Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks

被引:4
|
作者
Coruh, Ugur [1 ]
Bayat, Oguz [1 ]
机构
[1] Altinbas Univ, Grad Sch Sci & Engn, Istanbul, Turkey
关键词
PRIVACY PRESERVATION; MACHINE COMMUNICATIONS; WIMAX NETWORKS; EFFICIENT; LINKABILITY; SIGNATURES; PROTOCOL;
D O I
10.1155/2018/6563089
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we analyzed Sun et al.'s scheme which proposes an M2M (Machine-to-Machine) secure communication scheme by using existing TD SCMA (Time Division-Synchronous Code Division Multiple Access) networks. They offer a password-based authentication and key establishment protocol for mutual authentication. Moreover, their proposed secure channel establishment protocol uses symmetric cryptography and one-way hash algorithms and they considered using their protected channel model for mobile users and smart home networks. In this paper, we propose to complete the missing part of Sun et al.'s scheme. This can occur by addressing privacy-preserving and message modification protection. Moreover, improvements can be made to M l'I'M (Man-In-The-Middle) attack resistance, anomaly detection and DoS (Denial-of-Service) attacks with timing. ECDH (Elliptic Curve Diffie Hellman) cryptography based protected cipher-key exchange operation used on initial setup and key-injection operations to provide secure user registration, user password change and home gateway network join phases. We simulated both the proposed and Sun et al.'s schemes. We analyzed Sun et al.'s scheme for performance, network congestion and resource usage. Missing privacy-preserving was analyzed and compared with the GLARM scheme, and the storage cost of each phase was analyzed according to Ferrag et al.'s survey proposal. In Sun et al.'s scheme, future work for the security architecture of the home network is related to Li et al.'s protocol being implemented in our proposed design.
引用
收藏
页数:25
相关论文
共 50 条
  • [1] A Distributed Authentication and Key Exchange Approach for Secure M2M Communications
    Murthy, B. Satyanarayana
    Sumalatha, L.
    [J]. PROCEEDINGS OF THE 2017 3RD INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2017, : 277 - 280
  • [2] A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks
    Qiu, Yue
    Ma, Maode
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (06) : 2074 - 2085
  • [3] Efficient and Secure Resource Management in Home M2M Networks
    Lai, Yue
    Kang, Jiawen
    Yu, Rong
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [4] An Efficient Secure Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN in Unattended Scenarios
    Gao, Lijun
    Zhang, Lu
    Feng, Lin
    Ma, Maode
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 115 (02) : 1603 - 1621
  • [5] An Efficient Secure Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN in Unattended Scenarios
    Lijun Gao
    Lu Zhang
    Lin Feng
    Maode Ma
    [J]. Wireless Personal Communications, 2020, 115 : 1603 - 1621
  • [6] A Chaos-based Authentication and Key Management Scheme for M2M Communication
    Boubakri, Wided
    Abdallah, Walid
    Boudriga, Noureddine
    [J]. 2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 366 - 371
  • [7] An Authentication and Key Establishment Scheme to Enhance Security for M2M in 6LoWPANs
    Qiu, Yue
    Ma, Maode
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 2671 - 2676
  • [8] Design of a Secure Password-Based Authentication scheme for M2M Networks in IoT Enabled Cyber-Physical Systems
    Renuka, K. M.
    Kumari, Saru
    Zhao, Dongning
    Li, Li
    [J]. IEEE ACCESS, 2019, 7 : 51014 - 51027
  • [9] An Energy Efficient, Fault Tolerant and Secure Clustering Scheme for M2M Communication Networks
    Karim, Lutful
    Anpalagan, Alagan
    Nasser, Nidal
    Almhana, Jalal N.
    Woungang, Isaac
    [J]. 2013 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2013, : 677 - 682
  • [10] Lightweight Blockchain-Based Scheme to Secure Wireless M2M Area Networks
    Bilami, Karam Eddine
    Lorenz, Pascal
    [J]. FUTURE INTERNET, 2022, 14 (05):