A security gateway application for End-to-End M2M communications

被引:19
作者
Chen, Hsing-Chung [1 ,2 ]
You, Ilsun [3 ]
Weng, Chien-Erh [4 ]
Cheng, Chia-Hsin [5 ]
Huang, Yung-Fa [6 ]
机构
[1] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
[2] China Med Univ Taichung, China Med Univ Hosp, Dept Med Res, Taichung 40402, Taiwan
[3] Soon Chun Hyang Univ, Asan, South Korea
[4] Natl Kaohsiung Marine Univ, Kaohsiung, Taiwan
[5] Natl Formosa Univ, Taipei, Taiwan
[6] Chaoyang Univ Technol, Chaoyang, Taiwan
关键词
Security gateway application; IoTs; M2M; End-to-End; Mutual authentication; MECHANISM; PROTOCOL;
D O I
10.1016/j.csi.2015.09.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
M2M (Machine-to-Machine) communication for the Internet of Things (IoTs) system is considered to be one of the major issues in future networks. Considering the characteristics of M2M networks in IoTs systems, traditional security solutions are not able to be applied to E2E (End-to-End) M2M networks because the M2M network itself is vulnerable to various attacks. We consider security aspects for M2M communications and then propose a security gateway application (SGA) including the lightweight symmetric key cryptographic negotiation function, secure E2E M2M key exchange generation function and secure E2E M2M messages delivery function. The proposal of the SGA is newly suggested to improve the gateway application (GA) of the ITU-T M2M service layer in the IoTs reference model. We prove that it could prevent various attacks via the theoretical security analyses. Therefore, it could meet the basic security requirements of the M2M service layer. (C) 2015 Elsevier B.V. All rights reserved,
引用
收藏
页码:85 / 93
页数:9
相关论文
共 21 条
  • [1] Akram RN, 2014, 8 WORKSH INF SEC THE, P124
  • [2] [Anonymous], 2012, OV INT THINGS
  • [3] Atzori L., 2010, ELSEVIER COMPUTER NE, V54
  • [4] Chen H.C., 2010, NCM2010 6 INT C NETW, P665
  • [5] Chen HC, 2014, P 2014 8 INT C INN M, P258, DOI DOI 10.1109/IMIS.201432
  • [6] Chen HC, 2013, 8 INT C EMB MULT COM
  • [7] Chen HC, 2010, IET INT C FRONT COMP, P275
  • [8] A Rotation Session Key-based Transposition Cryptosystem Scheme Applied to Mobile Text Chatting
    Chen, Hsing-Chung
    Epa, Alpha Liezel V.
    [J]. 2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 497 - 503
  • [9] A Secure E-Mail Protocol Using ID-based FNS Multicast Mechanism
    Chen, Hsing-Chung
    Yang, Cheng-Ying
    Su, Hui-Kai
    Wei, Ching-Chuan
    Lee, Chao-Ching
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 11 (03) : 1091 - 1112
  • [10] Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy
    Chen, Hsing-Chung
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (01) : 100 - 107