Security threats in M2M networks: A survey with case study

被引:0
|
作者
Hussain, Fatima [1 ]
Ferdouse, Lilatul [1 ]
Anpalagan, Alagan [1 ]
Karim, Lutful [2 ]
Woungang, Isaac [3 ]
机构
[1] Ryerson Univ, Dept Elect & Comp Engn, Toronto, ON, Canada
[2] Seneca Coll Appl Arts & Technol, Sch ICT, Toronto, ON, Canada
[3] Ryerson Univ, Dept Comp Sci, Toronto, ON, Canada
来源
关键词
AUTHENTICATION;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security requirements such as key establishment and authentication are crucial in machine-to-machine (M2M) networks. No matter how strong an encryption or an authentication algorithm is, if the distribution of keys is inefficiently managed and carelessly designed, that scheme is doomed to fail. This paper presents a study of potential security issues in M2M networks especially related to the authentication and key agreement phases. One of the important problems is authentication signalling congestion problem which creates overload in radio access part and core network part of the M2M network. Several group based authentication and key agreement schemes have been proposed to solve this congestion problem. Among key management protocols, most prominent is Internet Key Exchange (IKE) used with IPSec. This paper presents a comprehensive survey on IKE and its variants along with their case studies in smart grid and smart home. The goal of this paper is: i) to provide a survey on the main security issues in M2M wireless communication, ii) to discuss the main security approaches, and iii) to discuss various security issues in home area networks and recent security enhancements with a case study.
引用
收藏
页码:117 / 135
页数:19
相关论文
共 50 条
  • [1] A survey on information security threats and solutions for Machine to Machine (M2M) communications
    Tuna, Gurkan
    Kogias, Dimitrios G.
    Gungor, V. Cagri
    Gezer, Cengiz
    Taskin, Erhan
    Ayday, Erman
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2017, 109 : 142 - 154
  • [2] A Survey on M2M Service Networks
    Latvakoski, Juhani
    Iivari, Antti
    Vitic, Paul
    Jubeh, Bashar
    Ben Alaya, Mahdi
    Monteil, Thierry
    Lopez, Yoann
    Talavera, Guillermo
    Gonzalez, Javier
    Granqvist, Niclas
    Kellil, Monir
    Ganem, Herve
    Vaisanen, Teemu
    [J]. COMPUTERS, 2014, 3 (04) : 130 - 173
  • [3] Internet of Things - Security threats and challenges in M2M Devices
    Abdullah, Syed Muhammad
    Shah, Munam Ali
    [J]. 2018 24TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC' 18), 2018, : 541 - 547
  • [4] A Survey of Recent Developments in Home M2M Networks
    Chen, Min
    Wan, Jiafu
    Gonzalez, Sergio
    Liao, Xiaofei
    Leung, Victor C. M.
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01): : 98 - 114
  • [5] M2M Security: Challenges and Solutions
    Barki, Amira
    Bouabdallah, Abdelmadjid
    Gharout, Said
    Traore, Jacques
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1241 - 1254
  • [6] Management in M2M networks
    Cackovic, V.
    Popovic, Z.
    [J]. 2014 37TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2014, : 501 - 506
  • [7] M2M Security Threat and Security Mechanism Research
    Nie, Xiao
    Zhai, Xiaobing
    [J]. 2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2013, : 906 - 909
  • [8] A Survey on Security Issues of M2M Communications in Cyber-Physical Systems
    Chen, Dong
    Chang, Guiran
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (01): : 24 - 45
  • [9] Security Challenges and Attacks in M2M Communications
    Imani, Amirhosein
    Keshavarz-Haddad, Alireza
    Eslami, Mohsen
    Haghighat, Javad
    [J]. 2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2018, : 264 - 269
  • [10] A Study on M2M Traffic and Its Impact on Cellular Networks
    Centenaro, Marco
    Vangelista, Lorenzo
    [J]. 2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2015, : 154 - 159