Abstract
Machine-to-machine (M2M) is an important part of Internet of Things (IoT), and is used to describe those technologies applied in wireless communication automatically between mechanics or electronics instruments. With the rapid development and wide application of the Internet of Things, IETF is assigned to design IPv6 over low power wireless personal area network (6LoWPAN). The address of IPv6 is indefinite, which means it can satisfy addressing requirements for M2M. The 6LoWPAN standard has clarified important issues in M2M, but communication security has not been effectively resolved. In this article, we analyzed the existing security protocol for M2M communication in 6LoWPAN. The analysis result shows that the protocol has the defect of data leakage after the node is captured. In addition, the EAKES6Lo protocol is also vulnerable to sinkhole attacks and plaintext-chosen attacks. Based on the above analysis, an M2M communication mutual authentication protocol based on 6LoWPAN in unattended operation is proposed. The protocol establishes a reasonable secret key distribution mechanism and designs an anti-capture attack detection method for unattended nodes to resist attacks, such as replay attacks, sinkhole attacks, plaintext-chosen attacks, and physical capture attacks. Finally, the security of the protocol is proved by BAN.
Similar content being viewed by others
References
Al-Karaki J. N., & Chen, K. -C. (2014). From M2M communications to the Internet of Things: Opportunities and challenges. Ad Hoc Network, 2014, pp. 1–2.
Stojmenovic, I. (2014). Machine-to-machine communications with in-network data aggregation, processing, and actuation for large-scale cyberphysical systems. IEEE Internet Things, 1(2), 122–128.
Kim, J., Lee, J., Kim, J., & Yun, J. (2014). M2M service platforms: Survey, issues, and enabling technologies. IEEE Communications Surveys and Tutorials, 16(1), 61–76.
Catarinucciet, L. (2015). An IoT-aware architecture for smart healthcare systems. IEEE Internet Things, 2(6), 515–526.
Ko, J., Terzis, A., & Dawson-Haggerty, S. (2011). Connecting low-power and lossy networks to the internet. IEEE Communications Magazine, 49(4), 96–101.
IEEE 802. 15. 4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specfications for Low-Rate Wireless Personal Area Networks (LR-WPANs), http://standards.ieee.org/getieee802/download/802.15.4-2003.pdf.
Touati, F., & Mnaouer, A. B. (2016). Feasibility and performance evaluation of a 6LoWPANenabled platform for ubiquitous healthcare monitoring. Wireless Communications and Mobile Computing, 2016, pp. 1271–1281.
Touati, F., Tabish, R., & Mnaouer, A. B. (2013). Towards u-health: an indoor 6LoWPAN based platform for real-time healthcare monitoring. In Proceedings of the 6th IEEE wireless and mobile networking conference (pp. 1–4).
Demirkan, H. (2013). A smart healthcare systems framework. IT Professional, 15(5), 38–45.
Agoulmine, N., & Deen, M. J. (2011). U-health smart home. IEEE Nanotechnology Magazine, 5(3), 6–11.
Misra, S., Goswami, S., & Taneja, C. (2015). PKI adapted model for secure information dissemination in industrial control and automation 6LoWPANs, IEEE Access, 2015, pp. 875–889.
Val, P. B., Valls, M. G., & Cunado, M. B. (2014). A simple data-muling protocol. IEEE Transactions on Industrial Informatics, 10(2), 895–902.
Goswami, S., Misra, S., & Taneja, C. (2014). Securing intra-communication in 6LoWPAN: A PKI Integrated Scheme. In Proceedings of the advanced networks and telecommuncations systems, 2014, pp. 14–17.
Kasinathan, P., Pastrone, C., Spirito, M. A., & Vinkovits, M. (2013). Denial-ofservice detection in 6LoWPAN based Internet of Things. In Proceedings IEEE 9th international conference on wireless and mobile computing, Networking and Communications. 2013, pp. 600–607.
Cervantes, C., Poplade, D., & Nogueira, M. (2015). Detection of Sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In Proceedings of the integrated network management, 2015, pp.11–15.
Raza, S., Duquennoy, S., & Höglund, J. (2015). Secure communication for the Internet of Things a comparison of link-layer security and IPsec for 6LoWPAN. Security & Communication Networks, 7(12), 2654–2668.
H. R. Hussen, G. A. Tizazu, T. Miao, L. Taekkyeun, C. Youngjun, and K. Ki-Hyung, SAKES: Secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6LoWPAN). in Proceedings of the international conference on ubiquitous and future networks, 2013, pp. 246–251.
Chen, S. & Ma, M. (2013). A dynamic-encryption authentication scheme for M2M security in cyber-physical systems. In Proceedings of the 2013 IEEE global communications conference, 2013, pp. 2897–2901.
Fu, A., Zhang, Y., Zhu, Z., Jing, Q., & Feng, J. (2012). An efficient handover authentication scheme with privacy preservation for IEEE 802. 16 m network. Computers & Security, 2012, pp. 741–749.
Zhang, X., Li, G., & Han, W. (2015). Ticket-based authentication for fast handover in wireless mesh networks. Wireless Personal Communications, 85(3), 1509–1523.
Qiu, Y., & Ma, M. (2016). A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks. IEEE Transactions on Industrial Informatics, 12(6), 2074–2085.
Muhammad, T., & Ghulam, A. (2020). S6AE: Securing 6LoWPAN using authenticated encryption scheme. Sensors, 20(9), 1–23.
Verma, A., & Ranga, V. (2020). Mitigation of DIS flooding attacks in RPL based 6LoWPAN networks. Transactions on emerging telecommunications technologies, 2020, 31(2).
Baskaran, A. G., Nanda, P., & Nepal, S. (2019). Testbed evaluation of Lightweight Authentication Protocol (LAUP) for 6LoWPAN wireless sensor networks. Concurrency and Computation: Practice and Experience, 2019, 31(23).
Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., McCann, J. A., & Kin, L. (2013). A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities. IEEE Wireless Communications, 20(6), 91–98.
Park, S., Kim, K., Haddad, W., Chakrabarti, S., & Laganier, J. (2011). IPv6 over low power WPAN security analysis. IETF Internet Draft Draft-6lowpanSecurity-Analysis-05, 2011.
Acknowledgements
This work was partially supported by the nature fund of Liaoning province under Grant No. 2019-ZD-0243.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Gao, L., Zhang, L., Feng, L. et al. An Efficient Secure Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN in Unattended Scenarios. Wireless Pers Commun 115, 1603–1621 (2020). https://doi.org/10.1007/s11277-020-07645-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07645-z