Home > Research > Publications & Outputs > LAKE-6SH

Links

Text available via DOI:

View graph of relations

LAKE-6SH: Lightweight User Authenticated Key Exchange for 6LoWPAN-Based Smart Homes

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

LAKE-6SH: Lightweight User Authenticated Key Exchange for 6LoWPAN-Based Smart Homes. / Tanveer, Muhammad; Abbas, Ghulam; Abbas, Ziaul Haq et al.
In: IEEE Internet of Things Journal, Vol. 9, No. 4, 15.02.2022, p. 2578-2591.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Tanveer, M, Abbas, G, Abbas, ZH, Bilal, M, Mukherjee, A & Kwak, KS 2022, 'LAKE-6SH: Lightweight User Authenticated Key Exchange for 6LoWPAN-Based Smart Homes', IEEE Internet of Things Journal, vol. 9, no. 4, pp. 2578-2591. https://doi.org/10.1109/JIOT.2021.3085595

APA

Tanveer, M., Abbas, G., Abbas, Z. H., Bilal, M., Mukherjee, A., & Kwak, K. S. (2022). LAKE-6SH: Lightweight User Authenticated Key Exchange for 6LoWPAN-Based Smart Homes. IEEE Internet of Things Journal, 9(4), 2578-2591. https://doi.org/10.1109/JIOT.2021.3085595

Vancouver

Tanveer M, Abbas G, Abbas ZH, Bilal M, Mukherjee A, Kwak KS. LAKE-6SH: Lightweight User Authenticated Key Exchange for 6LoWPAN-Based Smart Homes. IEEE Internet of Things Journal. 2022 Feb 15;9(4):2578-2591. doi: 10.1109/JIOT.2021.3085595

Author

Tanveer, Muhammad ; Abbas, Ghulam ; Abbas, Ziaul Haq et al. / LAKE-6SH : Lightweight User Authenticated Key Exchange for 6LoWPAN-Based Smart Homes. In: IEEE Internet of Things Journal. 2022 ; Vol. 9, No. 4. pp. 2578-2591.

Bibtex

@article{a4133d79ca6a48508f2b7f5e6f6e55ca,
title = "LAKE-6SH: Lightweight User Authenticated Key Exchange for 6LoWPAN-Based Smart Homes",
abstract = "Ensuring security and privacy in the Internet of Things (IoT) while taking into account the resource-constrained nature of IoT devices is challenging. In smart home (SH) IoT applications, remote users (RUs) need to communicate securely with resource-constrained network entities through the public Internet to procure real-time information. While the 6LoWPAN adaptation-layer standard provides resource-efficient IPv6 compatibility to low-power wireless networks, the basic 6LoWPAN design does not include security and privacy features. A resource-efficient authenticated key exchange (AKE) scheme becomes imperative for 6LoWPAN-based resource-constrained networks to render indecipherable communication functionality. This article presents a lightweight user AKE scheme for 6LoWPAN-based SH networks (LAKE-6SH) to achieve authenticity of RUs and establish private session keys between the users and network entities by employing the SHA-256 hash function, exclusive-OR operation, and a simple authenticated encryption primitive. Informal security validation illustrates that LAKE-6SH is protected against different pernicious security attacks. The security is further validated formally through the random oracle model. Moreover, through Scyther validation, it is demonstrated that LAKE-6SH is secure. In addition, it is demonstrated that LAKE-6SH renders better security features aside from its low communication and computational overheads.",
keywords = "Access control, authentication, internet of Things (IoT), privacy, security",
author = "Muhammad Tanveer and Ghulam Abbas and Abbas, {Ziaul Haq} and Muhammad Bilal and Amrit Mukherjee and Kwak, {Kyung Sup}",
year = "2022",
month = feb,
day = "15",
doi = "10.1109/JIOT.2021.3085595",
language = "English",
volume = "9",
pages = "2578--2591",
journal = "IEEE Internet of Things Journal",
issn = "2327-4662",
publisher = "IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC",
number = "4",

}

RIS

TY - JOUR

T1 - LAKE-6SH

T2 - Lightweight User Authenticated Key Exchange for 6LoWPAN-Based Smart Homes

AU - Tanveer, Muhammad

AU - Abbas, Ghulam

AU - Abbas, Ziaul Haq

AU - Bilal, Muhammad

AU - Mukherjee, Amrit

AU - Kwak, Kyung Sup

PY - 2022/2/15

Y1 - 2022/2/15

N2 - Ensuring security and privacy in the Internet of Things (IoT) while taking into account the resource-constrained nature of IoT devices is challenging. In smart home (SH) IoT applications, remote users (RUs) need to communicate securely with resource-constrained network entities through the public Internet to procure real-time information. While the 6LoWPAN adaptation-layer standard provides resource-efficient IPv6 compatibility to low-power wireless networks, the basic 6LoWPAN design does not include security and privacy features. A resource-efficient authenticated key exchange (AKE) scheme becomes imperative for 6LoWPAN-based resource-constrained networks to render indecipherable communication functionality. This article presents a lightweight user AKE scheme for 6LoWPAN-based SH networks (LAKE-6SH) to achieve authenticity of RUs and establish private session keys between the users and network entities by employing the SHA-256 hash function, exclusive-OR operation, and a simple authenticated encryption primitive. Informal security validation illustrates that LAKE-6SH is protected against different pernicious security attacks. The security is further validated formally through the random oracle model. Moreover, through Scyther validation, it is demonstrated that LAKE-6SH is secure. In addition, it is demonstrated that LAKE-6SH renders better security features aside from its low communication and computational overheads.

AB - Ensuring security and privacy in the Internet of Things (IoT) while taking into account the resource-constrained nature of IoT devices is challenging. In smart home (SH) IoT applications, remote users (RUs) need to communicate securely with resource-constrained network entities through the public Internet to procure real-time information. While the 6LoWPAN adaptation-layer standard provides resource-efficient IPv6 compatibility to low-power wireless networks, the basic 6LoWPAN design does not include security and privacy features. A resource-efficient authenticated key exchange (AKE) scheme becomes imperative for 6LoWPAN-based resource-constrained networks to render indecipherable communication functionality. This article presents a lightweight user AKE scheme for 6LoWPAN-based SH networks (LAKE-6SH) to achieve authenticity of RUs and establish private session keys between the users and network entities by employing the SHA-256 hash function, exclusive-OR operation, and a simple authenticated encryption primitive. Informal security validation illustrates that LAKE-6SH is protected against different pernicious security attacks. The security is further validated formally through the random oracle model. Moreover, through Scyther validation, it is demonstrated that LAKE-6SH is secure. In addition, it is demonstrated that LAKE-6SH renders better security features aside from its low communication and computational overheads.

KW - Access control

KW - authentication

KW - internet of Things (IoT)

KW - privacy

KW - security

U2 - 10.1109/JIOT.2021.3085595

DO - 10.1109/JIOT.2021.3085595

M3 - Journal article

AN - SCOPUS:85107387120

VL - 9

SP - 2578

EP - 2591

JO - IEEE Internet of Things Journal

JF - IEEE Internet of Things Journal

SN - 2327-4662

IS - 4

ER -