Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments |
Eun, Sun-Ki
(Hoseo University)
Jeon, Seo-Kwan (Hoseo University) Ahn, Jae-Young (Electronics and Telecommunications Research Institute) Oh, Soo-Hyun (Hoseo University) |
1 | ETSI, "ETSI TR v 0.0.9 Machine-to-Machine communications(M2M); Smart Metering Use Cases," 2009. |
2 | A. Aziz and W. Diffie, "A secure communications protocol to prevent unauthorized access, privacy and authentication for wireless local area networks," IEEE Personal Communications, vol. 1, no. 1, pp. 25-31, 1994. DOI |
3 | ETSI, "ETSI TS 102 690 v 0.06Machine-to-Machine communications(M2M); Functional architecture," 2009. |
4 | K. Mangipudi, R. Katti, and H. Fu, "Authentication and Key agreement Protocols Preserving Anonymity," International Journal of Network Security, vol. 3, no. 3, pp. 259-270, Nov. 2006. |
5 | 조영섭, 조상래, 유인태, 진승헌, 정교일, "유비쿼터스 컴퓨팅과 보안요구사항 분석," 정보보호학회지, 14(1), pp. 21-34, 2004년 2월. |
6 | G. Lawton, "Machine-to-Machine technology gears up for growth," IEEE Computer Society, Sep. 2004. |
7 | Y. Jiang, C. Lin, X. Shen, and M. shi, "Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks," IEEE Transactions on wireless communications, vol. 5, no. 9, pp. 2569-2577, Sep. 2006. |
8 | ETSI, "ETSI TS 102 689 v 0.1.1 Machineto-Machine communications(M2M); M2M service requirement," 2009. |
9 | W. Diffie and M.E. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976. DOI |