Next Article in Journal
Space–Time–Frequency Multi-Sensor Analysis for Motor Cortex Localization Using Magnetoencephalography
Previous Article in Journal
Gaussian Mixture Models for Control of Quasi-Passive Spinal Exoskeletons
Article

S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme

1
Telecommunications and Networking (TeleCoN) Research Lab, GIK Institute of Engineering Sciences and Technology, Topi 23640, Pakistan
2
Faculty of Computer Science and Engineering, GIK Institute of Engineering Sciences and Technology, Topi 23640, Pakistan
3
Faculty of Electrical Engineering, GIK Institute of Engineering Sciences and Technology, Topi 23640, Pakistan
4
Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China
5
Department of Electrical Engineering, City University of Science and Information Technology, Peshawar 25000, Pakistan
6
School of Electrical Engineering, University of Ulsan, Ulsan 44610, Korea
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(9), 2707; https://doi.org/10.3390/s20092707
Received: 29 March 2020 / Revised: 1 May 2020 / Accepted: 7 May 2020 / Published: 9 May 2020
(This article belongs to the Section Sensor Networks)
IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) has an ample share in the Internet of Things. Sensor nodes in 6LoWPAN collect vital information from the environment and transmit to a central server through the public Internet. Therefore, it is inevitable to secure communications and allow legitimate sensor nodes to access network resources. This paper presents a lightweight Authentication and Key Exchange (AKE) scheme for 6LoWPAN using an authenticated encryption algorithm and hash function. Upon successful authentication, sensor nodes and the central server can establish the secret key for secure communications. The proposed scheme ensures header verification during the AKE process without using IP security protocol and, thus, has low communication and computational overheads. The logical correctness of the proposed scheme is validated through Burrows–Abadi–Needham logic. Furthermore, automatic security analyses by using AVISPA illustrate that the proposed scheme is resistant to various malicious attacks in 6LoWPANs. View Full-Text
Keywords: IPv6 over Low Power Wireless Personal Area Networks; security; authentication and key exchange IPv6 over Low Power Wireless Personal Area Networks; security; authentication and key exchange
Show Figures

Figure 1

MDPI and ACS Style

Tanveer, M.; Abbas, G.; Abbas, Z.H.; Waqas, M.; Muhammad, F.; Kim, S. S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme. Sensors 2020, 20, 2707. https://doi.org/10.3390/s20092707

AMA Style

Tanveer M, Abbas G, Abbas ZH, Waqas M, Muhammad F, Kim S. S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme. Sensors. 2020; 20(9):2707. https://doi.org/10.3390/s20092707

Chicago/Turabian Style

Tanveer, Muhammad, Ghulam Abbas, Ziaul H. Abbas, Muhammad Waqas, Fazal Muhammad, and Sunghwan Kim. 2020. "S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme" Sensors 20, no. 9: 2707. https://doi.org/10.3390/s20092707

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop