Browse > Article
http://dx.doi.org/10.13089/JKIISC.2010.20.1.73

Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments  

Eun, Sun-Ki (Hoseo University)
Jeon, Seo-Kwan (Hoseo University)
Ahn, Jae-Young (Electronics and Telecommunications Research Institute)
Oh, Soo-Hyun (Hoseo University)
Abstract
Recently, as IT technologies developed, communication technologies of a various forms that satisfied convenience of user are being researched. Among various research, unlike traditional forms of communication, M2M communication is getting attention that without any control or involvement of people to establish communication between devices. However, the M2M communication could more easily be exposed to many security problems such as data exposure, data theft, unauthorized change and delete and privacy. Therefore, in this paper, we derive security requirements and propose the M2M communication architecture that provide a secure M2M communication environment. Also, we propose a secure mutual authentication and key establishment protocol between a M2M device or gateway domain and a M2M network domain. The proposed protocol is secure against replay attack, impersonation attack and protect a user privacy and tracing.
Keywords
M2M Communication; Security Architecture; Mutual Authentication; Key Establishment;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 ETSI, "ETSI TR v 0.0.9 Machine-to-Machine communications(M2M); Smart Metering Use Cases," 2009.
2 A. Aziz and W. Diffie, "A secure communications protocol to prevent unauthorized access, privacy and authentication for wireless local area networks," IEEE Personal Communications, vol. 1, no. 1, pp. 25-31, 1994.   DOI
3 ETSI, "ETSI TS 102 690 v 0.06Machine-to-Machine communications(M2M); Functional architecture," 2009.
4 K. Mangipudi, R. Katti, and H. Fu, "Authentication and Key agreement Protocols Preserving Anonymity," International Journal of Network Security, vol. 3, no. 3, pp. 259-270, Nov. 2006.
5 조영섭, 조상래, 유인태, 진승헌, 정교일, "유비쿼터스 컴퓨팅과 보안요구사항 분석," 정보보호학회지, 14(1), pp. 21-34, 2004년 2월.
6 G. Lawton, "Machine-to-Machine technology gears up for growth," IEEE Computer Society, Sep. 2004.
7 Y. Jiang, C. Lin, X. Shen, and M. shi, "Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks," IEEE Transactions on wireless communications, vol. 5, no. 9, pp. 2569-2577, Sep. 2006.
8 ETSI, "ETSI TS 102 689 v 0.1.1 Machineto-Machine communications(M2M); M2M service requirement," 2009.
9 W. Diffie and M.E. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.   DOI