A Security Protocol for Route Optimization in DMM-based Smart Home IoT Networks

2019 
Smart home networks have been recognized as one of its representative important applications in the forthcoming 5G era. It is also expected that in 5G networks, future smart home services will be much powered by mobility management, which enables users to remotely access and control their in-home Internet of Things (IoT) sensors and appliances anywhere anytime any device. As a major solution, Distributed IP Mobility Management (DMM) can be considered because it addresses the limitation of the centralized approaches as well as its flat architecture is suit for 5G networks. Obviously, without being protected, mobility management can cause smart home systems to be vulnerable to various security threats. Especially, it is of paramount important to protect data traffic transmitted between user mobile devices and their in-home IoT appliances because they include users' sensitive and critical privacy information. Taking this into consideration, it is necessary to support secure route optimization, which allows the involved devices to directly communicate each other in secure way while minimizing possibility of information leakage during data transmission. According to our best knowledge, there is no study on securing route optimization for DMM networks. Motivated by this, we propose a secure route optimization protocol for DMM-based smart home systems. The proposed security protocol, composed of the route optimization initialization and handover phases, is designed to provide mutual authentication, key exchange, perfect forward secrecy, and privacy protection. Its security is thoroughly verified through the two formal security analysis tools, BAN-logic and Automated Validation of Internet Security Protocols and Applications (AVISPA). From the comparison analysis, it is shown that the proposed protocol is better than other standard protocols.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    25
    References
    14
    Citations
    NaN
    KQI
    []