Extended group-based verification approach for secure M2M communications

被引:2
|
作者
Prabhakara Rao T. [1 ]
Satyanarayana Murthy B. [2 ]
机构
[1] Aditya Institute of Technology and Management, Tekkali
[2] BVC Engineering College, Odalarevu
关键词
Group based authentication; Key exchange; M2M networks; Mutual authentication; Secret key cryptosystem;
D O I
10.1007/s41870-023-01284-w
中图分类号
学科分类号
摘要
The M2M communication is a most widely used technology that can use both reliable and unreliable communication mechanism. We propose an efficient and group based strict verification mechanism for machine-to-machine (M2M) networks. The smart objects in a M2M networks are able to gather and enrich a wide variety of information from a resource constrained environments. And are also interacting with the components in a unconstrained environment without human involvement. The proposed scheme is used to allow any group of smart objects in an M2M environment authenticates mutually by sharing a common secret element (key) for exchanging information in a protected manner. The verification method purely based on mutual agreement among the smart objects/M2M nodes in an environment and there is no involvement of any service provider. The authentication process is coordinated among the smart objects and the gateway with the supervision of the service provider. The proposed mechanism requires the smart objects can obtain a secret session key generated by the service provider and group identity. Using this information, any smart object can authenticate with the gateway and with other objects in the network at home location as well as foreign location. The proposed scheme is also verified by using SPIN logic, a widely used verification tool. © 2023, The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management.
引用
收藏
页码:2479 / 2488
页数:9
相关论文
共 50 条
  • [41] Secure Multimedia Content Distribution for M2M Communication
    Ye, Conghuan
    Xiong, Zenggang
    Ding, Yaoming
    Zhang, Xuemin
    Wang, Guangwei
    Xu, Fang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 279 - 288
  • [42] An Improved Random Access Scheme for M2M Communications
    Yali Wu
    Guixia Kang
    Yanyan Guo
    Xia Zhu
    Ningbo Zhang
    中国通信, 2016, 13 (06) : 12 - 21
  • [43] Computing Resource Constraint in Wireless M2M Communications
    Liao, Yun
    Song, Lingyang
    2016 IEEE 17TH INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS (SPAWC), 2016,
  • [44] STANDARDIZING MACHINE-TO-MACHINE (M2M) COMMUNICATIONS
    Parsons, Glenn
    IEEE COMMUNICATIONS MAGAZINE, 2016, 54 (12) : 2 - 3
  • [45] Identification and Analysis of Charging Factors in M2M Communications
    Lin, Fuchun J.
    Tsai, Wandu
    Cerritos, Eduardo
    Lin, Bo-Ting
    Hu, Wan-Hsun
    2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2015, : 160 - 165
  • [46] A Dynamic Rate Adaptation Scheme for M2M Communications
    Wu, Yalong
    Yu, Wei
    Griffith, David
    Golmie, Nada
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [47] Scalable hybrid MAC protocol for M2M communications
    Ghazvini, Farshad Keyvan
    Mehmet-Ali, Mustafa
    Doughan, Mahmoud
    COMPUTER NETWORKS, 2017, 127 : 151 - 160
  • [48] M2M communications: Data capture without borders
    David, Mark
    Electronic Design, 2005, 53 (07)
  • [49] THE MARKET POTENTIAL OF M2M COMMUNICATIONS FOR TELECOMMUNICATIONS OPERATORS
    Perakovic, Dragan
    Husnjak, Sinisa
    Forenbacher, Ivan
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON TRAFFIC AND TRANSPORT ENGINEERING (ICTTE), 2012, : 211 - 218
  • [50] Industrial Applications Drive Satellite M2M Communications
    Hightower, Dawn
    MICROWAVES & RF, 2010, 49 (09) : 20 - 20