A Distributed Authentication and Key Exchange Approach for Secure M2M Communications

被引:0
|
作者
Murthy, B. Satyanarayana [1 ]
Sumalatha, L. [2 ]
机构
[1] BVC Engn Coll, Allavaram, Andhra Pradesh, India
[2] JNTUK, Kakinada, Andhra Pradesh, India
来源
PROCEEDINGS OF THE 2017 3RD INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT) | 2017年
关键词
authentication; M2M communications; lightweight-encryption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Machine to Machine (M2M) communication is the technology that is used in both wired and wireless technology in which the heterogeneous devices are networked to exchange sensitive information. The devices collect data from other such devices. This data may be prone to so many security threats. In this paper, we propose a simple authentication and key exchange mechanism based on a lightweight public key and symmetric encryption scheme. By using this, any M2M device could be authenticated by the other device. The formal analysis represents that the scheme could endure security attacks.
引用
收藏
页码:277 / 280
页数:4
相关论文
共 50 条
  • [21] BLOCK COMPRESSED SENSING BASED DISTRIBUTED RESOURCE ALLOCATION FOR M2M COMMUNICATIONS
    Chang, Yunyan
    Jung, Peter
    Zhou, Chan
    Stanczak, Slawomir
    2016 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING PROCEEDINGS, 2016, : 3791 - 3795
  • [22] IEEE 802.11AH: THE WIFI APPROACH FOR M2M COMMUNICATIONS
    Adame, Toni
    Bel, Albert
    Bellalta, Boris
    Barcelo, Jaume
    Oliver, Miquel
    IEEE WIRELESS COMMUNICATIONS, 2014, 21 (06) : 144 - 152
  • [23] Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security
    Doh, Inshil
    Chae, Kijoon
    Lim, Jiyoung
    Chung, Min Young
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2015, 21 (04): : 543 - 558
  • [24] An Authentication and Key Establishment Scheme to Enhance Security for M2M in 6LoWPANs
    Qiu, Yue
    Ma, Maode
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 2671 - 2676
  • [25] GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
    Modiri, Mohammad Mahdi
    Mohajeri, Javad
    Salmasizadeh, Mahmoud
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 12 (02): : 101 - 111
  • [26] Abstraction and Semantics support in M2M communications
    Cackovic, Vanesa
    Popovic, Zeljko
    2013 36TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2013, : 404 - 408
  • [27] Cognitive Radio Inspired M2M Communications
    Tragos, Elias Z.
    Angelakis, Vangelis
    2013 16TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS (WPMC), 2013,
  • [28] On MAC Protocols Performance for M2M Communications
    Ortiz-Guerra, Erik
    Otero Rojas, Miguel
    Montejo-Sanchez, Samuel
    Demo Souza, Richard
    Azurdia-Meza, Cesar A.
    Cespedes, Sandra
    2020 IEEE COLOMBIAN CONFERENCE ON COMMUNICATIONS AND COMPUTING (COLCOM), 2020,
  • [29] M2M Communications for Intraoral Sensors: A Wireless Communications Perspective
    Sannino, Gianpaolo
    Cianca, Ernestina
    Hamitouche, Chaffia
    Ruggieri, Marina
    FUTURE ACCESS ENABLERS FOR UBIQUITOUS AND INTELLIGENT INFRASTRUCTURES, 2015, 159 : 118 - 124
  • [30] Energy Efficient Cognitive M2M Communications
    Alabadi, S.
    Rapajic, Predrag
    Arshad, K.
    Rostami, Soheil
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2016, 8 (03) : 1 - 9