A secure remote user authentication scheme for 6LoWPAN-based Internet of Things.
One of the significant challenges in the Internet of Things (IoT) is the provisioning of guaranteed security and privacy, considering the fact that IoT devices are resource-limited. Oftentimes, in IoT applications, remote users need to obtain real-time data, with guaranteed security and privacy, fro...
Guardado en:
Autores principales: | , , , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Public Library of Science (PLoS)
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/c7c7fb8f3f0144d9857f7d4341b858cb |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:c7c7fb8f3f0144d9857f7d4341b858cb |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:c7c7fb8f3f0144d9857f7d4341b858cb2021-12-02T20:05:59ZA secure remote user authentication scheme for 6LoWPAN-based Internet of Things.1932-620310.1371/journal.pone.0258279https://doaj.org/article/c7c7fb8f3f0144d9857f7d4341b858cb2021-01-01T00:00:00Zhttps://doi.org/10.1371/journal.pone.0258279https://doaj.org/toc/1932-6203One of the significant challenges in the Internet of Things (IoT) is the provisioning of guaranteed security and privacy, considering the fact that IoT devices are resource-limited. Oftentimes, in IoT applications, remote users need to obtain real-time data, with guaranteed security and privacy, from resource-limited network nodes through the public Internet. For this purpose, the users need to establish a secure link with the network nodes. Though the IPv6 over low-power wireless personal area networks (6LoWPAN) adaptation layer standard offers IPv6 compatibility for resource-limited wireless networks, the fundamental 6LoWPAN structure ignores security and privacy characteristics. Thus, there is a pressing need to design a resource-efficient authenticated key exchange (AKE) scheme for ensuring secure communication in 6LoWPAN-based resource-limited networks. This paper proposes a resource-efficient secure remote user authentication scheme for 6LoWPAN-based IoT networks, called SRUA-IoT. SRUA-IoT achieves the authentication of remote users and enables the users and network entities to establish private session keys between themselves for indecipherable communication. To this end, SRUA-IoT uses a secure hash algorithm, exclusive-OR operation, and symmetric encryption primitive. We prove through informal security analysis that SRUA-IoT is secured against a variety of malicious attacks. We also prove the security strength of SRUA-IoT through formal security analysis conducted by employing the random oracle model. Additionally, we prove through Scyther-based validation that SRUA-IoT is resilient against various attacks. Likewise, we demonstrate that SRUA-IoT reduces the computational cost of the nodes and communication overheads of the network.Ghulam AbbasMuhammad TanveerZiaul Haq AbbasMuhammad WaqasThar BakerDhiya Al-Jumeily ObePublic Library of Science (PLoS)articleMedicineRScienceQENPLoS ONE, Vol 16, Iss 11, p e0258279 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Medicine R Science Q |
spellingShingle |
Medicine R Science Q Ghulam Abbas Muhammad Tanveer Ziaul Haq Abbas Muhammad Waqas Thar Baker Dhiya Al-Jumeily Obe A secure remote user authentication scheme for 6LoWPAN-based Internet of Things. |
description |
One of the significant challenges in the Internet of Things (IoT) is the provisioning of guaranteed security and privacy, considering the fact that IoT devices are resource-limited. Oftentimes, in IoT applications, remote users need to obtain real-time data, with guaranteed security and privacy, from resource-limited network nodes through the public Internet. For this purpose, the users need to establish a secure link with the network nodes. Though the IPv6 over low-power wireless personal area networks (6LoWPAN) adaptation layer standard offers IPv6 compatibility for resource-limited wireless networks, the fundamental 6LoWPAN structure ignores security and privacy characteristics. Thus, there is a pressing need to design a resource-efficient authenticated key exchange (AKE) scheme for ensuring secure communication in 6LoWPAN-based resource-limited networks. This paper proposes a resource-efficient secure remote user authentication scheme for 6LoWPAN-based IoT networks, called SRUA-IoT. SRUA-IoT achieves the authentication of remote users and enables the users and network entities to establish private session keys between themselves for indecipherable communication. To this end, SRUA-IoT uses a secure hash algorithm, exclusive-OR operation, and symmetric encryption primitive. We prove through informal security analysis that SRUA-IoT is secured against a variety of malicious attacks. We also prove the security strength of SRUA-IoT through formal security analysis conducted by employing the random oracle model. Additionally, we prove through Scyther-based validation that SRUA-IoT is resilient against various attacks. Likewise, we demonstrate that SRUA-IoT reduces the computational cost of the nodes and communication overheads of the network. |
format |
article |
author |
Ghulam Abbas Muhammad Tanveer Ziaul Haq Abbas Muhammad Waqas Thar Baker Dhiya Al-Jumeily Obe |
author_facet |
Ghulam Abbas Muhammad Tanveer Ziaul Haq Abbas Muhammad Waqas Thar Baker Dhiya Al-Jumeily Obe |
author_sort |
Ghulam Abbas |
title |
A secure remote user authentication scheme for 6LoWPAN-based Internet of Things. |
title_short |
A secure remote user authentication scheme for 6LoWPAN-based Internet of Things. |
title_full |
A secure remote user authentication scheme for 6LoWPAN-based Internet of Things. |
title_fullStr |
A secure remote user authentication scheme for 6LoWPAN-based Internet of Things. |
title_full_unstemmed |
A secure remote user authentication scheme for 6LoWPAN-based Internet of Things. |
title_sort |
secure remote user authentication scheme for 6lowpan-based internet of things. |
publisher |
Public Library of Science (PLoS) |
publishDate |
2021 |
url |
https://doaj.org/article/c7c7fb8f3f0144d9857f7d4341b858cb |
work_keys_str_mv |
AT ghulamabbas asecureremoteuserauthenticationschemefor6lowpanbasedinternetofthings AT muhammadtanveer asecureremoteuserauthenticationschemefor6lowpanbasedinternetofthings AT ziaulhaqabbas asecureremoteuserauthenticationschemefor6lowpanbasedinternetofthings AT muhammadwaqas asecureremoteuserauthenticationschemefor6lowpanbasedinternetofthings AT tharbaker asecureremoteuserauthenticationschemefor6lowpanbasedinternetofthings AT dhiyaaljumeilyobe asecureremoteuserauthenticationschemefor6lowpanbasedinternetofthings AT ghulamabbas secureremoteuserauthenticationschemefor6lowpanbasedinternetofthings AT muhammadtanveer secureremoteuserauthenticationschemefor6lowpanbasedinternetofthings AT ziaulhaqabbas secureremoteuserauthenticationschemefor6lowpanbasedinternetofthings AT muhammadwaqas secureremoteuserauthenticationschemefor6lowpanbasedinternetofthings AT tharbaker secureremoteuserauthenticationschemefor6lowpanbasedinternetofthings AT dhiyaaljumeilyobe secureremoteuserauthenticationschemefor6lowpanbasedinternetofthings |
_version_ |
1718375448507842560 |