Browse > Article

Secure IEEE 802.15.4 Join Protocol for 6LoWPAN  

Ahn, Seung-Hyun (단국대학교 일반대학원 전자계산학과)
Park, Chang-Seop (단국대학교 소프트웨어학과)
Yeon, Han-Beol (단국대학교 일반대학원 소프트웨어보안전공)
Publication Information
Abstract
The security of the data exchanged between sensor nodes in IoT (Internet of Things) environment becomes increasing. In the conventional IEEE 802.15.4, the key for secure communication between the sensor node and the sensor node and the PAN Coordinator or the sensor node is assumed to be pre-shared in advance. Especially, there is another problem in that sensor node authentication is not considered during the association process. In this paper, we propose a security scheme that solves the problems of previously proposed protocols with the pre-shared key for all devices.
Keywords
802.15.4; Join; 6LoWPAN; IoT; Association;
Citations & Related Records
연도 인용수 순위
  • Reference
1 IEEE std. 802.15.4-2011, Part 15.4: Low-Rate WPANs, June 2011.
2 S. Sciancalepore, S. G. Piro, E. Vogli, G. Boggia, and L. A. Grieco, "On Securing IEEE 802.15.4 Networks through a Standard Compliant Framework," In Proc. of the 2014 Euro Med Telco Conference, pp. 1-6, Naples, Nov. 12-15, 2014.
3 G. Piro, G. Boggia, L. A. Grieco, "A Standard Compliant Security Framework for IEEE 802.15.4 Networks," in Proc. of the IEEE World Forum on Internet of Things, pp. 27-30, Seoul, Mar. 6-8, 2014.
4 P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, "PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications," International Journal of Distributed Sensor Networks, vol. 2014, Article ID 357430.
5 S. Sciancalepore, A. Capossele, G. Piro, G. Boggia, G. Bianchi, "Key Management Protocol with Implicit Certificates for IoT systems," In Proc. of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems, pp. 37-42, Florence, May 18-22, 2015.
6 Certicom Research, Standard for Efficient Cryptography, SEC 1: Elliptic Curve Cryptography, Sep. 2000.
7 T. Aura, "Cryptographically Generated Addresses," IETF RFC 3972, Mar. 2005.
8 C. Lederer, R. Mader, M. Koschuch, J. Grossschadl, A. Szekely, and S. Tillich, "Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks," in Information Security Theory and Practice - WISTP 2009, LNCS, vol. 5746. Springer Verlag, pp. 112-127, 2009.
9 J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, "System Architecture Directions for Networked Sensors," in Proc. of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems, vol. 35, pp. 93-104, Dec. 2000,.