Trust-based Mutual Authentication for Bootstrapping in 6LoWPAN
نویسندگان
چکیده
IPv6 over Low Power Wireless Personal Area Network (6LoWPAN) has emerged as a promising technology to realize ambient intelligence under the vision of the Internet of Things. Under most circumstances, it is imperative that security be addressed from bootstrapping to data transmission. In this paper, we propose a secure bootstrapping scheme that includes mutual authentication and trust evaluation to provide the first security measure for 6LoWPAN. The scheme is based on multi-hop cluster-tree hierarchical topology in which pairwise keys between neighboring nodes and trust paths to the base station (BS) are established at the same time. Mutual authentication that is based on pairing requires only the storage of one key and the exchange of IDs considering the computational complexity of public key algorithms and the frangibility of shared key protocols. Trust evaluation relies on multiple criteria to achieve security and energy efficiency and to balance the whole network. The BS also maintains a dynamic blacklist to prevent denial of service (DoS) attacks. Analysis shows that the proposed scheme is secure and scalable. The energy cost in terms of computation and communication as well as storage are also analyzed and compared to that of shared key protocols and public key algorithms through quantitative analysis.
منابع مشابه
A TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملHigh Secure Fingerprint Authentication in Ad hoc Network
In this paper, the methodology proposed is an novel robust approach on secure fingerprint authentication and matching techniques to implement in ad-hoc wireless networks. This is a difficult problem in ad-hoc network, as it involves bootstrapping trust between the devices. This journal would present a solution, which provides fingerprint authentication techniques to share their communication in...
متن کاملAn Exaustive Survey of Trust Models in P2p Network
Most of the peers accessing the services are under the assumption that the service accessed in a P2P network is utmost secured. By means of prevailing hard security mechanisms, security goals like authentication, authorization, privacy, non repudiation of services and other hard security issues are resolved. But these mechanisms fail to provide soft security. An exhaustive survey of existing tr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JCM
دوره 7 شماره
صفحات -
تاریخ انتشار 2012