A Secure and Efficient Cluster-Based Authentication Scheme for Internet of Things (IoTs)

被引:8
|
作者
Imran, Kanwal [1 ]
Anjum, Nasreen [2 ]
Alghamdi, Abdullah [3 ]
Shaikh, Asadullah [3 ]
Hamdi, Mohammed [3 ]
Mahfooz, Saeed [1 ]
机构
[1] Univ Peshawar, Dept Comp Sci, Peshawar 25121, Pakistan
[2] Kings Coll London, Dept Informat, London SE5 9RJ, England
[3] Najran Univ, Coll Comp Sci & Informat Syst, Najran 61441, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 70卷 / 01期
关键词
IoT; cyber security; security attacks; authentication delay; han-dover delay; signaling cost; 6LoWPAN; SUPPORT; 5G;
D O I
10.32604/cmc.2022.018589
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IPv6 over Low Power Wireless Personal Area Network (6LoWPAN) provides IP connectivity to the highly constrained nodes in the Internet of Things (IoTs). 6LoWPAN allows nodes with limited battery power and storage capacity to carry IPv6 datagrams over the lossy and error-prone radio links offered by the IEEE 802.15.4 standard, thus acting as an adoption layer between the IPv6 protocol and IEEE 802.15.4 network. The data link layer of IEEE 802.15.4 in 6LoWPAN is based on AES (Advanced Encryption Standard), but the 6LoWPAN standard lacks and has omitted the security and privacy requirements at higher layers. The sensor nodes in 6LoWPAN can join the network without requiring the authentication procedure. Therefore, from security perspectives, 6LoWPAN is vulnerable to many attacks such as replay attack, Man-in-the-Middle attack, Impersonation attack, and Modification attack. This paper proposes a secure and efficient cluster-based authentication scheme (CBAS) for highly constrained sensor nodes in 6LoWPAN. In this approach, sensor nodes are organized into a cluster and communicate with the central network through a dedicated sensor node. The main objective of CBAS is to provide efficient and authentic communication among the 6LoWPAN nodes. To ensure the low signaling overhead during the registration, authentication, and handover procedures, we also introduce lightweight and efficient registration, de-registration, initial authentication, and handover procedures, when a sensor node or group of sensor nodes join or leave a cluster. Our security analysis shows that the proposed CBAS approach protects against various security attacks, including Identity Confidentiality attack, Modification attack, Replay attack, Man-in-the-middle attack, and Impersonation attack. Our simulation experiments show that CBAS has reduced the registration delay by 11%, handoff authentication delay by 32%, and signaling cost by 37% compared to the SGMS (Secure Group Mobility Scheme) and LAMS (Light-Wight Authentication & Mobility Scheme).
引用
收藏
页码:1033 / 1052
页数:20
相关论文
共 50 条
  • [31] Lightweight, secure, efficient, and dynamic scheme for mutual authentication of devices in Internet-of-Things-Fog environment
    Jain, Usha
    Pirasteh, Saied
    Hussain, Muzzammil
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (01):
  • [32] Cluster-based Intrusion Detection Method for Internet of Things
    Choudhary, Sarika
    Kesswani, Nishtha
    2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,
  • [33] A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things
    AlMajed, Hisham
    AlMogren, Ahmad
    SENSORS, 2020, 20 (21) : 1 - 31
  • [34] A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things
    Chi, Jiancheng
    Li, Yu
    Huang, Jing
    Liu, Jing
    Jin, Yingwei
    Chen, Chen
    Qiu, Tie
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 167 (167)
  • [35] CBPR: A Cluster-Based Backpressure Routing for the Internet of Things
    Maheswar, R.
    Jayarajan, P.
    Sampathkumar, A.
    Kanagachidambaresan, G. R.
    Hindia, M. H. D. Nour
    Tilwari, Valmik
    Dimyati, Kaharudin
    Ojukwu, Henry
    Amiri, Iraj Sadegh
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 118 (04) : 3167 - 3185
  • [36] CBPR: A Cluster-Based Backpressure Routing for the Internet of Things
    R. Maheswar
    P. Jayarajan
    A. Sampathkumar
    G. R. Kanagachidambaresan
    M. H. D. Nour Hindia
    Valmik Tilwari
    Kaharudin Dimyati
    Henry Ojukwu
    Iraj Sadegh Amiri
    Wireless Personal Communications, 2021, 118 : 3167 - 3185
  • [37] A secure lightweight fuzzy embedder based user authentication scheme for internet of medical things applications
    Praveen, R.
    Pabitha, P.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 44 (05) : 7523 - 7542
  • [38] A Secure Scheme for Cluster-based Wireless Sensor Networks
    Zhang, Yuquan
    Wei, Lei
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS, 2015, 21 : 434 - 439
  • [39] Identity-Based Authentication Scheme for the Internet of Things
    Salman, Ola
    Abdallah, Sarah
    Elhajj, Imad H.
    Chehab, Ali
    Kayssi, Ayman
    2016 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2016, : 1109 - 1111
  • [40] Efficient and secure electronic evidence exchange scheme for internet of things
    Xiao, Yulong
    Chen, Liang
    FRONTIERS IN PHYSICS, 2025, 13