M2M Security: Challenges and Solutions

被引:79
作者
Barki, Amira [1 ,2 ]
Bouabdallah, Abdelmadjid [1 ]
Gharout, Said [3 ]
Traore, Jacques [2 ]
机构
[1] Univ Paris 04, Univ Technol Compiegne, CNRS, UMR Heudiasyc 7253, F-60203 Compiegne, France
[2] Orange Labs, F-14000 Caen, France
[3] Orange Labs, F-92320 Chatillon, France
关键词
Machine-to-machine ( M2M); applications; architecture; security; privacy; MACHINE COMMUNICATIONS; AUTHENTICATION SCHEME; KEY MANAGEMENT; PRIVACY; COMMUNICATION; NETWORKS; ATTACKS; ISSUES;
D O I
10.1109/COMST.2016.2515516
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine-to-machine (M2M) is one of the emergent technologies that has attracted a lot of attention in both industrial and academic sectors, and which is expected to grow in the next few years. Indeed, it opens the way to the Internet of Things (IoT), an internet where all devices are connected and communicate without any human intervention. Yet, an important hurdle that may slow down M2M growth and even hinder the massive roll-out of certain applications is security. Even though there has been a lot of research on M2M, nevertheless only few focus on the security aspects. As a fusion of heterogeneous networks, M2M poses a number of challenges, particularly to security design. In this paper, we provide a survey on M2M research and development works that mainly addresses security and more precisely the threats thatM2M communications have to face. We also tackle the challenges that arise when trying to secure M2M communications along with an investigation of the existing approaches aiming to do so. Finally, we give a general comparison of existing solutions regarding some selected parameters.
引用
收藏
页码:1241 / 1254
页数:14
相关论文
共 68 条
[1]  
3GPP, 2015, 3GPP TS 26 267 V13 0
[2]  
Adiga B., 2012, PROC 1 INT C SECUR I, P68
[3]  
[Anonymous], 2010, 2010 IEEE LONG ISL S
[4]  
[Anonymous], 2011, 284233149 ER UEN
[5]  
[Anonymous], 2012, 2012 5 INT C NEW TEC
[6]  
[Anonymous], 2009, P C USENIX SEC S
[7]  
[Anonymous], 5193 RFC
[8]  
Au MH, 2006, LECT NOTES COMPUT SC, V4116, P111
[9]   A New Payment System for Enhancing Location Privacy of Electric Vehicles [J].
Au, Man Ho ;
Liu, Joseph K. ;
Fang, Junbin ;
Jiang, Zoe L. ;
Susilo, Willy ;
Zhou, Jianying .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2014, 63 (01) :3-18
[10]   Energy-efficient physical layer packet authenticator for machine-to-machine networks [J].
Bartoli, A. ;
Hernandez-Serrano, J. ;
Leon, O. ;
Kountouris, A. ;
Barthel, D. .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2013, 24 (04) :401-412