Preventing Misuse of Duplicate Certificates in IoT/M2M Systems

被引:0
作者
Hsu, Yu-Hao [1 ]
Lin, Fuchun Joseph [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu, Taiwan
来源
2017 26TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN 2017) | 2017年
关键词
IoT; M2M; Security; Certificate; Authentication; oneM2M; OM2M; INTERNET; THINGS; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The IoT/M2M service providers need security mechanisms to avoid illegal usage of the service. Normally, this can be accomplished by using the certificate to authenticate the device before providing the service. In this paper, we consider the situation where a malicious user attempts to pay only for the service of a device but deploy the same certificate for many other devices to access the service illegally. To address this problem of duplicate certificates, we design two prevention mechanisms on top of the security framework defined in the oneM2M standard. Furthermore, we implement these two protection mechanisms on the OM2M platform and evaluate them in terms of their cost and performance in order to find the most suitable one for service providers.
引用
收藏
页数:8
相关论文
共 17 条
[1]  
Abomhara M., 2014, P IEEE INT C PRIV SE
[2]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[3]  
Hong Sunghyuck, 2008, [Journal of Internet Computing and Services, 인터넷정보학회논문지], V9, P69
[4]  
Hui Suo, 2012, Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE 2012), P648, DOI 10.1109/ICCSEE.2012.373
[5]  
IETF, 2008, TRANSPORT LAYER SECU
[6]  
Internet Engineering Task Force (IETF), 2005, PRESH KEY CIPH TRANS
[7]   Securing the Internet of Things: A Standardization Perspective [J].
Keoh, Sye Loong ;
Kumar, Sandeep S. ;
Tschofenig, Hannes .
IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (03) :265-275
[8]  
Michal Trojnara, 1998, STUNNEL DOCUMENTATIO
[9]  
Nie X, 2013, 2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), P906, DOI 10.1109/ICCSNT.2013.6967252
[10]   Cyberentity Security in the Internet of Things [J].
Ning, Huansheng ;
Liu, Hong ;
Yang, Laurence T. .
COMPUTER, 2013, 46 (04) :46-53