Next Article in Journal
Complete Systematic Error Model of SSR for Sensor Registration in ATC Surveillance Networks
Next Article in Special Issue
Smart Bandwidth Assignation in an Underlay Cellular Network for Internet of Vehicles
Previous Article in Journal
Exploiting the Capture Effect to Enhance RACH Performance in Cellular-Based M2M Communications
Previous Article in Special Issue
Wireless Technology Recognition Based on RSSI Distribution at Sub-Nyquist Sampling Rate for Constrained Devices
Article Menu
Issue 10 (October) cover image

Export Article

Open AccessArticle
Sensors 2017, 17(10), 2170; https://doi.org/10.3390/s17102170

An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

1
Department of Computer and Radio Communication Engineering, Korea University, Seoul 136-713, Korea
2
School of Computer Science and Engineering, Korea University of Technology and Education, CheonAn 330-708, Korea
3
Department of Computer Science and Engineering, Korea University, Seoul 136-713, Korea
*
Author to whom correspondence should be addressed.
Received: 10 August 2017 / Revised: 18 September 2017 / Accepted: 20 September 2017 / Published: 21 September 2017
(This article belongs to the Special Issue Next Generation Wireless Technologies for Internet of Things)
View Full-Text   |   Download PDF [2469 KB, uploaded 22 September 2017]   |  

Abstract

Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism. View Full-Text
Keywords: Internet of Things (IoT); IEEE 802.11ah; resource constrained device; access network security; authentication and key management (AKM) Internet of Things (IoT); IEEE 802.11ah; resource constrained device; access network security; authentication and key management (AKM)
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Kim, K.-W.; Han, Y.-H.; Min, S.-G. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks. Sensors 2017, 17, 2170.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top