Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks
Title | Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Roselin, A. G., Nanda, P., Nepal, S. |
Conference Name | 2017 IEEE Trustcom/BigDataSE/ICESS |
ISBN Number | 978-1-5090-4906-6 |
Keywords | 6LoWPAN, 6LoWPAN wireless sensor networks, authentication, CBC mode, cipher block chaining, composability, Contiki, ContikiOS, Cooja Simulator, cryptographic protocols, cryptography, cyber physical systems security, datagram transport layer security, DTLS, EAKES6Lo technique, Edge router, LAUP, lightweight authentication protocol, Lucky Thirteen attack, PAN ID, personal area network identification, personal area networks, power consumption, Protocols, pubcrawl, remote server, resilience, Resiliency, resource-constrained sensors, S3K technique, Scyther security protocol verification tool, sensor nodes, Sensors, Servers, session key distribution, symmetric key establishment method, telecommunication network routing, telecommunication power management, telecommunication security, trust anchor, Wireless sensor networks |
Abstract | 6LoWPAN networks involving wireless sensors consist of resource starving miniature sensor nodes. Since secured authentication of these resource-constrained sensors is one of the important considerations during communication, use of asymmetric key distribution scheme may not be the perfect choice to achieve secure authentication. Recent research shows that Lucky Thirteen attack has compromised Datagram Transport Layer Security (DTLS) with Cipher Block Chaining (CBC) mode for key establishment. Even though EAKES6Lo and S3K techniques for key establishment follow the symmetric key establishment method, they strongly rely on a remote server and trust anchor for secure key distribution. Our proposed Lightweight Authentication Protocol (LAUP) used a symmetric key method with no preshared keys and comprised of four flights to establish authentication and session key distribution between sensors and Edge Router in a 6LoWPAN environment. Each flight uses freshly derived keys from existing information such as PAN ID (Personal Area Network IDentification) and device identities. We formally verified our scheme using the Scyther security protocol verification tool for authentication properties such as Aliveness, Secrecy, Non-Injective Agreement and Non-Injective Synchronization. We simulated and evaluated the proposed LAUP protocol using COOJA simulator with ContikiOS and achieved less computational time and low power consumption compared to existing authentication protocols such as the EAKES6Lo and SAKES. |
URL | http://ieeexplore.ieee.org/document/8029463/ |
DOI | 10.1109/Trustcom/BigDataSE/ICESS.2017.260 |
Citation Key | roselin_lightweight_2017 |
- sensor nodes
- personal area networks
- power consumption
- Protocols
- pubcrawl
- remote server
- resilience
- Resiliency
- resource-constrained sensors
- S3K technique
- Scyther security protocol verification tool
- personal area network identification
- sensors
- Servers
- session key distribution
- symmetric key establishment method
- telecommunication network routing
- telecommunication power management
- telecommunication security
- trust anchor
- wireless sensor networks
- Cryptography
- 6LoWPAN wireless sensor networks
- authentication
- CBC mode
- cipher block chaining
- composability
- Contiki
- ContikiOS
- Cooja Simulator
- Cryptographic Protocols
- 6LoWPAN
- Cyber Physical Systems Security
- datagram transport layer security
- DTLS
- EAKES6Lo technique
- Edge router
- LAUP
- lightweight authentication protocol
- Lucky Thirteen attack
- PAN ID