An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems

被引:17
|
作者
Chen, Shuo [1 ]
Ma, Maode [1 ]
Luo, Zhenxing [2 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore, Singapore
[2] Washington Univ, Dept Elect & Syst Engn, St Louis, MO 63130 USA
关键词
authentication; M2M; BAN logic; SPIN;
D O I
10.1002/sec.1407
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet has made the world smaller while there is still a gap between the cyber world and our physical world. In the future cyber-physical system (CPS), all objects in cyber world and physical world would be connected, and the concepts of cyber world and physical world will no longer exist. The speed of information transmitting and processing will be faster, the abilities of controlling facilities and handling events will be more powerful, and our lives will be better. In the CPS, machine to machine (M2M) communication is in charge of data collecting and transmitting, which utilizes both wireless and wired systems to monitor physical or environmental conditions and exchange the information among different systems without direct human intervention. As a part of CPS, M2M communication is considerably important while being fragile at the same time because M2M communication still faces lots of security threats that are not only from outside but also from inside. In traditional M2M communication, the M2M service provider (MSP) is always assumed to be trusted. However, the MSP could be compromised in real world. In that case, the previous security solutions would fail because the most confidential materials are kept in the MSP by the conventional solutions. How to protect the entire system from the compromised MSP is one important problem the paper intends to solve. In addition, the communication bandwidth and energy resource for the M2M devices are precious. Another issue the paper is addressing is the design of efficient security schemes being able to save both energy and communication bandwidth. In this paper, an authentication scheme applying authenticated identity-based cryptography without key-escrow mechanism has been proposed. In the proposed scheme, only partial secrets instead of full secrets are stored in the MSP, which could prevent the compromised MSP from endangering the whole system. The authenticated encryption property of the proposed scheme could leave out the work of signature generation, transmission, and verification so as to save the computation and communication resource of the whole system. The security analysis with Burrows-Abadi-Needham logic (BAN Logic) and Simple Promela Interpreter (SPIN) shows that the proposed scheme is well designed and could withstand Man-in-the-Middle attacks, impersonation attacks, replay attacks, DoS attacks, and compromised attacks. Copyright (c) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:1146 / 1157
页数:12
相关论文
共 50 条
  • [21] A Simple Scheme for Security and Access Control in Cyber-Physical Systems
    Vegh, Laura
    Miclea, Liviu
    [J]. 2015 20TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE, 2015, : 294 - 299
  • [22] Cyber Security Based on Artificial Intelligence for Cyber-Physical Systems
    Sedjelmaci, Hichem
    Guenab, Fateh
    Senouci, Sidi-Mohammed
    Moustafa, Hassnaa
    Liu, Jiajia
    Han, Shuai
    [J]. IEEE NETWORK, 2020, 34 (03): : 6 - 7
  • [23] Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security
    Doh, Inshil
    Chae, Kijoon
    Lim, Jiyoung
    Chung, Min Young
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2015, 21 (04): : 543 - 558
  • [24] Security in Cloud-based Cyber-physical Systems
    Puttonen, Juha
    Afolaranmi, Samuel Olaiya
    Moctezuma, Luis Gonzalez
    Lobov, Andrei
    Lastra, Jose L. Martinez
    [J]. 2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 671 - 676
  • [25] SDN-Based Handover Authentication Scheme for Mobile Edge Computing in Cyber-Physical Systems
    Wang, Cong
    Zhang, Yiying
    Chen, Xi
    Liang, Kun
    Wang, Zhiwei
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) : 8692 - 8701
  • [26] Behaviour-Based Security for Cyber-Physical Systems
    Serpanos, Dimitrios
    Shrobe, Howard
    Khan, Muhammad Taimoor
    [J]. ERCIM NEWS, 2016, (107): : 53 - 54
  • [27] CONFIDENTIALITY OF CYBER-PHYSICAL SYSTEMS USING EVENT-BASED CRYPTOGRAPHY
    Lima, Publio M.
    Carvalho, Lilian K.
    Moreira, Marcos, V
    [J]. IFAC PAPERSONLINE, 2020, 53 (02): : 1735 - 1740
  • [28] Smart-M3-Based Robot Interaction in Cyber-Physical Systems
    Teslya, Nikolay
    Savosin, Sergey
    [J]. PROCEEDINGS OF THE 2014 16TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT16), 2014, : 108 - 114
  • [29] Local Authentication and Access Control Scheme in M2M Communications With Computation Offloading
    Lin, Yi-Hui
    Huang, Jheng-Jia
    Fan, Chun-I
    Chen, Wen-Tsuen
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 3209 - 3219
  • [30] Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks
    Coruh, Ugur
    Bayat, Oguz
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,