Browse > Article
http://dx.doi.org/10.5762/KAIS.2012.13.6.2739

Requirements and Analysis for Efficient Key Management Mechanism on IPSec-6LoWPAN  

Lee, Yun-Jung (Dept. of Computer Science and Statistics, Jeju National University)
Cho, Jung-Won (Dept. of Computer Education, Jeju National University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.13, no.6, 2012 , pp. 2739-2742 More about this Journal
Abstract
6LoWPAN is a standard to enable IPv6 packets to be carried on top of low power wireless networks. It needs to achieve security in 6LoWPAN, which is being defined at the 6LoWPAN working group of the IETF. IPSec is already part of IPv6, which makes it a candidate to be directly employed or adapted for WSNs. Some results showed that the adoption of IPSec is viable, and also point towards the successful design and deployment of security architecture for WSNs. IPSec requires two communicating entities to share a secret key that is typically established dynamically with the IKE. However, there are some limitations to use IKE on wireless networks. In this article, we show requirements for being Efficient Key management Mechanism for IPSec on 6LoWPAN and analyze candidate protocols.
Keywords
Key Management; 6LoWPAN; IPSec; WSNs;
Citations & Related Records
연도 인용수 순위
  • Reference
1 N. Kushalnagar, et al., IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem, Statement, and Goals (RFC 4919), Aug. 2007.
2 J. J. Granjal, R. Silva, E. Monteiro,et aI., Why is IPSec a viable option for Wireless Sensor Networks, In: 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, pp. 802-807. IEEE Press, New York, 2008.
3 IEEE 802.15.4 MAC.
4 Transmission of IPv6 Packets over IEEE 802.15.4 Networks (RFC 4944), Sep. 2007.
5 S. Park, et al,, IPv6 over Low Power WPAN Security Analysis, 2006.
6 The Internet Key Exchange (IKE) (RFC 2409)
7 The Internet Key Exchange (IKEv2) (RFC4306)
8 Kerberized Internet Negotiation of Keys (KINK) (RFC4430)
9 A. K. Lenstra and E. R. Verheul, The XTR Public Key System, Advances in Cryptology-CRYPTO, 2000.