An anonymous authentication scheme for multi-domain machine-to-machine communication in cyber-physical systems

被引:12
|
作者
Qiu, Yue [1 ]
Ma, Maode [1 ]
Chen, Shuo [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore, Singapore
关键词
Authentication; M2M; Multi-domain; Anonymous; M2M COMMUNICATIONS; SECURITY;
D O I
10.1016/j.comnet.2017.10.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet has made our planet a smaller world while the cyber world and the physical world have not been integrated seamlessly. In the future cyber-physical system (CPS), all objects in the physical world would be connected to the cyber world for achieving faster information processing, more accurate control and real-time response. Our abilities of controlling facilities and handling events will be much more powerful to make our lives much better. In the CPS, the machine-to-machine (M2M) communication, which is in charge of data collection, utilizes both wireless and wired systems to monitor environmental conditions and transmits the information among different systems without direct human intervention. As a part of the CPS, the M2M communication is considerable important while being fragile at the same time since M2M communication still faces lots of security threats. There are some security vulnerabilities that yet to be solved. In this paper, we propose an anonymous authentication scheme for multi-domain M2M environment. The proposed scheme applies hybrid encryption scheme involving certificateless cryptography and advanced encryption standard (AES) to achieve the authentication and anonymity properties. The security analysis with Burrows-Abadi-Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) shows that the proposed scheme is well designed and could withstand multiple attacks, such as man-in-the-middle attacks, replay attacks, DoS attacks, impersonation attacks and compromised attacks. (C) 2017 Published by Elsevier B.V.
引用
收藏
页码:306 / 318
页数:13
相关论文
共 50 条
  • [31] Compositional Falsification of Cyber-Physical Systems with Machine Learning Components
    Dreossi, Tommaso
    Donze, Alexandre
    Seshia, Sanjit A.
    JOURNAL OF AUTOMATED REASONING, 2019, 63 (04) : 1031 - 1053
  • [32] Compositional Falsification of Cyber-Physical Systems with Machine Learning Components
    Tommaso Dreossi
    Alexandre Donzé
    Sanjit A. Seshia
    Journal of Automated Reasoning, 2019, 63 : 1031 - 1053
  • [33] Ensemble Machine Learning for Intrusion Detection in Cyber-Physical Systems
    Li, Hongwei
    Chasaki, Danai
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM WKSHPS 2021), 2021,
  • [34] ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems
    Li, Jiangnan
    Yang, Yingyuan
    Sun, Jinyuan Stella
    Tomsovic, Kevin
    Qi, Hairong
    ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 52 - 66
  • [35] Compositional Falsification of Cyber-Physical Systems with Machine Learning Components
    Dreossi, Tommaso
    Donze, Alexandre
    Seshia, Sanjit A.
    NASA FORMAL METHODS (NFM 2017), 2017, 10227 : 357 - 372
  • [36] Machine Learning for Threat Recognition in Critical Cyber-Physical Systems
    Perrone, Paola
    Flammini, Francesco
    Setola, Roberto
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 298 - 303
  • [37] Development of machine tool communication method and its edge middleware for cyber-physical manufacturing systems
    Al Sunny, S. M. Nahian
    Liu, Xiaoqing Frank
    Shahriar, Md Rakib
    INTERNATIONAL JOURNAL OF COMPUTER INTEGRATED MANUFACTURING, 2023, 36 (07) : 1009 - 1030
  • [38] SLAP: A Secure and Lightweight Authentication Protocol for machine-to-machine communication in industry 4.0
    Panda, Suryakanta
    Mondal, Samrat
    Kumar, Neeraj
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 98
  • [39] Cyber-Physical Machine Tool - the Era of Machine Tool 4.0
    Liu, Chao
    Xu, Xun
    MANUFACTURING SYSTEMS 4.0, 2017, 63 : 70 - 75
  • [40] Dynamic Preamble Grouping and Access Control Scheme in Machine-to-Machine Communication
    Zhao, Xiaoyan
    Wang, Cheng
    Wang, Weidong
    2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,