Verifying a Safe P2P Security Protocol in M2M Communication Environment
نویسندگان
چکیده
منابع مشابه
P2P-based M2M Community Applications
This publication presents a novel concept for decentralised service and application provision in a Peer-to-Peer (P2P) connected Machine-To-Machine (M2M) network based on community mechanisms. Several execution environments are introduced and evaluated. Requirements are defined to achieve application/ service provision in M2M application fields. This publication also introduces an application, c...
متن کاملVerifying a Time-Triggered Protocol in a Multi-language Environment
The multi-language environment Synchronie supports the design and formal veriication of synchronous reactive systems. Presently, Synchronie integrates three synchronous languages, Esterel, Lustre, and Argos. In the synchronous approach, not only the system but also its properties can be speciied using a synchronous language. In Syn-chronie properties can be formalised textually as Esterel or Lu...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملVerification of an Authentication Protocol for M2M Communication Signal Processing
With the advancement of RFID/USN system technology, M2M (Machine-to-Machine) communication draws attention as a promising future industry. M2M communication is intended for inter-machine communication especially in a space hardly accessible to humans in such fields as disaster, safety, construction, health and welfare, weather, environment, logistics, national defense, medical care and agro-liv...
متن کاملAnalysis of a mobile communication security protocol
Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle design flaws. Formal verification techniques provide rigid and thorough means to evaluate security protocols. This paper demonstrates the process of formal verification by applying a logic to a security protocol intended ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Digital Convergence
سال: 2015
ISSN: 1738-1916
DOI: 10.14400/jdc.2015.13.5.213