An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems

被引:17
|
作者
Chen, Shuo [1 ]
Ma, Maode [1 ]
Luo, Zhenxing [2 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore, Singapore
[2] Washington Univ, Dept Elect & Syst Engn, St Louis, MO 63130 USA
关键词
authentication; M2M; BAN logic; SPIN;
D O I
10.1002/sec.1407
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet has made the world smaller while there is still a gap between the cyber world and our physical world. In the future cyber-physical system (CPS), all objects in cyber world and physical world would be connected, and the concepts of cyber world and physical world will no longer exist. The speed of information transmitting and processing will be faster, the abilities of controlling facilities and handling events will be more powerful, and our lives will be better. In the CPS, machine to machine (M2M) communication is in charge of data collecting and transmitting, which utilizes both wireless and wired systems to monitor physical or environmental conditions and exchange the information among different systems without direct human intervention. As a part of CPS, M2M communication is considerably important while being fragile at the same time because M2M communication still faces lots of security threats that are not only from outside but also from inside. In traditional M2M communication, the M2M service provider (MSP) is always assumed to be trusted. However, the MSP could be compromised in real world. In that case, the previous security solutions would fail because the most confidential materials are kept in the MSP by the conventional solutions. How to protect the entire system from the compromised MSP is one important problem the paper intends to solve. In addition, the communication bandwidth and energy resource for the M2M devices are precious. Another issue the paper is addressing is the design of efficient security schemes being able to save both energy and communication bandwidth. In this paper, an authentication scheme applying authenticated identity-based cryptography without key-escrow mechanism has been proposed. In the proposed scheme, only partial secrets instead of full secrets are stored in the MSP, which could prevent the compromised MSP from endangering the whole system. The authenticated encryption property of the proposed scheme could leave out the work of signature generation, transmission, and verification so as to save the computation and communication resource of the whole system. The security analysis with Burrows-Abadi-Needham logic (BAN Logic) and Simple Promela Interpreter (SPIN) shows that the proposed scheme is well designed and could withstand Man-in-the-Middle attacks, impersonation attacks, replay attacks, DoS attacks, and compromised attacks. Copyright (c) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:1146 / 1157
页数:12
相关论文
共 50 条
  • [1] A Dynamic-Encryption Authentication Scheme for M2M Security in Cyber-Physical Systems
    Chen, Shuo
    Ma, Maode
    [J]. 2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 2897 - 2901
  • [2] A Survey on Security Issues of M2M Communications in Cyber-Physical Systems
    Chen, Dong
    Chang, Guiran
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (01): : 24 - 45
  • [3] Design of a Secure Password-Based Authentication scheme for M2M Networks in IoT Enabled Cyber-Physical Systems
    Renuka, K. M.
    Kumari, Saru
    Zhao, Dongning
    Li, Li
    [J]. IEEE ACCESS, 2019, 7 : 51014 - 51027
  • [4] Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial M2M communication
    Paul, Sebastian
    Scheible, Patrik
    Wiemer, Friedrich
    [J]. JOURNAL OF COMPUTER SECURITY, 2022, 30 (04) : 623 - 653
  • [5] Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication
    Paul, Sebastian
    Scheible, Patrik
    [J]. COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 295 - 316
  • [6] A Secure Identity Authentication Scheme Based on Blockchain and Identity-based Cryptography
    Ao, Weijun
    Fu, Shaojing
    Zhang, Chao
    Huang, Yuzhou
    Xia, Fei
    [J]. 2019 IEEE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY (CCET), 2019, : 90 - 95
  • [7] The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment
    Hu, Liang
    Chi, Ling
    Li, Hong-tu
    Yuan, Wei
    Sun, Yuyu
    Chu, Jian-feng
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (01): : 131 - 146
  • [8] A Dynamic ID-Based Authentication Scheme for M2M Communication of Healthcare Systems
    Nguyen, Tien-Dung
    Huh, Eui-Nam
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2012, 9 (06) : 511 - 519
  • [9] A novel identity-based authentication scheme for IoV security
    Wang, Changguang
    Dai, Zimeng
    Zhao, Dongmei
    Wang, Fangwei
    [J]. International Journal of Network Security, 2020, 22 (04) : 627 - 637
  • [10] An Authentication and Key Establishment Scheme to Enhance Security for M2M in 6LoWPANs
    Qiu, Yue
    Ma, Maode
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 2671 - 2676