Extended group-based verification approach for secure M2M communications

被引:2
|
作者
Prabhakara Rao T. [1 ]
Satyanarayana Murthy B. [2 ]
机构
[1] Aditya Institute of Technology and Management, Tekkali
[2] BVC Engineering College, Odalarevu
关键词
Group based authentication; Key exchange; M2M networks; Mutual authentication; Secret key cryptosystem;
D O I
10.1007/s41870-023-01284-w
中图分类号
学科分类号
摘要
The M2M communication is a most widely used technology that can use both reliable and unreliable communication mechanism. We propose an efficient and group based strict verification mechanism for machine-to-machine (M2M) networks. The smart objects in a M2M networks are able to gather and enrich a wide variety of information from a resource constrained environments. And are also interacting with the components in a unconstrained environment without human involvement. The proposed scheme is used to allow any group of smart objects in an M2M environment authenticates mutually by sharing a common secret element (key) for exchanging information in a protected manner. The verification method purely based on mutual agreement among the smart objects/M2M nodes in an environment and there is no involvement of any service provider. The authentication process is coordinated among the smart objects and the gateway with the supervision of the service provider. The proposed mechanism requires the smart objects can obtain a secret session key generated by the service provider and group identity. Using this information, any smart object can authenticate with the gateway and with other objects in the network at home location as well as foreign location. The proposed scheme is also verified by using SPIN logic, a widely used verification tool. © 2023, The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management.
引用
收藏
页码:2479 / 2488
页数:9
相关论文
共 50 条
  • [1] GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
    Modiri, Mohammad Mahdi
    Mohajeri, Javad
    Salmasizadeh, Mahmoud
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 12 (02): : 101 - 111
  • [2] A Distributed Authentication and Key Exchange Approach for Secure M2M Communications
    Murthy, B. Satyanarayana
    Sumalatha, L.
    PROCEEDINGS OF THE 2017 3RD INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2017, : 277 - 280
  • [3] Efficient and Secure M2M Communications for Smart Metering
    Riker, Andre
    Cruz, Tiago
    Marques, Bruno
    Curado, Marilia
    Simoes, Paulo
    Monteiro, Edmundo
    2014 IEEE EMERGING TECHNOLOGY AND FACTORY AUTOMATION (ETFA), 2014,
  • [4] Spatial Group Based Random Access for M2M Communications
    Jang, Han Seung
    Kim, Su Min
    Ko, Kab Seok
    Cha, Jiyoung
    Sung, Dan Keun
    IEEE COMMUNICATIONS LETTERS, 2014, 18 (06) : 961 - 964
  • [5] GSL-AKA: Group-based Secure Lightweight Authentication and Key Agreement Protocol for M2M Communication
    Modiri, Mohammad Mahdi
    Mohajeri, Javad
    Salmasizadeh, Mahmoud
    2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2018, : 275 - 280
  • [6] Energy Group based Random Access Method for M2M Communications
    Shi Chen
    Zhao Honggang
    Li Xian
    2018 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC), 2018,
  • [7] Formal Verification of Connectivity Management Models in M2M Communications
    Nikolov, Anastas
    Atanasov, Ivaylo
    Pencheva, Evelina
    2016 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2016,
  • [8] An Efficient Group-Based Mobility Management Mechanism for Cellular M2M Networks
    Htike, Zaw
    Haniz, Azril
    Matsumura, Takeshi
    Kojima, Fumihide
    2021 IEEE 18TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2021,
  • [9] GBS-AKA: Group-based Secure Authentication and Key Agreement for M2M in 4G Network
    Yao, Jiming
    Wang, Tao
    Chen, Mingkai
    Wang, Lei
    Chen, Gejuan
    2016 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING RESEARCH AND INNOVATION - ICCCRI 2016, 2016, : 42 - 48
  • [10] A Group-Based Massive Multiple Access Scheme in Cellular M2M Networks
    Xiong, Xiong
    Hou, Lu
    Zhao, Long
    COMPUTER COMMUNICATIONS, 2018, 121 : 44 - 49