A Secure and Efficient Cluster-Based Authentication Scheme for Internet of Things (IoTs)

被引:8
|
作者
Imran, Kanwal [1 ]
Anjum, Nasreen [2 ]
Alghamdi, Abdullah [3 ]
Shaikh, Asadullah [3 ]
Hamdi, Mohammed [3 ]
Mahfooz, Saeed [1 ]
机构
[1] Univ Peshawar, Dept Comp Sci, Peshawar 25121, Pakistan
[2] Kings Coll London, Dept Informat, London SE5 9RJ, England
[3] Najran Univ, Coll Comp Sci & Informat Syst, Najran 61441, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 70卷 / 01期
关键词
IoT; cyber security; security attacks; authentication delay; han-dover delay; signaling cost; 6LoWPAN; SUPPORT; 5G;
D O I
10.32604/cmc.2022.018589
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IPv6 over Low Power Wireless Personal Area Network (6LoWPAN) provides IP connectivity to the highly constrained nodes in the Internet of Things (IoTs). 6LoWPAN allows nodes with limited battery power and storage capacity to carry IPv6 datagrams over the lossy and error-prone radio links offered by the IEEE 802.15.4 standard, thus acting as an adoption layer between the IPv6 protocol and IEEE 802.15.4 network. The data link layer of IEEE 802.15.4 in 6LoWPAN is based on AES (Advanced Encryption Standard), but the 6LoWPAN standard lacks and has omitted the security and privacy requirements at higher layers. The sensor nodes in 6LoWPAN can join the network without requiring the authentication procedure. Therefore, from security perspectives, 6LoWPAN is vulnerable to many attacks such as replay attack, Man-in-the-Middle attack, Impersonation attack, and Modification attack. This paper proposes a secure and efficient cluster-based authentication scheme (CBAS) for highly constrained sensor nodes in 6LoWPAN. In this approach, sensor nodes are organized into a cluster and communicate with the central network through a dedicated sensor node. The main objective of CBAS is to provide efficient and authentic communication among the 6LoWPAN nodes. To ensure the low signaling overhead during the registration, authentication, and handover procedures, we also introduce lightweight and efficient registration, de-registration, initial authentication, and handover procedures, when a sensor node or group of sensor nodes join or leave a cluster. Our security analysis shows that the proposed CBAS approach protects against various security attacks, including Identity Confidentiality attack, Modification attack, Replay attack, Man-in-the-middle attack, and Impersonation attack. Our simulation experiments show that CBAS has reduced the registration delay by 11%, handoff authentication delay by 32%, and signaling cost by 37% compared to the SGMS (Secure Group Mobility Scheme) and LAMS (Light-Wight Authentication & Mobility Scheme).
引用
收藏
页码:1033 / 1052
页数:20
相关论文
共 50 条
  • [41] Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things
    Zhang, Hanlin
    Yu, Jia
    Tian, Chengliang
    Tong, Le
    Lin, Jie
    Ge, Linqiang
    Wang, Huaqun
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08): : 6868 - 6881
  • [42] Directed Path Based Authentication Scheme for the Internet of Things
    Ning, Huansheng
    Liu, Hong
    Liu, Qing
    Ji, Genlin
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2012, 18 (09) : 1112 - 1131
  • [43] A Secure Key Exchange and Authentication Scheme for Securing Communications in the Internet of Things Environment
    Peivandizadeh, Ali
    Adarbah, Haitham Y.
    Molavi, Behzad
    Mohajerzadeh, Amirhossein
    Al-Badi, Ali H.
    FUTURE INTERNET, 2024, 16 (10)
  • [44] A Secure Low-Cost Edge Device Authentication Scheme for the Internet of Things
    Guin, Ujjwal
    Singh, Adit
    Alam, Mahabubul
    Canedo, Janice
    Skjellum, Anthony
    2018 31ST INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2018 17TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID & ES), 2018, : 85 - 90
  • [45] Enhanced lightweight and secure certificateless authentication scheme (ELWSCAS) for Internet of Things environment
    Ali, Usman
    Bin Idris, Mohd Yamani Idna
    Frnda, Jaroslav
    Bin Ayub, Mohamad Nizam
    Khan, Muhammad Asghar
    Khan, Nauman
    Beegum, T. Rehannara
    Jasim, Ahmed A.
    Ullah, Insaf
    Babar, Mohammad
    INTERNET OF THINGS, 2023, 24
  • [46] Secure and Privacy-Preserving RFID Authentication Scheme for Internet of Things Applications
    Manik Lal Das
    Pardeep Kumar
    Andrew Martin
    Wireless Personal Communications, 2020, 110 : 339 - 353
  • [47] Secure and Privacy-Preserving RFID Authentication Scheme for Internet of Things Applications
    Das, Manik Lal
    Kumar, Pardeep
    Martin, Andrew
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 110 (01) : 339 - 353
  • [48] SLAK: secure lightweight scheme for authentication and key-agreement in internet of things
    Nahnah, Oussama
    Cherbal, Sarra
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (02)
  • [49] Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things
    Wang, Chenyu
    Wang, Ding
    Duan, Yihe
    Tao, Xiaofeng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2961 - 2976
  • [50] A secure multifactor remote user authentication scheme for Internet of Multimedia Things environment
    Dhillon, Parwinder Kaur
    Kalra, Sheetal
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (15)