Token-based authentication method for M2M platforms

被引:4
|
作者
Polat, Huseyin [1 ]
Oyucu, Saadin [1 ]
机构
[1] Gazi Univ, Fac Technol, Dept Comp Engn, Ankara, Turkey
关键词
Authentication; token-based authentication; M2M platforms; M2M authentication;
D O I
10.3906/elk-1608-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays the fields in which machine-to-machine (M2M) applications are used and the numbers of M2M devices and users are increasing gradually. In an M2M application, M2M platforms are used in order to follow and analyze the data presented by M2M devices. The communication of multiple users and devices via an M2M platform causes some problems in terms of security. In this study, an M2M platform has been developed by using RestFul web services and NoSQL database. On this platform a token-based authentication method was used for multiple users and devices. In this method, an authorized request approach was adopted for authorized users and an unauthorized request approach was adopted for unauthorized users. In the token-based authentication method on the M2M platform no session information is kept. Thanks to the adopted method, in multiple processes carried out on the platform, not only was data traffic density decreased, but also security level was increased for both user and device authentication.
引用
收藏
页码:2956 / 2967
页数:12
相关论文
共 50 条
  • [1] Token-Based Authentication Techniques on Open Source Cloud Platforms
    Banerjee, Amit
    Hasan, Mahamudul
    [J]. SISTEMAS & TELEMATICA, 2018, 16 (47): : 9 - 29
  • [2] Token-based Authentication for Smartphones
    Koschuch, Manuel
    Hudler, Matthias
    Eigner, Hubert
    Saffer, Zsolt
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON DATA COMMUNICATION NETWORKING (DCNET 2013), 2013, : 49 - 54
  • [3] Token-based graphical password authentication
    John Charles Gyorffy
    Andrew F. Tappenden
    James Miller
    [J]. International Journal of Information Security, 2011, 10 : 321 - 336
  • [4] Token-based graphical password authentication
    Gyorffy, John Charles
    Tappenden, Andrew F.
    Miller, James
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (06) : 321 - 336
  • [5] Token-based authentication for Hadoop platform
    Haggag, Mohamed
    Tantawy, Mohsen M.
    El-Soudani, Magdy M. S.
    [J]. AIN SHAMS ENGINEERING JOURNAL, 2023, 14 (04)
  • [6] Performance Management of IoT/M2M Platforms
    Kuo, Hsien Chung
    Lin, Fuchun Joseph
    [J]. 2016 IEEE SIXTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS (ICCE), 2016, : 119 - 124
  • [7] M2M Service Platforms and Device Management
    Danila, Iulian
    Dobrescu, Radu
    Popescu, Dan
    Marcu, Roxana
    Ichim, Loretta
    [J]. 2015 9TH INTERNATIONAL SYMPOSIUM ON ADVANCED TOPICS IN ELECTRICAL ENGINEERING (ATEE), 2015, : 67 - 72
  • [8] Software platforms for internet of things and M2M
    TCS Innovation Labs, Tata Consultancy Services Ltd., India
    [J]. J Indian Inst Sci, 2013, 3 (487-497):
  • [9] OpenStack-based Highly Scalable IoT/M2M Platforms
    de la Bastida, David
    Lin, Fuchun Joseph
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2017, : 711 - 718
  • [10] Towards Agile Application Integration with M2M Platforms
    Chen, Menghan
    Shen, Beijun
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (01): : 84 - 97