Abstract
Wireless sensor Networks (WSNs) deployed in distributed Internet of Things (IoT) applications should be integrated into the Internet. According to the distributed architecture, sensor nodes measure data, process, exchange information, and perform collaboratively with other sensor nodes and end-users, which can be internal or external to the network. In order to maintain the trustworthy connectivity and the accessibility of distributed IoT, it is important to establish secure links for end-to-end communication with a strong pervasive authentication mechanism. However, due to the resource constraints and heterogeneous characteristics of the devices, traditional authentication and key management schemes are not effective for such applications. This paper proposes a pervasive lightweight authentication and keying mechanism for WSNs in distributed IoT applications, in which the sensor nodes can establish secured links with peer sensor nodes and end-users. The established authentication scheme PAuthKey is based on implicit certificates and it provides application level end-to-end security. A comprehensive description for the scenario based behavior of the protocol is presented. With the performance evaluation and the security analysis, it is justified that the proposed scheme is viable to deploy in the resource constrained WSNs.
1. Introduction
Wireless sensor network is a key technological building block of Internet of Things, which is considered the future evolution of the Internet. During the past decade, WSN and its security are not only well investigated amongst the industry and academia [1] but also promoted with standardized security solutions [2, 3]. Although the concept and applications of IoT are not novel any longer, IoT security is still in its infancy. However, substantial amount of research work has been done to identify the challenges and possible protection mechanisms for securing IoT, as shown throughout [4–7]. Nevertheless, IoT security protocols are still neither standardized nor commercialized properly due to its novelty and immaturity. Since WSN is an indispensable part of the IoT, it needs to adapt IP technologies to create a seamless and global connectivity with the Internet [6]. The Internet engineering task force (IETF) has contributed significantly to gaining that pervasive connectivity of small objects to IPv6 based Internet. IPv6 over low-power wireless personal area network (6LoWPAN) enables complete integration of WSNs into the Internet [8, 9]. Constrained application protocol (CoAP) and routing protocol for low-power and lossy networks (RPL) are, respectively, proposed for application layer and network layer routing in constrained IoT networks [10, 11]. Physical and MAC layers of low-power networks are defined by IEEE 802.15.4 protocol [2].
In the context of IoT application domains, WSN architectures exist as centralized and distributed approaches [5]. In the centralized approach, a central entity (or a cloud service) is responsible for acquiring raw data from the sensors, processing received data into required information and format, and providing information for other required entities (e.g., groups of companies and individual customers). In such centralized networks, there is little or no support to access the data sensing network devices directly. In contrast, the distributed networks allow the end-users and other network entities to obtain raw data straightaway from the sensor nodes. Unlike in the centralized approach, in distributed architecture the edge network devices comprise high level intelligence and processing power. Although provisioning of services is located at the edge of the network, different application platforms and end-users can collaborate dynamically with each other. As a result of the decentralized and distributed nature of the network, it is essential to consider the secure management of identity and authentication of connecting devices. In IoT applications, multiple entities (e.g., sensing nodes, service providers, and information processing systems) have to authenticate each other to establish a trusted connection. Not only should the authentication protocols be resistive and robust to malicious attacks, but also they should be lightweight to be deployed in less performing edge devices (i.e., sensors and actuators).
Rather used for generic WSN applications, IoT combined WSN use-cases are widely deployed in smart-home, smart-city, healthcare, and industry monitoring applications [5, 7, 12]. In a hospital environment, there can be different sensors installed in monitoring health conditions of patients (e.g., blood pressure, heart beat, and oxygen concentration). Doctors, who are outside the hospital, might be interested in examining health records of particular patients. Similarly, some medical machinery that maintains the environmental conditions of the ward needs to get the same records. In this scenario, as illustrated in Figure 1, doctors have to access the sensor node as an end-user and the machinery has to collaborate as a sensor node from the same or a distinctive WSN. However, in both cases, the two communication parties need to prove their authenticity to each other before establishing a secure communication link.

Overview of the distributed IoT approach in a hospital environment.
In factory automation and power plant monitoring applications, WSNs are deployed inside the factory premises to obtain raw data on machinery vibration, temperature, flow-rate, and light intensity [12]. Their sensed data are used to identify machine abnormalities and to create safety alarms. There can be instances where the users inside and outside the power plant want to acquire raw data directly from the sensor nodes. The end-users and the sensor nodes have to authenticate each other before transferring raw data.
Based on the explained scenarios and the state-of-the-art before, the main contributions of this paper are summarized as follows.
We propose and design a pervasive authentication protocol and a key establishment scheme for the resource constrained WSNs in distributed IoT application, called PAuthKey. We implement the PAuthKey protocol and demonstrate its performance measurements on the high resource constrained sensor nodes. We conduct a security analysis on PAuthKey, along with performance and security comparisons between it and DTLS scheme, which is currently considered the most appropriate authentication scheme for constrained IoT networks. Moreover, we show the performance comparison results of two phases of PAuthKey with ECDSA and ECDH schemes.
The rest of the paper is organized as follows. Section 2 provides a brief overview about the related work. Section 3 comprehensively describes the system architecture, where the authentication protocol is developed, and the notations used. Section 4 presents the proposed authentication and key management protocol known as PAuthKey. Section 5 gives a detailed explanation about the implementation, performance analysis, security analysis, and scalability of the PAuthKey protocol. Finally, Section 6 concludes the paper.
2. Related Work
In centralized WSN, data from the sensor nodes are transmitted to a single central location, which processes information and combines and provides information acquisition for end-users (i.e., customers) [7]. Due to the high data availability and massive network size, processing of data on a single location might be inefficient, congested, and undertaking a high risk at single entity failure. In the distributed networks, the sensor nodes can retrieve, process, and provide data for other entities and end-users. Figure 1 provides an overview of the distributed IoT approach, which allows the communication among the edge devices, end-users, and IoT server cloud.
Distributed architecture supports the IoT network applications by providing services at local level and collaborating with all the network devices and users to achieve common goals. Due the network heterogeneity and device mobility, there can be many security threats and issues encountered with distributed IoT. In [7] Roman et al. have identified security challenges in distributed IoT. According to their study, network entity identity, authentication, access control, and secure communication channel establishment are major security concerns in distributed IoT. The proposed mechanisms should be robust to node mobility and network scalability due to the dynamic behavior of nodes. Additionally, the network needs to scale up after installation.
Exploitation of a master key for entity authentication for pervasive computing environments would be also a feasible approach to IoT enabled WSNs [13]. According to [14], the authentication mechanisms for WSN applications can be summarized as password based, remote user authentication using one-way hash functions and ticket based authentication. However, most of the work has the sole purpose of enabling end-user authentication in generic WSN architecture and it does not provide the extensibility for the key establishment. In [15, 16], the authors have proposed broadcast authentication schemes for WSNs. Reference [14] presents an effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment. This is a ticket based user authentication scheme, which is not applicable to the high resource constrained devices due to large memory consumption. Nevertheless, these works have less or almost zero contribution to securing IoT combined WSNs. The reason is that they have less addressed network scalability and device mobility issues.
DTLS is an adaptation of TLS protocol and it provides an equal communication security as TLS for datagram protocols [17]. According to [10], the secured version of CoAP (known as CoAPs) is defined with DTLS due to the unreliable communication links in CoAP based IoT networks. In [18], the authors have introduced the first fully implemented two-way authentication scheme for the IoT based on DTLS protocol. However, due to the existence of eight message transfers to complete DTLS handshake, it induces a significant overhead to the network traffic. The main drawback is the utilization of X.509 certificates and RSA public keys with DTLS handshake, which are too heavy for the low performing and high resource restricted sensor nodes.
Due to the high resource demand, public key cryptographic (PKC) algorithms, such as RSA, are not recommended for WSN applications. However, elliptic curve cryptography (ECC) (i.e., a lightweight PKC alternative) based security solutions are not anymore new to WSNs. The utilization of implicit certificates for generating pairwise ephemeral keys is yet an improving realm. There are several implicit certificate generation schemes for WSNs presented in [19, 20]. Elliptic curve Qu-Vanstone (ECQV) is one of such schemes embedded in ZigBee Smart Energy applications [21]. In [22], a fully implemented end-to-end authentication scheme has been introduced to the high constrained embedded devices. TinyECC is a stable ECC implementation for constrained network entities, where in [23] the authors provide implementation details and measurement results for elliptic curve digital signature algorithm (ECDSA) and Diffie-Hellman key establishment (ECDH). Several ECC based security schemes have been proposed for WSNs as published in [15, 19, 24–26].
3. System Model and Notations
In this section, the authors provide details about the system architecture, where the protocol is modeled, and information about the used notations.
3.1. System Model
Figure 2 illustrates the assumed network architecture for the proposed authentication scheme, where end-users can collaborate with different edge devices in order to obtain particular information or service. The edge networks may include heterogeneous devices and the end-users can be humans or virtual entities (e.g., web applications).

Assumed network architecture.
According to the distributed IoT architecture, end-users and edge devices (i.e., sensor nodes) should possess the capability of securely accessing an edge device in a WSN. Therefore, based on Figure 2, mutual authentication is considered for four types of communication link establishments, particularly the following.
Two sensor nodes are located in the same cluster ( Two sensor nodes are located in distinctive clusters in the same WSN ( Two sensor nodes are located in distinctive clusters and in distinctive WSNs ( An end-user is linked to a sensor node (
Before starting the actual authentication protocol between two network entities, it is necessary to undergo a registration process by every communication party in order to retrieve cryptographic credentials. Later, the obtained security credentials are to be exploited for mutual authentication. For the given four types of communication link possibilities (1)–(4), every edge device and end-user have to acquire security credentials (e.g., cryptographic suites and implicit certificates) from a trusted third party such as a certificate authority (CA). It is assumed that the CA is a highly resource-rich server and is already known by the edge nodes during the registration phase.
In this architecture, two types of network entities such as resource rich entities (i.e., end-users and cluster heads (CH)) and highly resource constrained network entities (i.e., sensor nodes) are considered. Here, a cluster tree topology of WSNs is assumed, where a CH is the controlling device for the sensor nodes in a particular cluster. Therefore, it is considered that CH is performing as the CA (i.e., to issue implicit certificates) for the same group of sensor nodes in the cluster. However, further details about the authentication between a CH and an end-user (i.e., between two resource-rich entities) are not provided in this paper. The major concerns are the authentication between two constrained nodes or one constrained node and a resource-rich entity. Hence, it is assumed that all the CHs and end-users advocate DTLS for secure end-to-end communication after acquiring X.509 certificates from a common CA. As aforementioned in Section 2, X.509 certificates are only handled by end-users and CHs, due to their complexity and overhead on tiny sensor nodes. As illustrated in Figure 2, resource-rich network entities (i.e., end-users and CHs) first communicate with the common CA along the already established communication links heading through an IoT cloud. If an end-user needs to communicate with a sensor node with a particular cluster, first it needs to establish a secure DTLS connection with the corresponding CH and obtain implicit certificates from the CH. The end-user can obtain the implicit certificate from the CH through that secure link. Then, the end-user can use the obtained implicit certificate to communicate with the sensor node.
Having a valid implicit certificate allows the two entities for mutual authentication irrespective of their local network. Existing nodes can change their locations dynamically after requesting a new certificate. No matter what the size of the network is, adding new nodes can easily extend the data acquisition and service providing networks. It is assumed that CH can recognize the valid identities and communicate with the network entities, which are requesting security credentials [27]. The reason is that the CH has to verify the certificate requestor's identity at the beginning of the handshake and it performs the verification mainly based on the identity of the requestor node. The IPv6 over low-power wireless personal area network (6LoWPAN) identities are considered for the identification. In this paper, an end-to-end authentication is proposed for the application layer, while relying on the security schemes provided from the physical and MAC layers in IEEE802.15.4 standard [2]. Subsequently, the edge devices and end-users can mutually authenticate and establish secure communication channels, due to the distributive nature of the entire architecture.
3.2. Notations
The notations used in this paper are defined in Table 1. Elliptic curve (EC) parameters are denoted by q, a, b, G, n. The variable q is a prime, which indicates finite field
Notations used in cryptographic algorithms.
4. PAuthKey Work Flow
The PAuthKey protocol mainly consists of two phases: registration phase and authentication phase. During the registration phase, the sensor nodes in a particular cluster should obtain certificates from the CH and derive their own public-private key pairs. The authentication phase is varying upon the type of the communication link between the end-parties (i.e., four communication link possibilities as explained in Section 3). Accordingly, the authentication phase is described for three scenarios with reference to the system model in Figure 2: scenario 1 for link A, scenario 2 for links B and C, and scenario 3 for link D. The upcoming subsections characterize the phases individually.
4.1. Registration Phase (Initial Certificate Acquisition)
Initially, the sensor nodes should obtain security credentials from their respective cluster head (CH) as a prerequisite for the actual authentication protocol. All the sensors in a particular cluster consider their certificate authority (CA) as the CH. Upon the certificate request from sensor node U, the CA generates the certificate. The message flow of the certificate acquisition is illustrated in Figure 3. The grey boxes show the change of variables and the white boxes indicate the performed functionality by the entity.

Message flow for the registration phase.
The handshake starts with the
Upon receiving
After receiving the certificate request, CA verifies the MAC value and nonce
While receiving this message, the requestor node U first verifies the MAC and
Node U's
CA uses public key
At the end of the registration phase, the sensor nodes possess the security credentials to start secure communication with the internal and the external network entities (i.e., end-users and sensor nodes).
4.2. Authentication Phase
The authentication phase is described for three scenarios. Scenario 1 (
Scenario 1: Authentication Process between Two Sensor Nodes in the Same Cluster. The first scenario is the exploitation of certificates and public-private keys for node authentication between two sensor nodes in the same cluster. Since the sensor nodes in a particular cluster obtain security credentials from a common CA, they can easily carry out the mutual authentication as depicted in Figure 4. The grey boxes are value ranges and the white boxes are performed operations. The client node U is aware of the 6LoWPAN identity of the server node V, which U needs to acquire the data or the service. As the initial step, the client sends the

Message flow for scenario 1—authentication process between two sensor nodes in the same cluster.
Upon receiving the client's certificate, the server first verifies the MAC value and then computes the client's public key
Finally, the exchange of the
Scenario 2: Authentication Process between Two Sensor Nodes in Distinctive Clusters. Here, the node authentication process is demonstrated between two sensor nodes located in distinctive clusters, which might be in the same or different WSNs. In such cases, the nodes cannot use their certificates for mutual authentication since they are generated from two CAs. The messages flow of the authentication protocol is illustrated in Figure 5.

Message flow for scenario 2—authentication process between two sensor nodes in distinctive clusters.
Similar to scenario 1, the preliminary
Scenario 3: Authentication Process between End-User and Sensor Node. Figure 6 demonstrates the flow of the message transactions of the authentication process between an end-user and a sensor node. The difference between scenario 3 and scenario 2 is that here the user directly retrieves security credentials from the given cluster head. However, in scenario 2, the two cluster heads have to communicate first for the acquisition of the implicit certificate for the client node. Similar to the previous case (i.e., scenario 2), it is assumed that the secure link between the user and the CH is established with RSA keys and DTLS handshake [18], and the security credentials are transmitted over that link. Once the end-user obtains the certificate and computes its public-private keys, the rest of the handshake would occur in a similar manner as scenarios 1 and 2.

Message flow for scenario 3—authentication process between end-user and sensor node.
As explained in the above three scenarios, the end-users and the sensor nodes can establish secure communication links after authenticating each other using implicit certificates. Furthermore, the two-party authentication mechanism enables the nodes to generate a pairwise common secret key. Therefore, this would advocate accessing the data and services in WSNs accommodated in distributed IoT architecture.
5. Analytical Justification of PAuthKey
In this section, a comprehensive analysis of the proposed PAuthKey protocol is presented. The performance analysis is given in terms of memory, energy consumption, and execution time, along with the support for network scalability. Next, the security of the protocol and the comparisons with the related work are discussed.
5.1. Performance Analysis
Physical and MAC layer security protocols do not provide end-to-end communication security. DTLS is the widely used application level security protocol for authentication in IoT networks. Variants of DTLS handshakes are based on ECC and used with RSA and X.509 certificates [22]. Although the exploitations of RSA and X.509 certificates with DTLS provide interoperability, they are hardly utilized by the high resource constrained devices (e.g., sensors). The major drawbacks are as follows.
RSA has a key size of 2048 bits. Standard X.509 certificates are in the order of 1 kB in size. The utilization of RSA and X.509 on constrained sensors consumes resources and induces computation overhead.
The PAuthKey solution is implemented on a simple network with TelosB sensor nodes [29] that have IEEE 802.15.4 compliant CC2420 RF transceivers. The hardware includes 8 MHz, 16-bit MCU with 10 Kbyte RAM and 48 Kbyte ROM. CC2420 RF transceiver has a maximum data rate of 250 kbps and frequency band of 2400 MHz [29]. PAuthKey is developed in NesC on TinyOS 2.1.2 [30]. ECC (i.e., for EC arithmetic operations) and natural number (NN) (i.e., for large natural number operations) interfaces are utilized from TinyECC configurable library [23]. secp160r1 EC domain parameters are used as defined in [28]. The authors of this paper utilized EC optimization techniques provided in TinyECC such as Barrett reduction to speed up modulo operations, Hybrid Multiplication and Squaring for integer multiplication, Projective Coordinate Systems for point addition, and Sliding Window for scalar multiplication. SHA-1 is used as the one-way cryptographic function H. ECC operations are extremely costly compared to other cryptographic operations (i.e., SHA-1 and MAC) [23]. Therefore, we have considered the given EC operation optimization techniques.
The experimental setup comprises three TelosB nodes, one as the CA and the rest as the cluster nodes. For the sake of simplicity and comparison, CA functionalities are also implemented on the sensor node itself. The measurements are taken in terms of execution time, energy, and memory (i.e., RAM and ROM) consumption. The check_size.pl script is used to obtain memory consumption values (e.g., for RAM and ROM) required by each operation in registration phase and authentication phase for scenario 1. The execution times are measured directly on the sensor nodes and the energy consumptions are computed using the runtime. The energy consumptions are then calculated as
As given in Table 2, memory utilization values are taken for two phases with respect to the communicating nodes.
Memory utilization.
For the registration phase, the total memory consumption is measured for edge node operations (i.e., certificate requestor) and CA operations. Edge node operations include the generations of
For the authentication phase, scenario 1 was only considered, since it is almost similar to the major overhead created at the sensor node side for the other scenarios. According to the message flow of the authentication phase (i.e., scenario 1 in Figure 4), the collective operations performed at the client and the server sides are identical. Therefore, the operations at one edge node include the generation of
Since the transmission time depends on the size of the network and the distance between the nodes, only the execution time for the particular operations performed at the edge nodes and CA is measured for the registration and authentication phases for scenario 1. The measured execution time values and the calculated energy consumption values are depicted in Table 3.
Execution time and energy consumption.
During the registration phase, the approximate collective time utilization at certificate requestor's (i.e., the sensor node) side is 8235 ms. This value includes the execution times for initialization (2709 ms), certificate request generation (2764 ms), certificate verification (i.e., private-public key derivation) (2758 ms), and Finished message computation (4 ms). At CA's side, the execution time values are taken for initialization (2709 ms), certificate generation (5728 ms), and
During the authentication phase for scenario 1, each edge node (i.e., the client or the server) takes approximately 8444 ms for initialization, key computation, and
In the proposed two-phase authentication protocol, implicit certificates, which are 160-bit EC points instead of X.509 certificates, were used. Therefore, the size of the certificate is only 44 bytes. Using optimally designed EC curves we can reduce the certificate size and using compression techniques we can further decrease the overall message size. Retransmission clocks can be used at both communicating parties for identifying timeouts and retransmitting when there is a message loss. Furthermore, the authentication protocol supports scaling up the network, since the newly added nodes can authenticate themselves after undergoing the registration phase. As the certificates are not based on the physical locations of the edge devices, they do not have to be alternated according to nodes' mobility.
5.2. Scalability
The proposed authentication protocol supports the scalability of the network (i.e., expanding the network with new node addition) and the location changes of the sensor nodes within the same cluster. When a new node is added to the network, a valid 6LoWPAN node identity, K message authentication key, and cipher suites should be stored while the node is at offline mode. Figure 7 illustrates how PAuthKey protocol supports a new node addition to the network, within a particular cluster. It is illustrated as a three-stage process. In Stage 1, at the bootstrapping phase, the newly added node (marked as red rectangular shaped) can send the certificate request and obtain a certificate from the CA for computing its own keys. Hence, the size of the network is not necessary to be predefined during the initial design phase and deployment phase. At a new node request, the CA only needs to verify the validity of the sensor node identities to issue the certificate. In Stage 2, the new node receives its certificate. Therefore, Stages 1 and 2 resemble the registration phase of PAuthKey protocol. Finally in Stage 3, the node can undergo the authentication phase and the key establishment using the received certificate.

Behavior of the protocol when a new sensor node enters the cluster.
Similarly, the sensor nodes do not need prior knowledge of their neighbors. Whenever a new node is added to the network or changes the neighboring set, it can establish the ephemeral pairwise link keys with the corresponding neighbors using the certificate. The certificates always provide an implicit assurance for the sensor nodes that they are legitimate nodes. Even though the sensor nodes are frequently changing their locations (i.e., also the neighboring set), they can authenticate themselves and derive the pairwise keys securely without previous awareness of the new neighboring nodes or end-users. As shown in [31], if the authentication is performed based on pairwise keys between neighbors which are preinstalled, then there should be a large number of stored keys per node, which may not be desirable for large scale networks. However, in PAuthKey protocol, such a large scale key preinstallation is not needed at all since the ephemeral link keys have to be established before starting communication.
5.3. Security Analysis
The proposed implicit certificate based authentication protocol is developed using one of the lightest PKC schemes, ECC. Though it is comparatively more expensive than symmetric key algorithms, it is inherently secured due to the PKC characteristics. However, as shown in Sections 5.1 and 5.2, the proposed scheme is feasible to deploy in real-time WSNs. While using EC scalar-point multiplication, the scheme is provably secured under the random oracle model that the discrete logarithm problem over the subgroup is intractable. The advantage of using ECC is that it provides an equal security as RSA, however, with less overhead (e.g., 160-bit ECC equals RSA with 1024 key size). At the end of the authentication scheme there is a key establishment part which extends the security strength of the standard ECDH key agreement by using mutually authenticated keying materials (i.e.,
It is very common that denial of service (DoS) attacks can be launched against distributed IoT. Moreover, during the registration phase, the first
In the security analysis, we are considering three attacks including node compromising attacks, masquerade attacks, and impersonate attacks. In node compromising attacks, an adversary can physically capture a node and obtain its keys. Similarly, in the authentication phase, an attacker can impersonate a legitimate sensor node using its certificate or try to masquerade the key establishment between two legitimate nodes.
5.3.1. Node Compromise Attacks
PAuthKey is resilient to node compromise attacks. If a sensor node U is captured, the adversary can reveal
5.3.2. Impersonation and Masquerade Attacks
During the key establishment in the authentication phase, nodes are authenticated in order to prevent impersonation attacks and masquerade attacks. Node V computes node U's public key using its
5.4. Comparison with Related Work
In this paper, the focus was on authenticating the extreme resource constrained devices, which are deployed in WSNs in distributed IoT applications. Therefore, the proposed authentication protocol was implemented on TelosB sensor nodes and performance measurements were obtained. However, as explained in Section 2, DTLS is considered the prominent authentication protocol for IoT applications. Though we use DTLS in the middle of PAuthKey protocol for certain scenarios (i.e., scenarios 2 and 3), the key foundation of the proposed authentication scheme is explained in scenario 1. In particular, in scenarios 2 and 3, DTLS is also utilized by resource-rich entities such as CHs and end-users for authentication.
As aforementioned in Sections 2 and 4, PAuthKey scheme is inspired by different ECC based security schemes. Among them, ECDSA and ECDH are the most relevant schemes to two phases of PAuthKey protocol. Therefore, the first assessment includes the assessment of PAuthKey scheme with the related work as depicted in Table 4. The memory and timing values of ECDSA digital signature scheme are compared with those of the registrations phase. Similarly, ECDH key establishment performance is contrasted with the key computation of the authentication phase. All the empirical results are measured on TelosB sensor nodes and with the activation ECC optimization techniques as mentioned in Section 5.1.
Comparison of PAuthKey, ECDSA, and ECDH schemes.
According to the given experimental results, the registration phase of PAuthKey scheme at the sensor node side consumes less memory than ECDSA scheme. Although the proposed scheme consumes higher memory values than ECDSA scheme, it would be tolerable for a resource-rich device. However, the execution times of registration phase at both ends (i.e., sensor node and CA) are less than the conventional ECDSA scheme. Similarly, the key computation of the authentication phase utilizes less memory and time than the ECDH scheme. In security aspects, conventional ECDH scheme is vulnerable to impersonation and masquerade attacks, since two communication parties do not have an authentication phase during the key establishment. However, the proposed key establishment is well secured at both types of attacks. Therefore, the given comparison results witness higher performing capability of PAuthKey scheme in the resource constrained sensor nodes than ECDSA and ECDH schemes.
The second assessment presents the comparison results between PAuthKey scheme and conventional DTLS scheme. Thereby, the appropriateness of the proposed protocol for the high resource restricted sensor nodes in WSNs is shown. We use the empirical values, which indicate the performance of DTLS, as given in [18] and the experimental results for PAuthKey. Table 5 shows the comparison results between DTLS scheme and PAuthKey authentication mechanism (i.e., for scenario 1).
Comparison of PAuthKey and DTLS scheme.
The memory utilizations of PAuthKey are much better than the conventional DTLS scheme. This is a convincing remark, which confirms the applicability of PAuthKey scheme for the high resource constrained sensor nodes. Similarly, energy consumption for the authentication in PAuthKey scheme is notably fitting with low-power devices. According to the experimental results, the total time consumption for PAuthKey authentication is nearly double the value of DTLS authentication. However, this can be further reduced by using optimized EC arithmetic operations. Therefore, the authors of this paper believe that the proposed solution PAuthKey extends the existing pool of security solutions concerned with ECC and can optimize the key establishment in WSNs.
6. Conclusion
In this paper, the authors have introduced and analyzed an authentication and key establishment mechanism for WSNs in distributed IoT applications. The proposed PAuthKey protocol comprises two phases: registration phase for obtaining cryptographic credentials to the edge devices and end-users and authentication phase for authentication and key establishment in mutual communication. The authentication phase is described for three distinctive scenarios, based on the links between two communicating parties. Using PAuthKey protocols, the end-users can authenticate themselves to the sensor nodes directly and acquire sensed data and services. With the experimental results, it is shown that the authentication protocol is feasible to deploy in the low performing resource constrained network devices in WSNs. The protocol supports the distributed IoT applications, since the certificates are lightweight and can be handled by the high resource constrained devices, irrespective of their originality. According to the security analysis, the PAuthKey scheme is secured under certain types of attacks. Finally, a brief comparison between the conventional DTLS scheme and the proposed PAuthKey protocol is presented. This shows the appropriateness of PAuthKey scheme especially on the high resource constrained devices.
In the future, the authors intend to extend the utilization of implicit certificates for access control and multicasting in the massive scale distributed IoT network applications. It is expected to customize the content of the implicit certificates by adding other information, such as the time stamp, location identity, or 6LoWPAN identity, depending upon the application requirements. Furthermore, it is intended to extend the utilization of implicit certificates for group key management in large scale sensor networks.
Footnotes
Disclosure
Part of this work is published at the 10th IEEE International Conference on Embedded Software and Systems, 2013 [33], and the 14th IEEE Wireless Communication and Networking Conference, 2014 [
]. The extensions of this work include the authentication protocol between sensor nodes and the implementation and evaluation of PAuthKey protocol.
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgments
This work has been supported by Tekes under Massive Scale Machine-to-Machine Service (MAMMotH) project and Academy of Finland project SEMOHealth. Pawani Porambage is also supported by HPY research foundation scholarship granted from Elissa Cooperation, Finland.
