首页> 外文期刊>Concurrency and computation: practice and experience >Testbed evaluation of Lightweight Authentication Protocol (LAUP) for 6LoWPAN wireless sensor networks
【24h】

Testbed evaluation of Lightweight Authentication Protocol (LAUP) for 6LoWPAN wireless sensor networks

机译:用于6LoWPAN无线传感器网络的轻量认证协议(LAUP)的测试平台评估

获取原文
获取原文并翻译 | 示例
           

摘要

6LoWPAN networks involving wireless sensors consist of resource starving miniature sensor nodes. Since secured authentication is one of the important considerations, the use of asymmetric key distribution scheme may not be a perfect choice. Recent research shows that Lucky Thirteen attack has compromised Datagram Transport Layer Security (DTLS) with Cipher Block Chaining (CBC) mode for key establishment. Even though EAKES6Lo and S3K techniques for key establishment follow the symmetric key establishment method, they strongly rely on a remote server and trust anchor. Our proposed Lightweight Authentication Protocol (LAUP) used a symmetric key method with no preshared keys and comprised of four flights to establish authentication and session key distribution between sensors and Edge Router in a 6LoWPAN environment. Each flight uses freshly derived keys from existing information such as PANID (Personal AreaNetwork IDentification) and device identities.We formally verified our scheme using the Scyther security protocol verification tool.We simulated and evaluated the proposedLAUPprotocol usingCOOJA simulator and achieved less computational time and low power consumption compared to existing authentication protocols such as the EAKES6Lo and SAKES. LAUPis evaluated using real-time testbed and achieved less computational time, which is supportive of our simulated results.
机译:涉及无线传感器的6LoWPAN网络由资源匮乏的微型传感器节点组成。由于安全认证是重要的考虑因素之一,因此使用非对称密钥分发方案可能不是一个理想的选择。最近的研究表明,“幸运十三”攻击已通过用于密钥建立的密码块链接(CBC)模式损害了数据报传输层安全性(DTLS)。即使用于密钥建立的EAKES6Lo和S3K技术遵循对称密钥建立方法,它们仍强烈依赖于远程服务器和信任锚。我们提出的轻型身份验证协议(LAUP)使用了没有预共享密钥的对称密钥方法,并且由4个进程组成,以在6LoWPAN环境中在传感器和边缘路由器之间建立身份验证和会话密钥分配。每次航班都使用从现有信息(例如PANID(个人局域网标识)和设备身份)中新获得的密钥。我们使用Scyther安全协议验证工具对我们的方案进行了正式验证。我们使用COOJA仿真器对拟议的LAUP协议进行了仿真和评估,从而节省了计算时间,降低了功耗与现有的身份验证协议(例如EAKES6Lo和SAKES)相比。使用实时测试平台评估了LAUP,并减少了计算时间,这支持了我们的模拟结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号