Skip to main content
Log in

An Efficient Secure Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN in Unattended Scenarios

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Machine-to-machine (M2M) is an important part of Internet of Things (IoT), and is used to describe those technologies applied in wireless communication automatically between mechanics or electronics instruments. With the rapid development and wide application of the Internet of Things, IETF is assigned to design IPv6 over low power wireless personal area network (6LoWPAN). The address of IPv6 is indefinite, which means it can satisfy addressing requirements for M2M. The 6LoWPAN standard has clarified important issues in M2M, but communication security has not been effectively resolved. In this article, we analyzed the existing security protocol for M2M communication in 6LoWPAN. The analysis result shows that the protocol has the defect of data leakage after the node is captured. In addition, the EAKES6Lo protocol is also vulnerable to sinkhole attacks and plaintext-chosen attacks. Based on the above analysis, an M2M communication mutual authentication protocol based on 6LoWPAN in unattended operation is proposed. The protocol establishes a reasonable secret key distribution mechanism and designs an anti-capture attack detection method for unattended nodes to resist attacks, such as replay attacks, sinkhole attacks, plaintext-chosen attacks, and physical capture attacks. Finally, the security of the protocol is proved by BAN.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Al-Karaki J. N., & Chen, K. -C. (2014). From M2M communications to the Internet of Things: Opportunities and challenges. Ad Hoc Network, 2014, pp. 1–2.

  2. Stojmenovic, I. (2014). Machine-to-machine communications with in-network data aggregation, processing, and actuation for large-scale cyberphysical systems. IEEE Internet Things, 1(2), 122–128.

    Google Scholar 

  3. Kim, J., Lee, J., Kim, J., & Yun, J. (2014). M2M service platforms: Survey, issues, and enabling technologies. IEEE Communications Surveys and Tutorials, 16(1), 61–76.

    Google Scholar 

  4. Catarinucciet, L. (2015). An IoT-aware architecture for smart healthcare systems. IEEE Internet Things, 2(6), 515–526.

    Google Scholar 

  5. Ko, J., Terzis, A., & Dawson-Haggerty, S. (2011). Connecting low-power and lossy networks to the internet. IEEE Communications Magazine, 49(4), 96–101.

    Google Scholar 

  6. IEEE 802. 15. 4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specfications for Low-Rate Wireless Personal Area Networks (LR-WPANs), http://standards.ieee.org/getieee802/download/802.15.4-2003.pdf.

  7. Touati, F., & Mnaouer, A. B. (2016). Feasibility and performance evaluation of a 6LoWPANenabled platform for ubiquitous healthcare monitoring. Wireless Communications and Mobile Computing, 2016, pp. 1271–1281.

  8. Touati, F., Tabish, R., & Mnaouer, A. B. (2013). Towards u-health: an indoor 6LoWPAN based platform for real-time healthcare monitoring. In Proceedings of the 6th IEEE wireless and mobile networking conference (pp. 1–4).

  9. Demirkan, H. (2013). A smart healthcare systems framework. IT Professional, 15(5), 38–45.

    Google Scholar 

  10. Agoulmine, N., & Deen, M. J. (2011). U-health smart home. IEEE Nanotechnology Magazine, 5(3), 6–11.

    Google Scholar 

  11. Misra, S., Goswami, S., & Taneja, C. (2015). PKI adapted model for secure information dissemination in industrial control and automation 6LoWPANs, IEEE Access, 2015, pp. 875–889.

  12. Val, P. B., Valls, M. G., & Cunado, M. B. (2014). A simple data-muling protocol. IEEE Transactions on Industrial Informatics, 10(2), 895–902.

    Google Scholar 

  13. Goswami, S., Misra, S., & Taneja, C. (2014). Securing intra-communication in 6LoWPAN: A PKI Integrated Scheme. In Proceedings of the advanced networks and telecommuncations systems, 2014, pp. 14–17.

  14. Kasinathan, P., Pastrone, C., Spirito, M. A., & Vinkovits, M. (2013). Denial-ofservice detection in 6LoWPAN based Internet of Things. In Proceedings IEEE 9th international conference on wireless and mobile computing, Networking and Communications. 2013, pp. 600–607.

  15. Cervantes, C., Poplade, D., & Nogueira, M. (2015). Detection of Sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In Proceedings of the integrated network management, 2015, pp.11–15.

  16. Raza, S., Duquennoy, S., & Höglund, J. (2015). Secure communication for the Internet of Things a comparison of link-layer security and IPsec for 6LoWPAN. Security & Communication Networks, 7(12), 2654–2668.

    Google Scholar 

  17. H. R. Hussen, G. A. Tizazu, T. Miao, L. Taekkyeun, C. Youngjun, and K. Ki-Hyung, SAKES: Secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6LoWPAN). in Proceedings of the international conference on ubiquitous and future networks, 2013, pp. 246–251.

  18. Chen, S. & Ma, M. (2013). A dynamic-encryption authentication scheme for M2M security in cyber-physical systems. In Proceedings of the 2013 IEEE global communications conference, 2013, pp. 2897–2901.

  19. Fu, A., Zhang, Y., Zhu, Z., Jing, Q., & Feng, J. (2012). An efficient handover authentication scheme with privacy preservation for IEEE 802. 16 m network. Computers & Security, 2012, pp. 741–749.

  20. Zhang, X., Li, G., & Han, W. (2015). Ticket-based authentication for fast handover in wireless mesh networks. Wireless Personal Communications, 85(3), 1509–1523.

    Google Scholar 

  21. Qiu, Y., & Ma, M. (2016). A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks. IEEE Transactions on Industrial Informatics, 12(6), 2074–2085.

    Google Scholar 

  22. Muhammad, T., & Ghulam, A. (2020). S6AE: Securing 6LoWPAN using authenticated encryption scheme. Sensors, 20(9), 1–23.

    Google Scholar 

  23. Verma, A., & Ranga, V. (2020). Mitigation of DIS flooding attacks in RPL based 6LoWPAN networks. Transactions on emerging telecommunications technologies, 2020, 31(2).

  24. Baskaran, A. G., Nanda, P., & Nepal, S. (2019). Testbed evaluation of Lightweight Authentication Protocol (LAUP) for 6LoWPAN wireless sensor networks. Concurrency and Computation: Practice and Experience, 2019, 31(23).

  25. Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., McCann, J. A., & Kin, L. (2013). A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities. IEEE Wireless Communications, 20(6), 91–98.

    Google Scholar 

  26. Park, S., Kim, K., Haddad, W., Chakrabarti, S., & Laganier, J. (2011). IPv6 over low power WPAN security analysis. IETF Internet Draft Draft-6lowpanSecurity-Analysis-05, 2011.

Download references

Acknowledgements

This work was partially supported by the nature fund of Liaoning province under Grant No. 2019-ZD-0243.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lu Zhang.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gao, L., Zhang, L., Feng, L. et al. An Efficient Secure Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN in Unattended Scenarios. Wireless Pers Commun 115, 1603–1621 (2020). https://doi.org/10.1007/s11277-020-07645-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07645-z

Keywords

Navigation