A secure authentication protocol for IP-based wireless sensor communications using the Location/ID Split Protocol (LISP)

Raheem, Ali, Lasebae, Aboubaker and Loo, Jonathan ORCID: https://orcid.org/0000-0002-2197-8126 (2014) A secure authentication protocol for IP-based wireless sensor communications using the Location/ID Split Protocol (LISP). In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 24-26 Sept 2014, Beijing, China.

[thumbnail of Raheem-etal-2014-A-secure-authentication-protocol-for-IP-based-wireless-sensor-communications.pdf]
Preview
PDF
Raheem-etal-2014-A-secure-authentication-protocol-for-IP-based-wireless-sensor-communications.pdf - Accepted Version

Download (2MB) | Preview

Abstract

The future of the Internet of Things (IoT) involves a huge number of node devices such as wireless sensors that can communicate in a machine-to-machine pattern, where devices will be globally addressed and identified. As the number of connected devices increased, the burden on the network infrastructure and the size of the routing tables and the efficiency of the current routing protocols in the Internet backbone increased as well. Recently, an IETF working group, along with the research group at Cisco, are working on a Locator/ID Separation Protocol as a routing architecture that provides new semantics for IP addressing, in order to simplify routing operations and improve scalability in the future of the Internet such as the IoT. In the light of the previous issue; this paper proposes an efficient security authentication and a key exchange scheme that is suited for Internet of things based on Locator/ID Separation protocol. The proposed protocol method meets practicability, simplicity, and strong notions of security. The protocol is verified using Automated Validation Internet Security Protocols and Applications (AVISPA) which is a push button tool for the automated validation of security protocols and the achieved results showed that they do not have any security flaws.

Item Type: Conference or Workshop Item (Paper)
ISSN: 2324-898X
ISBN: 9781479965137
Identifier: 10.1109/TrustCom.2014.135
Page Range: pp. 840-845
Identifier: 10.1109/TrustCom.2014.135
Additional Information: © 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Keywords: Internet, Authentication, Peer-to-peer computing, Wireless sensor networks, Routing protocols
Subjects: Computing > Systems > Computer networking
Computing
Depositing User: Jonathan Loo
Date Deposited: 21 Jun 2017 15:37
Last Modified: 28 Aug 2021 07:23
URI: https://repository.uwl.ac.uk/id/eprint/3491

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item

Menu