A Distributed Authentication and Key Exchange Approach for Secure M2M Communications

被引:0
|
作者
Murthy, B. Satyanarayana [1 ]
Sumalatha, L. [2 ]
机构
[1] BVC Engn Coll, Allavaram, Andhra Pradesh, India
[2] JNTUK, Kakinada, Andhra Pradesh, India
关键词
authentication; M2M communications; lightweight-encryption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Machine to Machine (M2M) communication is the technology that is used in both wired and wireless technology in which the heterogeneous devices are networked to exchange sensitive information. The devices collect data from other such devices. This data may be prone to so many security threats. In this paper, we propose a simple authentication and key exchange mechanism based on a lightweight public key and symmetric encryption scheme. By using this, any M2M device could be authenticated by the other device. The formal analysis represents that the scheme could endure security attacks.
引用
收藏
页码:277 / 280
页数:4
相关论文
共 50 条
  • [31] Security Challenges and Attacks in M2M Communications
    Imani, Amirhosein
    Keshavarz-Haddad, Alireza
    Eslami, Mohsen
    Haghighat, Javad
    2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2018, : 264 - 269
  • [32] A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks
    Qiu, Yue
    Ma, Maode
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (06) : 2074 - 2085
  • [33] M2M Communications Based on the M-Bus Protocol
    Schneppe, M. A. Schneps
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2012, 46 (02) : 83 - 89
  • [34] Anonymous mutual authentication with location privacy support for secure communication in M2M home network services
    Prosanta Gope
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 153 - 161
  • [35] Anonymous mutual authentication with location privacy support for secure communication in M2M home network services
    Gope, Prosanta
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (01) : 153 - 161
  • [36] M2M communications based on the M-Bus protocol
    M. A. Schneps-Schneppe
    Automatic Control and Computer Sciences, 2012, 46 (2) : 83 - 89
  • [37] Scheduling Optimization for M2M Communications in LTE-M
    Dawaliby, Samir
    Bradai, Abbas
    Pousset, Yannis
    2017 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2017,
  • [38] SAKES: Secure Authentication and Key Establishment Scheme for M2M Communication in the IP-Based Wireless Sensor Network (6LoWPAN)
    Hussen, Hassen Redwan
    Tizazu, Gebere Akele
    Ting, Miao
    Lee, Taekkyeun
    Choi, Youngjun
    Kim, Ki-Hyung
    2013 FIFTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2013, : 246 - 251
  • [39] Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things
    Lara, Evangelina
    Aguilar, Leocundo
    Sanchez, Mauricio A.
    Garcia, Jesus A.
    SENSORS, 2020, 20 (02)
  • [40] An Associated Behavior Sequence Based User Authentication Approach in M2M Mobile Terminals
    Shi, Congcong
    Du, Miao
    Lu, Weidong
    Lu, Sanglu
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,