34
Views
0
CrossRef citations to date
0
Altmetric
Research Article

“A lightweight authentication scheme for 6LoWPAN-based Internet-of -things”

, &

References

  • Adeel, A., Ali, M., Khan, A. N., Khalid, T., Rehman, F., Jararweh, Y., & Shuja, J. (2019). A multi-attack resilient lightweight IoT authentication scheme. Transactions on Emerging Telecommunications Technologies, 33(3), e3676. https://doi.org/10.1002/ett.3676
  • Al-Amiedy, T. A., Anbar, M., Belaton, B., Bahashwan, A. A., Hasbullah, I. H., Aladaileh, M. A., & Mukhaini, G. A. (2023). A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of internet of things. Internet of Things, 22, 100741. https://doi.org/10.1016/j.iot.2023.100741
  • Alyami, S., Alharbi, R., & Azzedin, F. (2022). Fragmentation attacks and countermeasures on 6LoWPAN internet of things networks: Survey and simulation. Sensors, 22(24), 9825. https://doi.org/10.3390/s22249825
  • Aman, M. N., Chua, K. C., & Sikdar, B. (2017). A light-weight mutual authentication protocol for iot systems. In Globecom -ieee global communications conference (pp.1–6).
  • Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cu´ellar, J. (2005). The AVISPA tool for the automated validation of internet security protocols and applications. In International conference on computer aided verification (pp. 281–285).
  • Ashrif, F. F., Sundararajan, E. A., Ahmad, R., Hasan, M. K., & Yadegaridehkordi, E. (2023). Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction. Journal of Network and Computer Applications, 221, 103759. https://doi.org/10.1016/j.jnca.2023.103759
  • Chom Thungon, L., Ahmed, N., Chandra Sahana, S., & Hussain, M. I. (2021). A lightweight authentication and key exchange mechanism for IPv6 over low-power wireless personal area networks-based internet of things. Transactions on Emerging Telecommunications Technologies, 32(5), e4033. https://doi.org/10.1002/ett.4033
  • Dhamodharan, U. S. R. K., & Vayanaperumal, R. (2015). Detecting and preventing sybil attacks in wireless sensor networks using message authentication and passing method. Scientific World Journal, 2015, 1–7. https://doi.org/10.1155/2015/841267
  • Dhillon, P. K., & Kalra, S. (2017a). A lightweight biometrics based remote user authentication scheme for IoT services. Journal of Information Security and Applications, 34, 255–270. https://doi.org/10.1016/j.jisa.2017.01.003
  • Dhillon, P. K., & Kalra, S. (2017b). Secure multi-factor remote user authentication scheme for internet of things environments. International Journal of Communication Systems, 30(16), e3323. https://doi.org/10.1002/dac.3323
  • Du, W., Deng, J., Han, Y. S., Chen, S., & Varshney, P. K. (2004). A key management scheme for wireless sensor networks using deployment knowledge. In Ieee infocom 2004 (Vol. 1).
  • Falmari, V. R., & Brindha, M. (2021). Privacy preserving biometric authentication using chaos on remote untrusted server. Measurement, 177, 109257. https://doi.org/10.1016/j.measurement.2021.109257
  • Glouche, Y., Genet, T., Heen, O., & Courtay, O. (2006). A security protocol animator tool for AVISPA. In Artist2 workshop on security specification and verification of embedded systems, pisa.
  • Hammi, M. T., Hammi, B., Bellot, P., & Serhrouchni, A. (2018). Bubbles of trust: A decentralized blockchain-based authentication system for IoT. Computers & Security, 78, 126–142. https://doi.org/10.1016/j.cose.2018.06.004
  • Hussen, H. R., Tizazu, G. A., Ting, M., Lee, T., Choi, Y., & Kim, K. H. (2013, July). SAKES: Secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6L0WPAN). In 2013 Fifth international conference on ubiquitous and future networks (ICUFN) (pp. 246–251). IEEE.
  • Jiang, Q., Zeadally, S., Ma, J., & He, D. (2017). Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access, 5, 3376–3392. https://doi.org/10.1109/ACCESS.2017.2673239
  • Malani, S., Srinivas, J., Das, A. K., Srinathan, K., & Jo, M. (2019). Certificate-based anonymous device access control scheme for IoT environment. IEEE Internet of Things Journal, 6(6), 9762–9773. https://doi.org/10.1109/JIOT.2019.2931372
  • Montenegro, G., Hui, J., Culler, D., & Kushalnagar, N. (2007, September). Transmission of IPv6 packets over IEEE 802.15.4 networks (No. 4944). RFC 4944. RFC Editor. https://rfc-editor.org/rfc/rfc4944.txt
  • Montenegro, G., Schumacher, C., & Kushalnagar, N. (2007, August). IPv6 over low-power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals (No. 4919). RFC 4919. RFC Editor. https://rfc-editor.org/rfc/rfc4919.txt
  • Nikshepa, V. P., & Shenoy, U. K. K. (2018). 6LowPan—performance analysis on low power networks. In International conference on computer networks and communication technologies: Iccnct 2018 (Vol. 15, p. 145).
  • Ogonji, M. M., Okeyo, G., & Wafula, J. M. (2020). A survey on privacy and security of internet of things. Computer Science Review, 38, 100312. https://doi.org/10.1016/j.cosrev.2020.100312
  • Qiu, Y., & Ma, M. (2016). A mutual authentication and key establishment scheme for m2m communication in 6lowpan networks. IEEE Transactions on Industrial Informatics, 12(6), 2074–2085. https://doi.org/10.1109/TII.2016.2604681
  • Srinivas, J., Mukhopadhyay, S., & Mishra, D. (2017). Secure and efficient user authentication scheme for multi-gateway wireless sensor networks. Ad Hoc Networks, 54, 147–169. https://doi.org/10.1016/j.adhoc.2016.11.002
  • Turkanovi´c, M., Brumen, B., & H¨olbl, M. (2014). A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Networks, 20, 96–112. https://doi.org/10.1016/j.adhoc.2014.03.009
  • Von Oheimb, D. (2005). The high-level protocol specification language HLPSL developed in the EU project AVISPA. In Proceedings of appsem 2005 workshop (pp. 1–17).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.