A Distributed Authentication and Key Exchange Approach for Secure M2M Communications

被引:0
|
作者
Murthy, B. Satyanarayana [1 ]
Sumalatha, L. [2 ]
机构
[1] BVC Engn Coll, Allavaram, Andhra Pradesh, India
[2] JNTUK, Kakinada, Andhra Pradesh, India
来源
PROCEEDINGS OF THE 2017 3RD INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT) | 2017年
关键词
authentication; M2M communications; lightweight-encryption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Machine to Machine (M2M) communication is the technology that is used in both wired and wireless technology in which the heterogeneous devices are networked to exchange sensitive information. The devices collect data from other such devices. This data may be prone to so many security threats. In this paper, we propose a simple authentication and key exchange mechanism based on a lightweight public key and symmetric encryption scheme. By using this, any M2M device could be authenticated by the other device. The formal analysis represents that the scheme could endure security attacks.
引用
收藏
页码:277 / 280
页数:4
相关论文
共 50 条
  • [41] Research on the Key Technology of M2M Gateway
    Liu, Lianru
    Gu, Minxia
    Ma, Yan
    HUMAN CENTERED COMPUTING, HCC 2014, 2015, 8944 : 837 - 843
  • [42] Towards a Secure Mutual Authentication and Key Exchange Protocol for Mobile Communications
    He, Yijun
    Lee, Moon-Chuen
    2008 6TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC AND WIRELESS NETWORKS AND WORKSHOPS, VOLS 1 AND 2, 2008, : 216 - 222
  • [43] A secure key exchange and mutual authentication protocol for wireless mobile communications
    He Yijun
    Xu Nan
    Li Jie
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 558 - +
  • [44] Secure Multimedia Content Distribution for M2M Communication
    Ye, Conghuan
    Xiong, Zenggang
    Ding, Yaoming
    Zhang, Xuemin
    Wang, Guangwei
    Xu, Fang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 279 - 288
  • [45] An Improved Random Access Scheme for M2M Communications
    Yali Wu
    Guixia Kang
    Yanyan Guo
    Xia Zhu
    Ningbo Zhang
    中国通信, 2016, 13 (06) : 12 - 21
  • [46] Computing Resource Constraint in Wireless M2M Communications
    Liao, Yun
    Song, Lingyang
    2016 IEEE 17TH INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS (SPAWC), 2016,
  • [47] STANDARDIZING MACHINE-TO-MACHINE (M2M) COMMUNICATIONS
    Parsons, Glenn
    IEEE COMMUNICATIONS MAGAZINE, 2016, 54 (12) : 2 - 3
  • [48] Identification and Analysis of Charging Factors in M2M Communications
    Lin, Fuchun J.
    Tsai, Wandu
    Cerritos, Eduardo
    Lin, Bo-Ting
    Hu, Wan-Hsun
    2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2015, : 160 - 165
  • [49] A Dynamic Rate Adaptation Scheme for M2M Communications
    Wu, Yalong
    Yu, Wei
    Griffith, David
    Golmie, Nada
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [50] Scalable hybrid MAC protocol for M2M communications
    Ghazvini, Farshad Keyvan
    Mehmet-Ali, Mustafa
    Doughan, Mahmoud
    COMPUTER NETWORKS, 2017, 127 : 151 - 160