SEARCH WITHIN CONTENT
Citation Information : International Journal on Smart Sensing and Intelligent Systems. Volume 9, Issue 2, Pages 598-615, DOI: https://doi.org/10.21307/ijssis-2017-886
License : (CC BY-NC-ND 4.0)
Received Date : 30-November-2015 / Accepted: 22-March-2016 / Published Online: 01-June-2016
IoT data security is one of the core unresolved challenges in IoT community. Lack of resource-efficient authenticated secure key exchange methods among resource- constrained IoT devices makes man-in-the-middle attacks a serious vulnerability. In this regard, we propose 1(One) pass Authenticated Key Agreement (AKA) protocol for IoT applications. This protocol requires only one round of communication among the sender and receiver to establish a secure session, providing a balance between security (data confidentiality with integrity) and performance. We implemented and performed comprehensive power consumption and timing analysis of our implementation on Contiki platform to demonstrate the efficiency of the proposed protocol.
 Mihir Bellare. New proofs for nmac and hmac: Security without collision-resistance. In Advances in Cryptology-CRYPTO 2006, pages 602–619. Springer, 2006.
 Dan Boneh and Matthew Franklin. Identity-based encryption from the Weil pairing. SIAM Journal on Computing, 32(3):586–615, 2003.
 Zigbee Wireless Semiconductor Solutions by Ember. http://www.ember.com.
 Lander Casado and Philippas Tsigas. Contikisec: A secure network layer for wireless sensor networks under the contiki operating system. In Identity and Privacy in the Internet Age, pages 133–147. Springer, 2009.
 Barry Doyle, Stuart Bell, Alan F Smeaton, Kealan McCusker, and Noel E O’Connor. Security considerations and key negotiation techniques for power constrained sensor networks. The Computer Journal, 49(4):443–453, 2006.
 Adam Dunkels, Bjorn Gronvall, and Thiemo Voigt. Contiki - a lightweight and flexible operating system for tiny networked sensors. In Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks, LCN ’04, pages 455–462, Washington, DC, USA, 2004. IEEE Computer Society.
 Adam Dunkels, Bjorn Gronvall, and Thiemo Voigt. Contiki-a lightweight and flexible operating system for tiny networked sensors. In Local Computer Networks, 2004. 29th Annual IEEE Inter- national Conference on, pages 455–462. IEEE, 2004.
 Jorge Granjal, Edmundo Monteiro, and J Sa´ Silva. Enabling network-layer security on ipv6 wireless sensor networks. In Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE, pages 1–6, IEEE, 2010.
 Darrel Hankerson, Scott Vanstone, and Alfred J Menezes. Guide to elliptic curve cryptography, Springer Science & Business Media, 2004.
 Switzerland International Organization for Standardization, Gen‘eve. Iso/iec 19772, information technology security techniques authenticated encryption mechanisms. In Advances in Cryptology- CRYPTO 2006, pages 602–619. 2009.
 Yu-Ming Hsu Jiann-Lian Chen and I-Cheng Chang. Adaptive routing protocol for reliable sensor network applications. International Journal on Smart Sensing and Intelligent Systems, 2(4):515, 2009.
 Chris Karlof, Naveen Sastry, and David Wagner. Tinysec: a link layer security architecture for wire- less sensor networks. In Proceedings of the 2nd international conference on Embedded networked sensor systems, pages 162–175. ACM, 2004.
 Hugo Krawczyk. Hmqv: A high-performance secure Diffie-Hellman protocol. In Advances in Cryptology–CRYPTO 2005, pages 546–566. Springer, 2005.
 Philip Levis, Sam Madden, David Gay, Joseph Polastre, Robert Szewczyk, Alec Woo, Eric Brewer, and David Culler. The emergence of networking abstractions and techniques in tinyos. In Proceedings of the 1st Conference on Symposium on Networked Systems Design and Implementation - Volume 1, NSDI’04, pages 1–1, Berkeley, CA, USA, 2004. USENIX Association.
 An Liu and Peng Ning. Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In Information Processing in Sensor Networks, 2008. IPSN’08. International Conference on, pages 245–256. IEEE, 2008.
 Zhe Liu, Erich Wenger, and Johann Großscha¨dl. Mote-ecc: Energy-scalable elliptic curve cryptography for wireless sensor networks. In Applied Cryptography and Network Security, pages 361–379. Springer, 2014.
 MTM-CM5000-MSP MAXFOR Technology INC. http://maxfor.co.kr/eng/en_sub5_1_1.html
 ARM mbed IoT Device Platform. https://www.mbed.com/en/, 2016.
 BV Offspark. Polarssl. https://polarssl. org/, last access, 2013.
 Leonardo B Oliveira, Diego F Aranha, Conrado PL Gouveˆa, Michael Scott, Danilo F Caˆmara, Julio Lo´pez, and Ricardo Dahab. Tinypbc: Pairings for authenticated identity-based non-interactive key distribution in sensor networks. Computer Communications, 34(3):485–493, 2011.
 Fredrik Osterlind, Adam Dunkels, Joakim Eriksson, Niclas Finne, and Thiemo Voigt. Cross-level sensor network simulation with cooja. In Local Computer Networks, Proceedings 2006 31st IEEE Conference on, pages 641–648. IEEE, 2006.
 Piotr Szczechowiak, Leonardo B Oliveira, Michael Scott, Martin Collier, and Ricardo Dahab. Nanoecc: Testing the limits of elliptic curve cryptography in sensor networks. In Wireless sensor networks, pages 305–320. Springer, 2008.
 Tony Tam, Mohamed Alfasi, and Mohammad Mozumdar. Securing resource constraints embedded devices using elliptic curve cryptography. In SPIE Defense+ Security, pages 90850N–90850N. International Society for Optics and Photonics, 2014.
 Chiu Chiang Tan, Haodong Wang, Sheng Zhong, and Qun Li. Ibe-lite: a lightweight identity-based cryptography for body sensor networks. Information Technology in Biomedicine, IEEE Transactions on, 13(6):926–932, 2009.
 Crossbow Technology. http://www.xbow.com.
 Chu-Sing Yang Yueh-Min Huang Tien-Wen Sung, Ting-Ting Wi. Reliable data broadcast for zig- bee wireless sensor networks. International Journal On Smart Sensing and Intelligent Systems, 3(3):504, 2010.
 Xiaokang Xiong, Duncan S Wong, and Xiaotie Deng. Tinypairing: a fast and lightweight pairing- based cryptographic library for wireless sensor networks. In Wireless Communications and Net- working Conference (WCNC), pages 1–6. IEEE, 2010.
 Geng Yang, Jiang-Tao Wang, Hong-Bing Cheng, and Chun-Ming Rong. A key establish scheme for wsn based on ibe and diffie-hellman algorithms. Dianzi Xuebao(Acta Electronica Sinica), 35(1):180–184, 2007.
 Tobias Zillner. Zigbee exploited: The good, the bad and the ugly