T1 - LAKE-6SH
T2 - Lightweight User Authenticated Key Exchange for 6LoWPAN-Based Smart Homes
AU - Tanveer, Muhammad
AU - Abbas, Ghulam
AU - Abbas, Ziaul Haq
AU - Bilal, Muhammad
AU - Mukherjee, Amrit
AU - Kwak, Kyung Sup
PY - 2022/2/15
Y1 - 2022/2/15
N2 - Ensuring security and privacy in the Internet of Things (IoT) while taking into account the resource-constrained nature of IoT devices is challenging. In smart home (SH) IoT applications, remote users (RUs) need to communicate securely with resource-constrained network entities through the public Internet to procure real-time information. While the 6LoWPAN adaptation-layer standard provides resource-efficient IPv6 compatibility to low-power wireless networks, the basic 6LoWPAN design does not include security and privacy features. A resource-efficient authenticated key exchange (AKE) scheme becomes imperative for 6LoWPAN-based resource-constrained networks to render indecipherable communication functionality. This article presents a lightweight user AKE scheme for 6LoWPAN-based SH networks (LAKE-6SH) to achieve authenticity of RUs and establish private session keys between the users and network entities by employing the SHA-256 hash function, exclusive-OR operation, and a simple authenticated encryption primitive. Informal security validation illustrates that LAKE-6SH is protected against different pernicious security attacks. The security is further validated formally through the random oracle model. Moreover, through Scyther validation, it is demonstrated that LAKE-6SH is secure. In addition, it is demonstrated that LAKE-6SH renders better security features aside from its low communication and computational overheads.
AB - Ensuring security and privacy in the Internet of Things (IoT) while taking into account the resource-constrained nature of IoT devices is challenging. In smart home (SH) IoT applications, remote users (RUs) need to communicate securely with resource-constrained network entities through the public Internet to procure real-time information. While the 6LoWPAN adaptation-layer standard provides resource-efficient IPv6 compatibility to low-power wireless networks, the basic 6LoWPAN design does not include security and privacy features. A resource-efficient authenticated key exchange (AKE) scheme becomes imperative for 6LoWPAN-based resource-constrained networks to render indecipherable communication functionality. This article presents a lightweight user AKE scheme for 6LoWPAN-based SH networks (LAKE-6SH) to achieve authenticity of RUs and establish private session keys between the users and network entities by employing the SHA-256 hash function, exclusive-OR operation, and a simple authenticated encryption primitive. Informal security validation illustrates that LAKE-6SH is protected against different pernicious security attacks. The security is further validated formally through the random oracle model. Moreover, through Scyther validation, it is demonstrated that LAKE-6SH is secure. In addition, it is demonstrated that LAKE-6SH renders better security features aside from its low communication and computational overheads.
KW - Access control
KW - authentication
KW - internet of Things (IoT)
KW - privacy
KW - security
U2 - 10.1109/JIOT.2021.3085595
DO - 10.1109/JIOT.2021.3085595
M3 - Journal article
AN - SCOPUS:85107387120
VL - 9
SP - 2578
EP - 2591
JO - IEEE Internet of Things Journal
JF - IEEE Internet of Things Journal
SN - 2327-4662
IS - 4
ER -