IEEE Access (Jan 2019)

A Security Protocol for Route Optimization in DMM-Based Smart Home IoT Networks

  • Daemin Shin,
  • Keon Yun,
  • Jiyoon Kim,
  • Philip Virgil Astillo,
  • Jeong-Nyeo Kim,
  • Ilsun You

DOI
https://doi.org/10.1109/ACCESS.2019.2943929
Journal volume & issue
Vol. 7
pp. 142531 – 142550

Abstract

Read online

Smart home networks have been recognized as one of its representative important applications in the forthcoming 5G era. It is also expected that in 5G networks, future smart home services will be much powered by mobility management, which enables users to remotely access and control their in-home Internet of Things (IoT) sensors and appliances anywhere anytime any device. As a major solution, Distributed IP Mobility Management (DMM) can be considered because it addresses the limitation of the centralized approaches as well as its flat architecture is suit for 5G networks. Obviously, without being protected, mobility management can cause smart home systems to be vulnerable to various security threats. Especially, it is of paramount important to protect data traffic transmitted between user mobile devices and their in-home IoT appliances because they include users' sensitive and critical privacy information. Taking this into consideration, it is necessary to support secure route optimization, which allows the involved devices to directly communicate each other in secure way while minimizing possibility of information leakage during data transmission. According to our best knowledge, there is no study on securing route optimization for DMM networks. Motivated by this, we propose a secure route optimization protocol for DMM-based smart home systems. The proposed security protocol, composed of the route optimization initialization and handover phases, is designed to provide mutual authentication, key exchange, perfect forward secrecy, and privacy protection. Its security is thoroughly verified through the two formal security analysis tools, BAN-logic and Automated Validation of Internet Security Protocols and Applications (AVISPA). From the comparison analysis, it is shown that the proposed protocol is better than other standard protocols.

Keywords