{"title":"用于安全M2M通信的分布式认证和密钥交换方法","authors":"B. Satyanarayana Murthy, L. Sumalatha","doi":"10.1109/ICATCCT.2017.8389148","DOIUrl":null,"url":null,"abstract":"Machine to Machine (M2M) communication is the technology that is used in both wired and wireless technology in which the heterogeneous devices are networked to exchange sensitive information. The devices collect data from other such devices. This data may be prone to so many security threats. In this paper, we propose a simple authentication and key exchange mechanism based on a lightweight public key and symmetric encryption scheme. By using this, any M2M device could be authenticated by the other device. The formal analysis represents that the scheme could endure security attacks.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A distributed authentication and key exchange approach for secure M2M communications\",\"authors\":\"B. Satyanarayana Murthy, L. Sumalatha\",\"doi\":\"10.1109/ICATCCT.2017.8389148\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Machine to Machine (M2M) communication is the technology that is used in both wired and wireless technology in which the heterogeneous devices are networked to exchange sensitive information. The devices collect data from other such devices. This data may be prone to so many security threats. In this paper, we propose a simple authentication and key exchange mechanism based on a lightweight public key and symmetric encryption scheme. By using this, any M2M device could be authenticated by the other device. The formal analysis represents that the scheme could endure security attacks.\",\"PeriodicalId\":123050,\"journal\":{\"name\":\"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)\",\"volume\":\"108 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICATCCT.2017.8389148\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICATCCT.2017.8389148","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A distributed authentication and key exchange approach for secure M2M communications
Machine to Machine (M2M) communication is the technology that is used in both wired and wireless technology in which the heterogeneous devices are networked to exchange sensitive information. The devices collect data from other such devices. This data may be prone to so many security threats. In this paper, we propose a simple authentication and key exchange mechanism based on a lightweight public key and symmetric encryption scheme. By using this, any M2M device could be authenticated by the other device. The formal analysis represents that the scheme could endure security attacks.