2012
DOI: 10.1002/sec.551
|View full text |Cite
|
Sign up to set email alerts
|

A security authentication scheme in machine‐to‐machine home network service

Abstract: Machine-to-machine (M2M) techniques have significant application potential in the emerging internet of things, which may cover many fields from intelligence to ubiquitous environment. However, because of the data exposure when transmitted via cable, wireless mobile devices, and other technologies, its security vulnerability has become a great concern during its further extending development. This problem may even get worse if the user privacy and property are considered. Therefore, the authentication process o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
120
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(122 citation statements)
references
References 7 publications
(11 reference statements)
2
120
0
Order By: Relevance
“…These authentication protocols use three ideas, namely, Timestamp, Hash function, and Random numbers. The idea of random numbers is used by [41,56,40], and [42]. The idea of hash function is used by protocols [52] and [155], such as the IPSec protocol implements an anti-replay mechanism based on Message Authentication Code (MAC) [167].…”
Section: Replay Attackmentioning
confidence: 99%
“…These authentication protocols use three ideas, namely, Timestamp, Hash function, and Random numbers. The idea of random numbers is used by [41,56,40], and [42]. The idea of hash function is used by protocols [52] and [155], such as the IPSec protocol implements an anti-replay mechanism based on Message Authentication Code (MAC) [167].…”
Section: Replay Attackmentioning
confidence: 99%
“…Because the previous works in [7,10,11] do not mention which cryptography algorithm is used in their scheme, only the works in [6,8,9] are compared. Moreover, because the works in [6,8,9] just directly utilize the standardized cryptography algorithms, Table IV only list their underlay algorithms. An authentication scheme with IBC for M2M security in CPS S. Chen, M. Ma and Z. Luo From Table IV, it is obvious that the proposed work in this paper would bring more overhead than the previous works because the proposed work utilizes the AIBCwKE mechanism, which is asymmetric cryptography with bilinear pairing, while the previous works just use symmetric cryptography and message authentication code algorithm.…”
Section: Efficiency Analysismentioning
confidence: 99%
“…The trust management aspect of these techniques is discussed by Yan et al [14]. Other such authentication protocols are IPsec (Internet Protocol Security), RFID (Radio Frequency Identification) tag management protocol, password-based authentication protocol, establishment protocol, and device authentication protocol [15][16][17][18][19].…”
Section: Background and Related Workmentioning
confidence: 99%