Verifying a Safe P2P Security Protocol in M2M Communication Environment

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

P2P-based M2M Community Applications

This publication presents a novel concept for decentralised service and application provision in a Peer-to-Peer (P2P) connected Machine-To-Machine (M2M) network based on community mechanisms. Several execution environments are introduced and evaluated. Requirements are defined to achieve application/ service provision in M2M application fields. This publication also introduces an application, c...

متن کامل

Verifying a Time-Triggered Protocol in a Multi-language Environment

The multi-language environment Synchronie supports the design and formal veriication of synchronous reactive systems. Presently, Synchronie integrates three synchronous languages, Esterel, Lustre, and Argos. In the synchronous approach, not only the system but also its properties can be speciied using a synchronous language. In Syn-chronie properties can be formalised textually as Esterel or Lu...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Verification of an Authentication Protocol for M2M Communication Signal Processing

With the advancement of RFID/USN system technology, M2M (Machine-to-Machine) communication draws attention as a promising future industry. M2M communication is intended for inter-machine communication especially in a space hardly accessible to humans in such fields as disaster, safety, construction, health and welfare, weather, environment, logistics, national defense, medical care and agro-liv...

متن کامل

Analysis of a mobile communication security protocol

Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle design flaws. Formal verification techniques provide rigid and thorough means to evaluate security protocols. This paper demonstrates the process of formal verification by applying a logic to a security protocol intended ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Digital Convergence

سال: 2015

ISSN: 1738-1916

DOI: 10.14400/jdc.2015.13.5.213