Verification of an Authentication Protocol for M2M Communication Signal Processing
نویسنده
چکیده
With the advancement of RFID/USN system technology, M2M (Machine-to-Machine) communication draws attention as a promising future industry. M2M communication is intended for inter-machine communication especially in a space hardly accessible to humans in such fields as disaster, safety, construction, health and welfare, weather, environment, logistics, national defense, medical care and agro-livestock industries where such systems are installed and operated long hours. In effect, machines replace men in M2M communication to the extent that programs automatically run in accordance with varying situations, e.g. giving failure alarms and taking proper actions for electronic devices and vehicles, with a view to efficiency in information control and device operation. Still, wireless M2M communication between devices could be exposed to attackers causing security vulnerabilities. Therefore, proper security measures including cross-authentication need taking to ensure relevant devices are legitimate. This paper, quite a few studies have investigated many protocols in relation to M2M security issues. Likewise, the present study attempted to solve M2M security issues by means of public keys, hash functions and XOR and suggested a secure protocol based on M2M authentication. The proposed protocol proved secure in a formal verification using Casper/FDR instead of any theorem proving method, which was used in most of previous studies.
منابع مشابه
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملارائه طرح احراز اصالت سبک با قابلیت گمنامی و اعتماد در اینترنت اشیا
The Internet of Things (IoT), is a new concept that its emergence has caused ubiquity of sensors in the human life. All data are collected, processed, and transmitted by these sensors. As the number of sensors increases, the first challenge in establishing a secure connection is authentication between sensors. Anonymity, lightweight, and trust between entities are other main issues that shoul...
متن کاملAn efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks
The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...
متن کاملA Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment
In the emerging Industrial IoT era, Machine-toMachine (M2M) communication technology is considered as a key underlying technology for building Industrial IoT environments where devices (e.g., sensors, actuators, gateways) are enabled to exchange information with each other in an autonomous way without human intervention. However, most of the existing M2M protocols that can be also used in the I...
متن کامل