scholarly journals S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme

Sensors ◽  
2020 ◽  
Vol 20 (9) ◽  
pp. 2707 ◽  
Author(s):  
Muhammad Tanveer ◽  
Ghulam Abbas ◽  
Ziaul Haq Abbas ◽  
Muhammad Waqas ◽  
Fazal Muhammad ◽  
...  

IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) has an ample share in the Internet of Things. Sensor nodes in 6LoWPAN collect vital information from the environment and transmit to a central server through the public Internet. Therefore, it is inevitable to secure communications and allow legitimate sensor nodes to access network resources. This paper presents a lightweight Authentication and Key Exchange (AKE) scheme for 6LoWPAN using an authenticated encryption algorithm and hash function. Upon successful authentication, sensor nodes and the central server can establish the secret key for secure communications. The proposed scheme ensures header verification during the AKE process without using IP security protocol and, thus, has low communication and computational overheads. The logical correctness of the proposed scheme is validated through Burrows–Abadi–Needham logic. Furthermore, automatic security analyses by using AVISPA illustrate that the proposed scheme is resistant to various malicious attacks in 6LoWPANs.

Sensors ◽  
2019 ◽  
Vol 19 (15) ◽  
pp. 3259
Author(s):  
Da-Zhi Sun ◽  
Li Sun ◽  
Ying Yang

Bluetooth low energy devices are very popular in wireless personal area networks. According to the Bluetooth standard specifications, the low energy secure simple pairing (LESSP) protocol is the process by which the pairing devices negotiate the authenticated secret key. To violate the user privacy, the adversary can perhaps link the runs of the LESSP protocol to the targeted device, which usually relates to the specially appointed user. Hence, we investigate deep into the privacy of the LESSP protocol. Our main contributions are threefold: (1) We demonstrate that the LESSP protocol suffers from privacy vulnerability. That is, an adversary without any secret key is able to identify the targeted device by the LESSP protocol. (2) An improvement is therefore proposed to repair the privacy vulnerability in the LESSP protocol. (3) We develop a formal privacy model to evaluate the privacy vulnerabilities in the LESSP protocol and its improved versions. We further prove that our improvement on the LESSP protocol is private under the privacy model. In addition, the performance evaluation shows that our improvement is as efficient as the LESSP protocol. Our research results are beneficial to the privacy enhancement of Bluetooth systems in wireless personal area networks.


2013 ◽  
Vol 2013 ◽  
pp. 1-7 ◽  
Author(s):  
Jing Li ◽  
Chong Shen ◽  
Kae Hsiang Kwong

In Wireless sensor networks (WSNs), group mobility is important in many practical application scenarios, and it is inconvenient for traditional static WSNs to collect information. In this paper, we propose a WSN model based on IPv6 over Low power Wireless Personal Area Networks (6LoWPANs) in mobile sensing application scenarios. Wireless mesh sensor network (WMSN) infrastructure and Network Mobility (NEMO) protocol are deployed to ensure the continuity of the communications. The routing optimization mechanism in the nested network is then discussed. By taking mobile network partition and IP address configuration in the nested network, the corresponding signaling flow is discussed. Simulation results indicate that our mechanism is able to minimize the transmission costing, handoff delay, throughput and energy consumption of sensor nodes. Energy of each mobile router (MR) saves around 0.2 J per 3 seconds.


2015 ◽  
Vol 13 (34) ◽  
pp. 65-81
Author(s):  
Gustavo Meneses Benavides

Adopting techniques to increase operation time of battery-powered sensor nodes in wireless networks is necessary when implementing practical monitoring applications intended to run over extended periods of time. Energy harvesting; DC-DC converter techniques; and features of modern microcontrollers like extreme lower consumption, Sleep and Idle states, can contribute to improve the performance of network nodes. Designers can also use the possibilities offered by special protocols for wireless sensor networks, routing algorithms, and data aggregation plus collection strategies. Issues related to the process of design and implementation of an energy-efficient sensor node operating under IEEE 802.15.4-compliant MiWi protocol from Microchip® Technology are presented. Operating tests were conducted in different hardware/firmware scenarios in order to verify the changes in node’s performance depending on the adopted configuration.


2022 ◽  
Vol 18 (1) ◽  
pp. 1-23
Author(s):  
Mahabub Hasan Mahalat ◽  
Dipankar Karmakar ◽  
Anindan Mondal ◽  
Bibhash Sen

The deployment of wireless sensor networks (WSN) in an untended environment and the openness of the wireless channel bring various security threats to WSN. The resource limitations of the sensor nodes make the conventional security systems less attractive for WSN. Moreover, conventional cryptography alone cannot ensure the desired security against the physical attacks on sensor nodes. Physically unclonable function (PUF) is an emerging hardware security primitive that provides low-cost hardware security exploiting the unique inherent randomness of a device. In this article, we have proposed an authentication and key sharing scheme for the WSN integrating Pedersen’s verifiable secret sharing (Pedersen’s VSS) and Shamir’s secret sharing (Shamir’s SS) scheme with PUF which ensure the desired security with low overhead. The security analysis depicts the resilience of the proposed scheme against different active, passive and physical attacks. Also, the performance analysis shows that the proposed scheme possesses low computation, communication and storage overhead. The scheme only needs to store a polynomial number of PUF challenge-response pairs to the user node. The sink or senor nodes do not require storing any secret key. Finally, the comparison with the previous protocols establishes the dominance of the proposed scheme to use in WSN.


2009 ◽  
Vol E92-B (1) ◽  
pp. 143-149
Author(s):  
Sen-Hung WANG ◽  
Chih-Peng LI ◽  
Chao-Tang YU ◽  
Jian-Ming HUANG ◽  
Chua-Chin WANG

2005 ◽  
Vol 1 (3-4) ◽  
pp. 345-354 ◽  
Author(s):  
Dibyendu Chakrabarti ◽  
Subhamoy Maitra ◽  
Bimal Roy

Key pre-distribution is an important area of research in Distributed Sensor Networks (DSN). Two sensor nodes are considered connected for secure communication if they share one or more common secret key(s). It is important to analyse the largest subset of nodes in a DSN where each node is connected to every other node in that subset (i.e., the largest clique). This parameter (largest clique size) is important in terms of resiliency and capability towards efficient distributed computing in a DSN. In this paper, we concentrate on the schemes where the key pre-distribution strategies are based on transversal design and study the largest clique sizes. We show that merging of blocks to construct a node provides larger clique sizes than considering a block itself as a node in a transversal design.


Sign in / Sign up

Export Citation Format

Share Document