Browse > Article
http://dx.doi.org/10.13089/JKIISC.2016.26.6.1561

Device Security Bootstrapping Mechanism on the IEEE 802.15.4-Based LoWPAN  

Lee, Jong-Hoon (Dankook University)
Park, Chang-seop (Dankook University)
Abstract
As the use of the sensor device increases in IoT environment, the need for device security is becoming more and more important When a sensor device is deployed in IEEE 802.15.4-based LoWPAN, it has to perform the join operation with PAN Coordinator and the binding operation with another device. In the join and binding process, authentication and key distribution of the device are performed using the pre-distributed network key or certificate. However, the network key used in the conventional method has problems that it's role is limited to the group authentication and individual identification is not applied in certificate issuing. In this paper, we propose a secure join and binding protocol in LoWPAN environment that solves the problems of pre-distributed network key.
Keywords
802.15.4; LoWPAN; Join; Bootstrapping;
Citations & Related Records
연도 인용수 순위
  • Reference
1 IEEE std. 802.15.4-2015, Part 15.4:Low-Rate WPANs, pp. 87-92, Dec, 2015.
2 S. Sciancalepore, S. G. Piro, E. Vogli, G. Boggia, and L. A. Grieco, "On Securing IEEE 802.15.4 Networks through a Standard Compliant Framework," In Proc. of the 2014 Euro Med Telco Conference, pp. 1-6, Naples, Nov. 12-15, 2014.
3 Certicom Research, "Standard for Efficient Cryptography," SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) Version 0.97. pp. 5-12, Aug, 2013.
4 P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, "PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications," International Journal of Distributed Sensor Networks, vol. 2014, Article ID 357430.
5 G. Piro, G. Boggia, and L.A. Grieco, "A Standard Compliant Security Framework for IEEE 802.15.4 Networks," in Proc. of the IEEE World Forum on Internet of Things, pp. 27-30, Seoul, Mar. 6-8, 2014.
6 Certicom Research, "Standard for Efficient Cryptography," SEC 1: Elliptic Curve Cryptography Version 2.0. pp. 15-21, May 21, 2009.
7 S. Sciancalepore, A. Capossele, G. Piro, G. Boggia, and G. Bianchi, "Key Management Protocol with Implicit Certificates for IoT systems," In Proc. of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems, pp. 37-42, Florence, May 18-22, 2015.
8 Instrument and Technology, "K-mote Data sheet," pp. 7-8, Oct 5, 2008.
9 C. Lederer, R. Mader, M. Koschuch, J. Grossschadl, A. Szekely, and S. Tillich, "Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks," in Information Security Theory and Practice - WISTP 2009, LNCS, vol. 5746. Springer Verlag, pp. 112-127, 2009.