A Distributed Authentication and Key Exchange Approach for Secure M2M Communications

被引:0
|
作者
Murthy, B. Satyanarayana [1 ]
Sumalatha, L. [2 ]
机构
[1] BVC Engn Coll, Allavaram, Andhra Pradesh, India
[2] JNTUK, Kakinada, Andhra Pradesh, India
关键词
authentication; M2M communications; lightweight-encryption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Machine to Machine (M2M) communication is the technology that is used in both wired and wireless technology in which the heterogeneous devices are networked to exchange sensitive information. The devices collect data from other such devices. This data may be prone to so many security threats. In this paper, we propose a simple authentication and key exchange mechanism based on a lightweight public key and symmetric encryption scheme. By using this, any M2M device could be authenticated by the other device. The formal analysis represents that the scheme could endure security attacks.
引用
收藏
页码:277 / 280
页数:4
相关论文
共 50 条
  • [1] Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks
    Coruh, Ugur
    Bayat, Oguz
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [2] Distributed Ledger Technologies for M2M Communications
    Zivic, Natasa
    Ruland, Christoph
    Sassmannshausen, Jochen
    33RD INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2019), 2019, : 301 - 306
  • [3] Efficient and Secure M2M Communications for Smart Metering
    Riker, Andre
    Cruz, Tiago
    Marques, Bruno
    Curado, Marilia
    Simoes, Paulo
    Monteiro, Edmundo
    2014 IEEE EMERGING TECHNOLOGY AND FACTORY AUTOMATION (ETFA), 2014,
  • [4] Extended group-based verification approach for secure M2M communications
    Prabhakara Rao T.
    Satyanarayana Murthy B.
    International Journal of Information Technology, 2023, 15 (5) : 2479 - 2488
  • [5] Terminal Authentication in M2M Communications in the Context of Internet of Things
    Ranjan, Aditya Kaushal
    Hussain, Muzzammil
    TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 34 - 42
  • [6] A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment
    Esfahani, Alireza
    Mantas, Georgios
    Matischek, Rainer
    Saghezchi, Firooz B.
    Rodriguez, Jonathan
    Bicaku, Ani
    Maksuti, Silia
    Tauber, Markus G.
    Schmittner, Christoph
    Bastos, Joaquim
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01): : 288 - 296
  • [7] An Efficient Secure Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN in Unattended Scenarios
    Lijun Gao
    Lu Zhang
    Lin Feng
    Maode Ma
    Wireless Personal Communications, 2020, 115 : 1603 - 1621
  • [8] An Efficient Secure Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN in Unattended Scenarios
    Gao, Lijun
    Zhang, Lu
    Feng, Lin
    Ma, Maode
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 115 (02) : 1603 - 1621
  • [9] Cooperative Architecture for Secure M2M Communication in Distributed Sensor Networking
    Jung, Sungmo
    Kim, Donghyun
    Kim, Seoksoo
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (03): : 175 - 184
  • [10] Local Authentication and Access Control Scheme in M2M Communications With Computation Offloading
    Lin, Yi-Hui
    Huang, Jheng-Jia
    Fan, Chun-I
    Chen, Wen-Tsuen
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 3209 - 3219