Browse > Article
http://dx.doi.org/10.14400/JDC.2015.13.5.213

Verifying a Safe P2P Security Protocol in M2M Communication Environment  

Han, Kun-Hee (Dept. of Information and Communication, Baekseok University)
Bae, Woo-Sik (Dept. of AIS Center, Ajou Motor College)
Publication Information
Journal of Digital Convergence / v.13, no.5, 2015 , pp. 213-218 More about this Journal
Abstract
In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.
Keywords
Security protocal; Security; M2M protocol; Casper; Security authentication; Model Checking;
Citations & Related Records
Times Cited By KSCI : 6  (Citation Analysis)
연도 인용수 순위
1 Kyoung-nam Kim, Lee, Jae Moon, MyounJae Lee, Sunghyuck Hong, Convergent Secure Wireless Sensor Network Routing Algorithm. Journal of the Korea Convergence Society, Vol. 6, No. 1, pp. 65-70, 2015.   DOI
2 Yang, M. H., and Hu, H. Y., Protocol for ownership transfer across authorities: with the ability to assign transfer target, Security and Communication Networks, vol .5, pp. 164-177, 2012.   DOI
3 G. Wu, S. Talwar, K. Johnsson, N. Himayat, and K. D. Johnson, M2M: from mobile to embedded internet., IEEE Communications Magazine, vol. 49, no. 4, pp. 36-43, 2011.   DOI
4 S. Y. Lien, K. C. Chen, and Y. Lin, Toward ubiquitous massive accesses in 3GPP machineto- machine communications. IEEE Communications Magazine, vol. 49, no. 4, pp. 66-74, 2011.   DOI
5 W. S. Bae, Formal Verification of an RFID Authentication Protocol Based on Hash Function and Secret Code. Wireless Personal Communications An International Journal, Vol.79, No.4, pp.2295-1609, 2014.
6 M. S. Han, W. S. Bae, Security Verification of a Communication Authentication Protocol in Vehicular Security System. Journal of Digital Convergence, Vol. 12, No. 8, pp. 229-234, 2014.   DOI
7 W. S. Bae, Inter-device Mutual authentication and Formal Verification in M2M Environment. Journal of Digital Convergence, Vol. 12, No. 9, pp. 219-223, 2014.   DOI
8 Bo-Kyung Lee, A Study on Security of Virtualization in Cloud Computing Environment for Convergence Services. Journal of the Korea Convergence Society, Vol. 5, No. 4, pp. 93-99, 2014.   DOI
9 Keun-Ho Lee, A Study of Security Requirement in Wireless Charging. Journal of the Korea Convergence Society, Vol. 5, No. 3, pp. 23-27, 2014.   DOI
10 Eui-Seok Nahm, Design of Computer Hardware Fault Detector using ROM BIOS. Journal of the Korea Convergence Society, Vol. 4, No. 3, pp. 21-26, 2013.   DOI
11 G. Lowe., Casper:A compiler for the analysis of security protocols. User Manual and Tutorial. Version 1.12, 2009.
12 C. Kraetzer, Modelling Watermark Communication Protocols using the CASPER Modelling Language. Proceedings of the 12th ACM workshop on Multimedia and security. pp. 107-116, 2010.
13 Oxford University Computing Laboratory. FDR2 User Manual, 19th, October, 2010.
14 Yu Tian-tian, Feng Quan-yuan, A Security RFID Authentication Protocol Based on Hash Function. IEEC09, pp. 804-807, 2009.
15 Mihai-Lica Pura, Victor Valeriu Patriciu, Ion Bica, Formal Verification of G-PAKE Using Casper/FDR2-Securing a Group PAKE Protocol Using Casper/FDR2. SECRYPT 2010: pp. 299-303, 2010.
16 ETSI, Machine to Machine Communications (M2M); M2M functional architecture. ETSI, TS 102 690, DEC, 2011.