An Authentication Framework for Multi-Domain Machine-to-Machine Communication in Cyber-Physical Systems

被引:0
作者
Chen, Shuo [1 ]
Ma, Maode [1 ]
Luo, Zhenxing [2 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore, Singapore
[2] Washington Univ, Dept Elect & Syst Engn, St Louis, MO USA
来源
2015 IEEE GLOBECOM WORKSHOPS (GC WKSHPS) | 2015年
关键词
Authentication; M2M; IBC;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the near future, the cyber-physical system (CPS), will have all the objects in the cyber world and the physical world connected. The speed of information exchange and processing will be faster, while the abilities of controlling facilities and handling events will be more powerful and our lives will be better. In the CPS, machine to machine (M2M) communication is in charge of data collection and transmission which utilizes both wireless and wired systems to monitor physical or environmental conditions and exchange the information among different systems without direct human intervention. As a part of CPS, M2M communication is considerable important while being fragile at the same time because M2M communication still faces lots of security threats. There are some security vulnerabilities that yet to be solved. In this paper, we propose a novel distributed authentication framework for multi-domain M2M environment. The proposed framework applies hybrid encryption scheme involving identity-based cryptography (IBC) and advanced encryption standard (AES). The security analysis shows that the proposed framework is well designed and could withstand Man-in-the-Middle attacks, impersonation attacks, reply attacks and compromised attacks, etc.
引用
收藏
页数:6
相关论文
共 11 条
  • [1] Cardenas Alvaro A., 2008, 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P495, DOI 10.1109/ICDCS.Workshops.2008.40
  • [2] Chen Hongsong, 2011, 2011 IEEE International Conference on Vehicular Electronics and Safety (ICVES 2011), P286, DOI 10.1109/ICVES.2011.5983830
  • [3] Machine-to-Machine Communications: Architectures, Standards and Applications
    Chen, Min
    Wan, Jiafu
    Li, Fang
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (02): : 480 - 497
  • [4] Kim J. M., 2013, SECURITY COMMUNI FEB
  • [5] Kumar A, 2012, INT J SECUR APPL, V6, P19
  • [6] Lui Sha, 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC '08), P1
  • [7] Lynn B, 2002, IACR CRYPTOLOGY EPRI, V2002, P72
  • [8] Sun X., 2012, SECURITY COMMUNI MAY
  • [9] Tien-Dung Nguyen, 2010, Proceedings of the 2010 Sixth International Conference on Networked Computing and Advanced Information Management (NCM 2010), P248
  • [10] Yan Zhu, 2013, Wireless Algorithms, Systems, and Applications. 8th International Conference, WASA 2013. Proceedings. LNCS 7992, P42, DOI 10.1007/978-3-642-39701-1_4