A Secure and Efficient Cluster-Based Authentication Scheme for Internet of Things (IoTs)

被引:8
|
作者
Imran, Kanwal [1 ]
Anjum, Nasreen [2 ]
Alghamdi, Abdullah [3 ]
Shaikh, Asadullah [3 ]
Hamdi, Mohammed [3 ]
Mahfooz, Saeed [1 ]
机构
[1] Univ Peshawar, Dept Comp Sci, Peshawar 25121, Pakistan
[2] Kings Coll London, Dept Informat, London SE5 9RJ, England
[3] Najran Univ, Coll Comp Sci & Informat Syst, Najran 61441, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 70卷 / 01期
关键词
IoT; cyber security; security attacks; authentication delay; han-dover delay; signaling cost; 6LoWPAN; SUPPORT; 5G;
D O I
10.32604/cmc.2022.018589
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IPv6 over Low Power Wireless Personal Area Network (6LoWPAN) provides IP connectivity to the highly constrained nodes in the Internet of Things (IoTs). 6LoWPAN allows nodes with limited battery power and storage capacity to carry IPv6 datagrams over the lossy and error-prone radio links offered by the IEEE 802.15.4 standard, thus acting as an adoption layer between the IPv6 protocol and IEEE 802.15.4 network. The data link layer of IEEE 802.15.4 in 6LoWPAN is based on AES (Advanced Encryption Standard), but the 6LoWPAN standard lacks and has omitted the security and privacy requirements at higher layers. The sensor nodes in 6LoWPAN can join the network without requiring the authentication procedure. Therefore, from security perspectives, 6LoWPAN is vulnerable to many attacks such as replay attack, Man-in-the-Middle attack, Impersonation attack, and Modification attack. This paper proposes a secure and efficient cluster-based authentication scheme (CBAS) for highly constrained sensor nodes in 6LoWPAN. In this approach, sensor nodes are organized into a cluster and communicate with the central network through a dedicated sensor node. The main objective of CBAS is to provide efficient and authentic communication among the 6LoWPAN nodes. To ensure the low signaling overhead during the registration, authentication, and handover procedures, we also introduce lightweight and efficient registration, de-registration, initial authentication, and handover procedures, when a sensor node or group of sensor nodes join or leave a cluster. Our security analysis shows that the proposed CBAS approach protects against various security attacks, including Identity Confidentiality attack, Modification attack, Replay attack, Man-in-the-middle attack, and Impersonation attack. Our simulation experiments show that CBAS has reduced the registration delay by 11%, handoff authentication delay by 32%, and signaling cost by 37% compared to the SGMS (Secure Group Mobility Scheme) and LAMS (Light-Wight Authentication & Mobility Scheme).
引用
收藏
页码:1033 / 1052
页数:20
相关论文
共 50 条
  • [21] A secure and efficient certificateless signature scheme for Internet of Things
    Xiang, Dengmei
    Li, Xuelian
    Gao, Juntao
    Zhang, Xiachuan
    AD HOC NETWORKS, 2022, 124
  • [22] Lightweight and efficient privacy-preserving mutual authentication scheme to secure Internet of Things-based smart healthcare
    Das, Sangjukta
    Namasudra, Suyel
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2023, 34 (11)
  • [23] Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle
    Park, Namje
    Kang, Namhi
    SENSORS, 2016, 16 (01):
  • [24] Quantum Secure Authentication Scheme for Internet of Medical Things Using Blockchain
    Prajapat, Sunil
    Kumar, Pankaj
    Kumar, Dheeraj
    Das, Ashok Kumar
    Hossain, M. Shamim
    Rodrigues, Joel J. P. C.
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (23): : 38496 - 38507
  • [25] Energy Efficiency Cooperative Scheme for Cluster-based Capillary Networks in Internet of Things Systems
    Song, Liumeng
    Chai, Kok Keong
    Chen, Yue
    Schormans, John
    2016 IEEE 27TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2016, : 2079 - 2084
  • [26] A secure and lightweight authentication scheme for digital forensics in industrial internet of things
    Xiao, Nan
    Wang, Zhaoshun
    Sun, Xiaoxue
    ALEXANDRIA ENGINEERING JOURNAL, 2025, 121 : 117 - 127
  • [27] An Efficient RFID Authentication Scheme Based on Elliptic Curve Cryptography for Internet of Things
    Benssalah, Mustapha
    Sarah, Izza
    Drouiche, Karim
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (03) : 2513 - 2539
  • [28] An Efficient RFID Authentication Scheme Based on Elliptic Curve Cryptography for Internet of Things
    Mustapha Benssalah
    Izza Sarah
    Karim Drouiche
    Wireless Personal Communications, 2021, 117 : 2513 - 2539
  • [29] An Efficient Cluster-Based Mutual Authentication and Key Update Protocol for Secure Internet of Vehicles in 5G Sensor Networks
    Su, Xinzhong
    Xu, Youyun
    SENSORS, 2025, 25 (01)
  • [30] Cluster Based Energy Efficient Authentication Scheme for Secure IDS Over MANET
    Rai, Sandeep
    Boghey, Rajesh
    Yadav, Priyanka Rani
    2017 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2017, : 200 - 205