1
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) has an ample share in the Internet of Things. Sensor nodes in 6LoWPAN collect vital information from the environment and transmit to a central server through the public Internet. Therefore, it is inevitable to secure communications and allow legitimate sensor nodes to access network resources. This paper presents a lightweight Authentication and Key Exchange (AKE) scheme for 6LoWPAN using an authenticated encryption algorithm and hash function. Upon successful authentication, sensor nodes and the central server can establish the secret key for secure communications. The proposed scheme ensures header verification during the AKE process without using IP security protocol and, thus, has low communication and computational overheads. The logical correctness of the proposed scheme is validated through Burrows–Abadi–Needham logic. Furthermore, automatic security analyses by using AVISPA illustrate that the proposed scheme is resistant to various malicious attacks in 6LoWPANs.

          Related collections

          Most cited references32

          • Record: found
          • Abstract: not found
          • Article: not found

          A Survey on Security and Privacy Issues in Internet-of-Things

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            A Logic of Authentication

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Security of the Internet of Things: Vulnerabilities, Attacks and Countermeasures

                Bookmark

                Author and article information

                Journal
                Sensors (Basel)
                Sensors (Basel)
                sensors
                Sensors (Basel, Switzerland)
                MDPI
                1424-8220
                09 May 2020
                May 2020
                : 20
                : 9
                : 2707
                Affiliations
                [1 ]Telecommunications and Networking (TeleCoN) Research Lab, GIK Institute of Engineering Sciences and Technology, Topi 23640, Pakistan; tanveer.m@ 123456giki.edu.pk
                [2 ]Faculty of Computer Science and Engineering, GIK Institute of Engineering Sciences and Technology, Topi 23640, Pakistan; abbasg@ 123456giki.edu.pk (G.A.); engr.waqas2079@ 123456gmail.com (M.W.)
                [3 ]Faculty of Electrical Engineering, GIK Institute of Engineering Sciences and Technology, Topi 23640, Pakistan; ziaul.h.abbas@ 123456giki.edu.pk
                [4 ]Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China
                [5 ]Department of Electrical Engineering, City University of Science and Information Technology, Peshawar 25000, Pakistan; fazal.muhammad@ 123456cusit.edu.pk
                [6 ]School of Electrical Engineering, University of Ulsan, Ulsan 44610, Korea
                Author notes
                [* ]Correspondence: sungkim@ 123456ulsan.ac.kr ; Tel.: +82-52-259-1401
                Author information
                https://orcid.org/0000-0001-9836-9970
                https://orcid.org/0000-0003-3836-1373
                https://orcid.org/0000-0003-0405-0083
                https://orcid.org/0000-0003-1762-5915
                Article
                sensors-20-02707
                10.3390/s20092707
                7248872
                32397469
                3fec95ae-b908-48bf-80b8-ee534dbbb755
                © 2020 by the authors.

                Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license ( http://creativecommons.org/licenses/by/4.0/).

                History
                : 29 March 2020
                : 07 May 2020
                Categories
                Article

                Biomedical engineering
                ipv6 over low power wireless personal area networks,security,authentication and key exchange

                Comments

                Comment on this article