Next Article in Journal
Neuron Stimulation Device Integrated with Silicon Nanowire-Based Photodetection Circuit on a Flexible Substrate
Next Article in Special Issue
Adjustable Trajectory Design Based on Node Density for Mobile Sink in WSNs
Previous Article in Journal
Recent Progress in Electrochemical Biosensors for Glycoproteins
Previous Article in Special Issue
Market Model for Resource Allocation in Emerging Sensor Networks with Reinforcement Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments

1
Department of Computer Science and Engineering, Soongsil University, Seoul 07027, Korea
2
Faculty of Computer Engineering, Keimyung University, Daegu 42601, Korea
3
Department of Computer Science and Engineering, Seoul National University of Science and Technology, Seoul 01811, Korea
*
Authors to whom correspondence should be addressed.
Sensors 2016, 16(12), 2044; https://doi.org/10.3390/s16122044
Submission received: 26 September 2016 / Revised: 27 November 2016 / Accepted: 28 November 2016 / Published: 1 December 2016
(This article belongs to the Special Issue Topology Control in Emerging Sensor Networks)

Abstract

:
The Internet of Things (IoT) is the intelligent technologies and services that mutually communicate information between humans and devices or between Internet-based devices. In IoT environments, various device information is collected from the user for intelligent technologies and services that control the devices. Recently, wireless sensor networks based on IoT environments are being used in sectors as diverse as medicine, the military, and commerce. Specifically, sensor techniques that collect relevant area data via mini-sensors after distributing smart dust in inaccessible areas like forests or military zones have been embraced as the future of information technology. IoT environments that utilize smart dust are composed of the sensor nodes that detect data using wireless sensors and transmit the detected data to middle nodes. Currently, since the sensors used in these environments are composed of mini-hardware, they have limited memory, processing power, and energy, and a variety of research that aims to make the best use of these limited resources is progressing. This paper proposes a method to utilize these resources while considering energy efficiency, and suggests lightweight mutual verification and key exchange methods based on a hash function that has no restrictions on operation quantity, velocity, and storage space. This study verifies the security and energy efficiency of this method through security analysis and function evaluation, comparing with existing approaches. The proposed method has great value in its applicability as a lightweight security technology for IoT environments.

1. Introduction

The technological paradigm that seeks to converge people, devices, communications, and data has evolved through the Internet of Things (IoT), Wireless Sensor Networks (WSNs), Ubiquitous Sensor Networks (USNs), Machine to Machine (M2M), and the Internet of Everything (IoE), and has most recently been established as Cyber Physical Systems (CPSs) [1]. These technologies are generally referred to as the IoT, and they use wireless communications technology to connect people with devices and devices with each other to provide smart technologies and services [2].
The various devices in the IoT environment process significant information; the IoT environment can analyze various aspects of the environment, economy, or infrastructure, and allocate devises depending on these results. Allocated devices can sense and process simple environmental information (such as temperature and humidity) or personal information (such as an individual’s location). In the case of processing simple environmental information, service quality is often prioritized over security, for the sake of efficiency [3,4]. However, even if the device only processes environmental information, services that involve smart energy or smart vehicles can be closely related to public and personal security [5,6].
As such, IoT devices must have security technology applied while accounting for the damage that could result from an intrusion, the device’s hardware functionality, the environment and infrastructure, and the type and importance of the information being processed. Many factors must be considered in IoT security environments, not limited to the characteristics of device communication in which data are transmitted through nearby nodes, the anticipation that more than 18 billion such devices will be in use by the year 2018, the vulnerabilities of existing security algorithms, the limits of security functions as defined in standard documents, and known vulnerabilities of authentication algorithms [7,8,9]. Thus, this study considers energy efficiency to make the best use of limited resources and suggests a lightweight mutual verification and key exchange method based on a hash function that has no restrictions on operation quantity, velocity, and storage space [10].

2. Related Work

2.1. Internet of Things

Internet-based intelligent device communication technologies provide mutual connection networks between heterogeneous smart devices, including mini-sensors. Thus, environmental characteristics, such as the power of the sensor and computer, memory storage space, battery capacity, and communication bandwidth should be considered in IoT environments. Lightweight Implementation Guidance (LWIG), from the Internet Engineering Task Force (IETF) standardization organization, classifies IoT devices from 0 to 2 based on resource restrictions [11]. Class 0 devices have less than 10 KiB memory, including super lightweight devices with 100 KiB of maximum load code capacity. Therefore, Class 0 devices, as designated by LWIG, should use access technologies such as IEEE 802.15.4 or Low Power, which is categorized as a Low Power Lossy Network (LLN), considering their cost and efficiency [12]. Heterogeneous devices, such as sensors or smart devices, that have different functions are being used in building automation, environment monitoring, energy management, and military purposes through network communication; technologies such as mutual verification between devices, message sending verification, and information confidentiality that compose the IoT environment should be provided. The current IETF CORE group is standardizing the Constrained Application Protocol (CoAP) for IoT environment [13,14], which applies security protocols used in existing Internet environments, such as Datagram Transport Layer Security (DTLS) and HIP, to provide secure services in resource-limited environments [15].
However, these systems are still flawed: in the case of DTLS, since the total six-message packet that is sent has the fate-sharing characteristic, the whole message should be re-sent if a packet is missing. Resending message packets can lead to network overload and the degradation of limited devices like mini-sensors [16]. Although security standardization is progressing for IoT environments, the lightweighting plan of suggested security protocols does not accept all super lightweighted devices in heterogeneous IoT environments [17].

2.2. Smart Dust

Smart dust originated with Kris Pister of the University of California, Berkeley, who developed a 1–2 mm mini-sensor. Though these sensors are very tiny (like dust), they possess significant computing ability, an electric power supply, bi-directional wireless communication, and a solar battery [18,19].
A smart dust network is shaped by multiple smart dusts, enabling not only mutual communication but also information collection. Management of areas such as military zones or inaccessible forested areas is a driving force in smart dust development. Although equipment such as unmanned surveillance drones and artificial satellites are currently used for surveillance, they risk exposure and their capacity for real-time information collection is limited [20,21]. Smart dust overcomes the limitation of their capacity by deploying sensor nodes to a variety of environments and collecting the real-time information as shown in Figure 1. dust-sized surveillance equipment distributed to necessary zones makes real-time information collection possible, which enables natural communication without environmental limitations. This equipment can also be tracked by recognizing its precise location and timing information.
Like smart dust, the Internet was initially designed to serve military purposes; as the Internet’s sphere of application has been extended to daily life, the applications of smart dust are also evolving. Intel and UC Berkeley built a wireless network using smart dust that remotely monitors the condition of sea swallows. The technology is also being used in to prevent cold-weather damage of crops, make ecological observations in inaccessible areas, measure biochemical pollution, prevent forest fires, observe the weather and earthquakes, detect the movement of troops and equipment, and manage distribution. For example, smart dust that prevents crop damage from cold weather may collect soil information in real time by planting smart dust in the soil. In the Telecommunication Engineering laboratory of Twente University in the Netherlands, smart dust distributed in mountains form a wireless network that is used to conduct smart dust research with real-time information delivery to a monitoring center [22].
Potential applications of smart dust are inexhaustible; although the technology is currently highly utilized, its use is expected to spread as it is combined with a variety of additional technologies [23].

2.3. Previous Sensor Technologies

2.3.1. Blundo Scheme

The Blundo protocol [24] is a method in which each node in a network generates a common key in a group environment that has t nodes. First, it selects a symmetric polynomial that is P(x_1, , x_t) with degree k on t variable units at the server, and gives each member a symmetric polynomial, f(x_1, , x_t). f(i) is substitute i for x in P(x_1, , x_t). User_(ji), , User_jt (members who received the polynomial) calculate with their IDs to obtain s_(ji, , jt) which is identical in value to P(j_1, , j_t). Although this method is secure as long as t member units are not attacked, many calculations are demanded of each node in the sensor network.

2.3.2. Blom Scheme

If a and b want to communicate, each first changes the selected row vector from its matrix and multiplies the opponent’s row vector by its line vector. When we call matrix K GT × D × G, a gains matrix Ks (j, i) entry and b gains the (j, i) entry from the above calculation. Since K is a symmetric matrix, both entries have the same value; thus, a shared key between nodes a and b may be found. In this method, if the number of damaged nodes is less than λ, security provides assured; however, if the number more than λ nodes are damaged, all secure information can be exposed. This limitation of the Blom method is called λ-security [25].

2.3.3. PCGR

In of the method described by Zhang [26], key information is pre-distributed and group key is regenerated through cooperation between the nodes. This technique prevents the group key that will be generated next from being known in case a group-key-making node is attacked. In Figure 2, the group key is generated through g(x); as it generates e(x, y), it encrypts g(x) as follows. After encryption are transmitted by the form, e(x, y), e_u (x, v_i), to around nodes as shown in Figure 3, while g’(x) owned by it self is not deleted, g(x) and e(x) are deleted. When the key is renewed, the time managed by each node is used, and when time is expired, pieces that each node requires for renewal are sent, as in Figure 4. Nodes that sent pieces get t + 1 of e_u (c, v_i) pieces returned from the node and the group key is renewed with the following calculation. Here, c points out the group key version using count value.
Even if nodes are attacked, the next group key is not revealed, through the node that received the group key with the general node’s calculations cannot prove whether the group key is correct.

2.3.4. SLIMCAST

Huang suggested the technique of re-encrypting data in a gradational key structure to provide data confidentiality at each hop-by-hop pass [27]. A clustered group is divided into routing trees and encrypts communication between the nodes with the key at the same level; the key is renewed when a node enters or leaves the network. In the active leaving case, a node directly informs the cluster header of its departure. In the passive leaving case, nodes are removed without informing the cluster header because of hardware problems or physical damage. Finally, in the case of deleting malicious nodes, nodes with abnormal behavior are detected by the base station, which informs the cluster header to remove the node from the group. SLIMCAST has good overhead and energy efficiency, but its working speed decreases if many nodes are changed.

2.4. Previous Crypto Technology

The RSA algorithm, which is widely used for the safe distribution of encryption keys and other key management problems, is an encryption method based on the theory that generally, multiplying two prime numbers with a large difference between them is easy, but factoring the two numbers once multiplied is difficult [28]. However, the algorithm places a large operational demand on devices during the encryption and decoding processes; if it were applied in IoT environments, the network may become overloaded.
Elliptic curve cryptosystems (ECCs), based on the discrete logarithm in the elliptic curve group defined in finite fields, is a public key encryption algorithm suggested independently by Miller and Koblitz in 1985. It has been studied in number theory and algebraic geometry for over 150 years. In recent encryption research, the elliptic curve method (ECM) has been utilized in factorization problems, primality tests, and public key encryption, which are crucial for RSA encryption [29].
Currently, public key encryption utilizes intractability; that is, the calculation is possible, but takes significant time to calculate, according to computational complexity theory. The early stages of public key encryption are based on prime factorization with random positive integers, which requires significant time to perform. Elliptic curve encryption relies on the long time needed to find the discrete log of a random elliptic curve at a specific known point. For encryption purposes, an elliptic curve is a type of plane curve and is the set of points that meet the equation y2 = x3 + ax + b. (To simplify the curve, the point characteristics are fixed finite fields). The above set forms the Avenlan group, having the infinite point as the identity element together with the computation of the elliptic curve group. The structure of the group follows the factor of the underlying algebraic variety [30,31].
Kerberos authentication is composed of a Kerberos server, ticket, and authenticator. After the Kerberos server and Ticket Granting Server (TGS) generate a ticket, the ticket is used in communication between the client and TGS, and between TGS and the server. The authenticator is generated by the client, can be used only once and includes the client name, workstation IP address, and the current time as authentication information [32]. When the client request a login to request a server access ticket, and authentication is completed by transmitting the required information, the ticket is generated and sent to the client; then it verifies whether the client is authorized from the server. The user saves the ticket and accesses TGS using this ticket when requesting access to the service. To prevent ticket interception, it includes the ticket issuance time and valid time. The AS verifies the ID by providing the session key between client and TGS and between client and server, and prevents the risk of intercept by limiting the valid time [33]. Despite this, intercept and replay attacks are possible using the weak point in that time. Although user authentication is realized by issuing the ticket, a digital signature is not provided. In addition, due to security problems in the Kerberos server, it should be constructed with perfect confidence between client and server, as well as between servers. That is, it should be used with encryption technology such as SSL [34] or Diffie-Hellman [35], though these can cause network overloading when applied to IoT environments [36].

3. Proposed Scheme

In the suggested method, while routing protocol motion is based on the LEACH routing protocol [37], a lightweight protocol for existing sensor network environments, it forms a group using energy information for greater efficiency. The suggested IoT environment has the following characteristics: every sensor node in the specific area can transmit to the sync node in one hop; sensors give the intensity of received power and changes in transmission power are possible; and sensor nodes regularly transmit data to the base station.
For the battery life, each sensor periodically selects a random Middle Node (MN) and forms a group through it. After the sensor nodes belonging to the specific group collect data to transmit to MN, MN aggregates this information and transmits it to MD. At this time, MN consumes relatively more energy compared to other nodes and may negatively influence the whole network if specific nodes become overloaded. Thus, after a specified time period, MN is selected in order to distribute its energy consumption by round.
At this time, to consider the energy efficiency of sensor nodes, nodes belonging to each group transmit their energy quantity and MN aggregates this information and transmits it to MD. MD selects the top 30% nodes that do not play a role in MN through a probability algorithm, as follows:
P i ( x ) = K o p t N K o p t ( r   m o d   N K o p t ) C i ( t ) = 0   o r   1
where i represents each sensor and has a value ranging from 1 to the total number of sensors, N; t is time; Pi(t) is the probability of selecting i as MN at t; r represents the round; Kopt is the number of rounds that ends at Group of Round; and Ci(t) represents either 0 or 1, according to whether it was selected as MN before t. One round is performed from when a new cluster is formed to when the new cluster is expired. When all nodes have each cluster head, the nodes can be eligible to become cluster heads, which state is defined as Group of Round. As the round progresses, since the number of sensors participating in MN selection decreases, the probability of becoming MN increases. At this point, the probability of becoming MN is Kopt.
The sensor that calculated Pi(t) will pick a p value between 0 and 1; if p < Pi(t), it selects itself as MN. If p > Pi(t), the node will be used for forming a cluster. If the current node became MN at Group-of-Round, Pi(t) = 0, so it is impossible to become MN until a new round begins. In the final round, Pi(t) = 1, so nodes that never have been MN are selected as MN. The parameters for the proposed protocol are described in Table 1.

3.1. Initial Authentication Process

Figure 5 shows Initial Authentication Process and Smart Device Registration. The gateway that controls the home network of a specific area constantly sends advertisement messages. Smart nodes that are newly registered in the network system send join messages in response to these advertisement messages; the gateway verifies smart nodes through CA. When verification is completed, a smart device carries out mutual verification and key exchange as follows [38].
Step 1.
The smart node that received an advertisement message generates M0 and H0 for self-verification and sends them to the gateway.
Step 2.
The gateway that received M0 and H0 generates M1 and H1 and sends them to the CA manufacturer.
Step 3.
The CA that received information from the gateway obtains two random numbers through decoding and verifies H0 and H1 through searched PW. It generates M2 and M3 and sends them to the gateway.
Step 4.
The gateway that received M2 and M2 gains R1 from decoding M3 and checks for any error in the received value through a hash function. It saves 3 × n-bit information generated by two random numbers for verification and then sends M2 to the smart node.
Step 5.
The smart node that received M2 gains R2 and verifies the sent value through a hash function. If the verification is finished, the node saves 3 × n-bit information, as above.
Step 6.
The smart node generates random number C1 to perform the verification step and sends it by bit. At this point, the time check for preventing relay attacks begins.
Step 7.
The gateway that received bits from the smart node sends the ith bit of R0 if C1 = 0 in response, and sends the ith bit of R1 to the smart node if the response is 1.
Step 8.
The smart node generates Ricn based on the c sent to the gateway and compares it to Ricn, which is the gathered value of the cluster head’s response to verify whether the data was sent from the correct node. After “time off,” it guesses the distance through time measurement and stops communication if this is greater than a specified time.
Step 9.
The smart node that verified the gateway sends the received Ricn values using the f() function to the gateway.
Step 10.
The smart node that received a certification value from the gateway generates a certification value in same way and compares it to the value received from the cluster head to verify the smart node.
Step 11.
The smart node and the gateway generate a session key using the left n bit and a random number from the 3 × n-bits and ends the verification.

3.2. Smart Device Registration

Step 1.
A user who tries to control the smart node through a smart device generates a random number and M4 and Hs, and then sends M4, IDsd, Hs, and TS to the gateway.
Step 2.
The gateway that received this decodes M4 and verifies Hs. After that, it searches the session key with the smart nodes and sends the encrypted Rs and IDs.
Step 3.
The smart node generates session keys through Rs; after it generates R3, it sends the encrypted session key with the gateway. The gateway sends them through the key with the smart node after decoding.
Step 4.
The smart device generates a session key with two random numbers and ends the procedure after verifying them through the certification value that uses the smart node and serial number.

3.3. Smart Device Key Updating Process

Step 1.
After completing certification sensor group formation and session key distribution, the sensor node carries out the group key distribution and renewal process as follows. Using the polynomial distribution of PCGR, it makes MN do most of the calculation, distributes pieces of the specific value through the f(y) function, and verifies whether the node is contaminated or needs to be withdrawn.
Step 2.
The group’s representative node, MN, defines and generates polynomials g(x) and f(y) for group distribution and node verification. After that, it generates verification values S and Dn. Next, it generates P1 for transmitting to nodes and deletes g(x) and e(x) to prevent them from being exposed by an attacker.
Step 3.
The sensor node that received P1 decodes this, and obtains the group key and secret piece. It then informs MN that the group key was successfully received.
Step 4.
After a certain period of time, MN transmits a message for updating the group key to the nodes within the group. Nodes that receive the key-update message send MN an encrypted secret piece with the session key in response, and MN checks the validity of the received value through a Lagrangian polynomial and sends a “success” message. If the value differs, it informs specific nodes of contamination.
Step 5.
Nodes that received the message from MN send nodes around Pn for updating the key through Equation (2):
g ( c ) = g ( c ) + e u ( c ,   N id )
Step 6.
After the key is updated, it finishes the verification process with nodes through the group key. The whole process of Smart Device Key Updating is shown in Figure 6.

4. Performance Evaluation

4.1. Securiy Analysis

4.1.1. Mutual Authentication

This paper uses random numbers generated by the smart nodes and gateways when bits are exchanged to generate Ri°, Ri° and Ri°, Ri°, which are promised as responses to the random value c, making mutual authentication possible. In addition, for the registration of smart devices, authentication is possible through the authenticated gateway.

4.1.2. Replay and Relay Attacks

This is a method of attack in which a message is stolen by an unauthenticated attacker while the message is sent to each node. When the message is reused, a newly generated session key and not the session key that occurred during the steal, sk = Ri°n1 and f(Rs1, Rs2), is used. This makes it secure against attacks where previous messages are reused. For each message, time stamps are generally applied. Verification is possible through the completion of the message time. Through the bit exchange process, it can be judged whether each node is physically close, making it secure against relay attacks.

4.1.3. Message Manipulation Attacks

This is an attack in which an unauthenticated attacker steals the message transmitted to each node and makes it a counterfeit message to meet the goal of the attacker. In this case, too, a newly generated session key and not the session key that had been generated at the time the message was sent, sk = Ri°n1 and f(Rs1, Rs2), is used. This makes it secure against counterfeit message attacks.

4.1.4. Snooping

This is an attack method in which the transmitted message is snooped. Since it uses f(Rs1, Rs2) between the smart device and smart node, which is constantly updated, even if message snooping is attempted, only the encrypted phrase can be seen.

4.1.5. Spoofing

This is an attack in which network identification information is changed to deceive another party using previously authenticated nodes. Even if there is a spoofing attack, a session cannot be established through a third party, making the network secure against such attacks.

4.1.6. Side Channel Attack

This is an attack in which side elements such as processing time, energy usage, or electronic waves are used. Regardless of the length of the data transmitted, the same size message is sent, making it secure against side channel attacks.

4.1.7. Forward Security and Error Detection

The sensor nodes MN and GW know where the bit that is generated through the bit stream calculation is located among the transmitted 2 bits. Through this, even if one bit is incorrectly located, error detection is possible and forward security can be achieved.

4.2. Overhead Analysys

Blundo’s protocol, which is the sensing security technique in existing sensor networks, differs depending on the number of nodes in the network; if the number of nodes is N, polynomial expression with (N − 1) variables of degree t are calculated. Each sensor node should save the polynomial expression of length N(t + 1)L in the server, requiring N messages. That is, Blundo’s Protocol can be secured unless t members are attacked, but it can overload the network, as each node performs significant calculation for an IoT environment in which numerous sensors exist. Blundo’s protocol provides good security when the number of damaged nodes is less than λ; if the number of damaged nodes is greater than λ, all secure information is exposed to danger. In the case of the PCGR technique, information to be saved and calculations required vary depending on the surrounding nodes generated the group key. Assuming that the number of surrounding nodes is n and the probability that the surrounding nodes generate the group key is Pro(d), it has a polynomial expression of the group key encrypted with (t + 1)L-bit length and bit information of n(t + 1)L, which is partial information of the surrounding nodes. In addition, for the message, aside from n messages, Pro(d) × n2 additional messages are needed. That is, for PCGR, if the cluster header, which distributes the group key within the group, is increased, energy consumption increases drastically. The more the nodes within the group increase, the more the average energy consumption is increased as well. In the suggested scheme, through the exchange in small bit units and hash function-based operation, few calculations are required within the group.

4.3. Analysis of Energy Eefficiency

The following simulation was performed using the MATLAB program in order to analyze the efficiency through the measurement of time efficiency for each IoT device for proposed protocol and the previous encryption technology.
Table 2 is the initial setting value for performing the simulation and the time for simulation was set considering the amount of node energy. For simulation, the time efficiency was measured according to the increase in IoT devices by setting a total of 10~200 nodes, and the test was performed by configuring an independent environment for each encryption technology and the proposed scheme.
The sensor nodes were distributed randomly in a 20 m × 20 m area regardless of the number of nodes. The gate was assigned in a specific position considering the placement area.
According to the placement, the distance between all sensor nodes and gateway remained between 25 m and 10 m. Each round was set to last for 20 s.
Figure 7 and Figure 8 show the simulation result after the environment was configured as shown in Table 2. Simulation results have shown that in the case of the proposed scheme, the operation being performed in the device was relying on simple hash operation and arithmetic operation with less operation consumption time compared to other authentication techniques.
In addition, in the case of group key distribution and renewal process, all polynomial operation was performed by the server, thereby reducing the burden of the device and providing a lightweight characteristic compared to other authentication techniques.

5. Conclusions

The proposed scheme uses simple hash calculations to support devices with hardware limitations, and suggested certification protocols to focus on specific nodes for complex calculations. We consider a routing protocol plan in existing sensor network environments for the commercialization of certification protocols that was designed to accept super-lightweight devices that cannot equip encrypted modules in a heterogeneous IoT environment, a limitation of existing IoT environments.
Recently, research related to efficient lightweight certification and key management approaches such as Danyang’s Protocol [39] and Thaier’s approach [40] has been introduced. However, given that WSN environments are extended to the concepts of the IoT, there is a limitation in that the security requirements and environmental elements defined in IoT standards are not satisfied. The proposed scheme designs the protocols considering not only the environmental elements of OneM2M but also the environmental elements of smart dust where the smart dust is expected to be one of the major technologies.
We confirmed through performance analysis that our certification framework is more lightweight than renowned security certification techniques, and largely improved in security and energy efficiency with less energy consumption compared to existing certification techniques. Security comparison analysis shows that the method meets every security requirement defined by the OneM2M standard. Thus, as the lightweight certification and key management scheme in the suggested IoT environments meets the OneM2M international security standards, we confirm that it is superior to existing security techniques.
Due to the hardware limitations of subminiature devices, continuous group renewal may efficiently deal with addition and withdrawal of new nodes. As its security was verified, the proposed method is applicable for various environments in which a variety of devices, including simple subminiature sensors, are used; it is also expected to be practical for IoT environments.

Acknowledgments

This research was supported by the Bisa Research Grant of Keimyung University in 2016.

Author Contributions

Jaeseung Lee: Research for the related works, drafting the article, and acquisition of data. Yunsick Sung: Research for analyzing the proposed model, analyzing the experiments and reviewing the proposed model. Jong Hyuk Park: Research for analyzing the proposed model, analyzing the experiments and hrevising the proposed model.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
IoTInternet of Things
WSNWireless Sensor Network
USNUbiquitous Sensor Network
M2MMachine to Machine
IoEInternet of Everything
CPSCyber Physical Systems
LWIGLight-Weight Implementation Guidance
IETFInternet Engineering Task Force
LLNLow Power Lossy Network
CoAPConstrained Application Protocol
DTLSDatagram Transport Layer Security
ECCElliptic Curve Cryptosystem
ECMElliptic Curve Method

References

  1. Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013, 29, 1645–1660. [Google Scholar] [CrossRef]
  2. Jun, Z.; Simplot-Ryl, D.; Bisdikian, C.; Mouftah, H.T. The internet of things. IEEE Commun. Mag. 2011, 49, 30–31. [Google Scholar]
  3. Qian, Z.; Wang, Y. IoT technology and application. Acta Electron. Sin. 2012, 40, 1023–1028. [Google Scholar]
  4. Peng, K. A secure network for mobile wireless service. J. Inf. Process. Syst. 2013, 9, 247–258. [Google Scholar] [CrossRef]
  5. Kim, H.W.; Kim, D.K. IoT technology and security. Korea Inst. Inf. Secur. Cryptol. 2012, 22, 7–13. [Google Scholar]
  6. Chang, C.C.; Le, H.D. A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans. Wirel. Commun. 2016, 15, 357–366. [Google Scholar] [CrossRef]
  7. Bayram, I.S.; Papapanagiotou, I. A survey on communication technologies and requirements for internet of electric vehicles. EURASIP J. Wirel. Commun. Netw. 2014, 2014, 223. [Google Scholar] [CrossRef]
  8. Cheng, H.; Su, Z.; Xiong, N.; Xiao, Y. Energy-efficient node scheduling algorithms for wireless sensor networks using Markov Random Field model. Inf. Sci. 2016, 329, 461–477. [Google Scholar] [CrossRef]
  9. Zhang, H.; Zhu, L. Internet of Things: Key technology, architecture and challenging problems. In Proceedings of the 2011 IEEE International Conference on Computer Science and Automation Engineering (CSAE), Shanghai, China, 10–12 June 2011; Volume 4, pp. 507–512.
  10. Ko, J.; Hong, S.; Lee, B.B.; Kim, N.S. Trends of converging smart devices with IoT technology. Electron. Telecommun. Trends 2013, 28, 79–85. [Google Scholar]
  11. Ishaq, I.; Carels, D.; Teklemariam, G.K.; Hoebeke, J.; Abeele, F.V.D.; Poorter, E.D.; Demeester, P. IETF standardization in the field of the internet of things (IoT): A survey. J. Sens. Actuator Netw. 2013, 2, 235–287. [Google Scholar] [CrossRef] [Green Version]
  12. Molisch, A.F.; Balakrishnan, K.; Chong, C.C.; Emami, S.; Fort, A.; Karedal, J.; Siwiak, K. IEEE 802.15. 4a Channel Model-Final Report. Available online: http://www.ieee802.org/15/pub/04/15-04-0662-02-004a-channel-model-final-report-r1.pdf (accessed on 1 September 2016).
  13. Bormann, C.; Castellani, A.P.; Shelby, Z. Coap: An application protocol for billions of tiny internet nodes. IEEE Internet Comput. 2012, 16, 62. [Google Scholar] [CrossRef]
  14. Kovatsch, M.; Duquennoy, S.; Dunkels, A. A low-power CoAP for Contiki. In Proceedings of the 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, Valencia, Spain, 17–22 October 2011; pp. 855–860.
  15. Raza, S.; Trabalza, D.; Voigt, T. 6LoWPAN compressed DTLS for CoAP. In Proceedings of the 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems, Hangzhou, China, 18–20 May 2012; pp. 287–289.
  16. Kothmayr, T.; Schmitt, C.; Hu, W.; Brünig, M.; Carle, G. A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication. In Proceedings of the 2012 IEEE 37th Conference on Local Computer Networks Workshops (LCN Workshops), Clearwater, FL, USA, 22–25 October 2012; pp. 956–963.
  17. Bandyopadhyay, S.; Bhattacharyya, A. Lightweight Internet protocols for web enablement of sensors using constrained gateway devices. In Proceedings of the IEEE 2013 International Conference on Computing, Networking and Communications (ICNC), San Diego, CA, USA, 28–31 January 2013; pp. 334–340.
  18. Kahn, J.M.; Katz, R.H.; Pister, K.S. Next century challenges: Mobile networking for “Smart Dust”. In Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, Seattle, WA, USA, 15–19 August 1999; pp. 271–278.
  19. Vermesan, O.; Friess, P. Internet of Things-Global Technological and Societal Trends from Smart Environments and Spaces to Green ICT; River Publishers: Delft, The Netherlands, 2011. [Google Scholar]
  20. Warneke, B.; Last, M.; Liebowitz, B.; Pister, K.S. Smart dust: Communicating with a cubic-millimeter computer. Computer 2011, 34, 44–51. [Google Scholar] [CrossRef]
  21. Madakam, S. Internet of Things: Smart Things. Int. J. Future Comput. Commun. 2015, 4, 250. [Google Scholar] [CrossRef]
  22. Chi, Q.; Yan, H.; Zhang, C.; Pang, Z.; Da Xu, L. A reconfigurable smart sensor interface for industrial WSN in IoT environment. IEEE Trans. Ind. Inf. 2014, 10, 1417–1425. [Google Scholar]
  23. Perera, C.; Zaslavsky, A.; Christen, P.; Georgakopoulos, D. Sensing as a service model for smart cities supported by internet of things. Trans. Emerg. Telecommun. Technol. 2014, 25, 81–93. [Google Scholar] [CrossRef]
  24. Blundo, C.; De Santis, A.; Herzberg, A.; Kutten, S.; Vaccaro, U.; Yung, M. Perfectly secure key distribution for dynamic conferences. Inf. Comput. 1998, 146, 1–23. [Google Scholar] [CrossRef]
  25. Blom, R. An optimal class of symmetric key generation systems. In Workshop on the Theory and Application of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 1984; pp. 335–338. [Google Scholar]
  26. Zhang, W.; Zhu, S.; Cao, G. Predistribution and local collaboration-based group rekeying for wireless sensor networks. Ad Hoc Netw. 2009, 7, 1229–1242. [Google Scholar] [CrossRef]
  27. Huang, J.H.; Buckingham, J.; Han, R. A Level Key Infrastructure for Secure and Efficient Group Communication in Wireless Sensor Network. In Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Berlin, Germany, 30 May–1 June 2005; pp. 249–260.
  28. Barrett, P. Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor. In Conference on the Theory and Application of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 1986; pp. 311–323. [Google Scholar]
  29. Koblitz, N. Elliptic curve cryptosystems. Math. Comput. 1987, 48, 203–209. [Google Scholar] [CrossRef]
  30. Liang, X.Q.; Da Xing, L.I. Elliptic Curve Cryptosystems. Available online: http://en.cnki.com.cn/Article_en/CJFDTOTAL-JFYZ199911000.htm (accessed on 1 September 2016).
  31. Saeki, M. Elliptic Curve Cryptosystems. Ph.D. Thesis, McGill University, Montreal, QC, Canada, 1997. [Google Scholar]
  32. Neuman, B.C.; Ts’o, T. Kerberos: An authentication service for computer networks. IEEE Commun. Mag. 1994, 32, 33–38. [Google Scholar] [CrossRef]
  33. Downnard, I. Public-key cryptography extensions into Kerberos. IEEE Potentials 2002, 21, 30–34. [Google Scholar] [CrossRef]
  34. Elgamal, T.; Hickman, K.E. Secure Socket Layer Application Program Apparatus and Method. U.S. Patent 5,657,390, 12 August 1997. [Google Scholar]
  35. Boneh, D. The decision diffie-hellman problem. In International Algorithmic Number Theory Symposium; Springer: Berlin/Heidelberg, Germany, 1998; pp. 48–63. [Google Scholar]
  36. Kocher, P.C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Annual International Cryptology Conference; Springer: Berlin/Heidelberg, Germany, 1996; pp. 104–113. [Google Scholar]
  37. Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 4–7 January 2000.
  38. Lee, J.S.; Lee, A.; Jun, M.S. Sensor Authentication and Key Exchange Protocol for Energy Efficiency in Sensor Network Environment. In Proceedings of the 2016 World Congress on Information Technology Applications and Services, Jeju, Korea, 17 February 2016.
  39. Qin, D.; Jia, S.; Yang, S.; Wang, E.; Ding, Q. A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks. J. Sens. 2016. [Google Scholar] [CrossRef]
  40. Hayajneh, T.; Mohd, B.J.; Imran, M.; Almashaqbeh, G.; Vasilakos, A.V. Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks. Sensors 2016, 16, 424. [Google Scholar] [CrossRef] [PubMed]
Figure 1. Smart dust utilization.
Figure 1. Smart dust utilization.
Sensors 16 02044 g001
Figure 2. Group key generation and encryption.
Figure 2. Group key generation and encryption.
Sensors 16 02044 g002
Figure 3. Group key distribution.
Figure 3. Group key distribution.
Sensors 16 02044 g003
Figure 4. Group key update method.
Figure 4. Group key update method.
Sensors 16 02044 g004
Figure 5. Initial authentication and device registration process.
Figure 5. Initial authentication and device registration process.
Sensors 16 02044 g005
Figure 6. Group key updating process.
Figure 6. Group key updating process.
Sensors 16 02044 g006
Figure 7. Analysis of authentication time—client.
Figure 7. Analysis of authentication time—client.
Sensors 16 02044 g007
Figure 8. Analysis of authentication time—server.
Figure 8. Analysis of authentication time—server.
Sensors 16 02044 g008
Table 1. Proposed protocol parameters.
Table 1. Proposed protocol parameters.
NotationMeaning
Nv, NpNonce
MNMiddle Node
CACertificate Authority
IDNode ID
CidMiddle Node ID
Ri°, Ri1, Ri23n Bit Divided Value
SkSession Key
Nkf() Function Shared Key
NiAfter distance bounding remaining bits
CiRandom bit
g(x)Group Key Polynomial
e(x, y)Group Key Encryption Polynomial
g’(x)Encrypted Polynomial to e(x, y)
E(), D()Encryption, Decryption
Table 2. Initial simulation setup table.
Table 2. Initial simulation setup table.
Initial Set Value for Simulation
Number of sensor node10~200
Placement area of the sensor20 m × 20 m
Position of the gatewayx = 25 m, y = 10 m
Node initial energy1.0
ETX, ERX25 nanoJ
Eamp50 picoJ
EDC5 nanoJ
Packet size2500 bit
Compressibility0.05

Share and Cite

MDPI and ACS Style

Lee, J.; Sung, Y.; Park, J.H. Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments. Sensors 2016, 16, 2044. https://doi.org/10.3390/s16122044

AMA Style

Lee J, Sung Y, Park JH. Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments. Sensors. 2016; 16(12):2044. https://doi.org/10.3390/s16122044

Chicago/Turabian Style

Lee, Jaeseung, Yunsick Sung, and Jong Hyuk Park. 2016. "Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments" Sensors 16, no. 12: 2044. https://doi.org/10.3390/s16122044

APA Style

Lee, J., Sung, Y., & Park, J. H. (2016). Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments. Sensors, 16(12), 2044. https://doi.org/10.3390/s16122044

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop