首页> 外文OA文献 >Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks
【2h】

Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks

机译:混合安全认证和M2M家庭网络的关键交换方案

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

In this paper, we analyzed Sun et al.’s scheme which proposes an M2M (Machine-to-Machine) secure communication scheme by using existing TD SCMA (Time Division-Synchronous Code Division Multiple Access) networks. They offer a password-based authentication and key establishment protocol for mutual authentication. Moreover, their proposed secure channel establishment protocol uses symmetric cryptography and one-way hash algorithms and they considered using their protected channel model for mobile users and smart home networks. In this paper, we propose to complete the missing part of Sun et al.’s scheme. This can occur by addressing privacy-preserving and message modification protection. Moreover, improvements can be made to MITM (Man-In-The-Middle) attack resistance, anomaly detection and DoS (Denial-of-Service) attacks with timing. ECDH (Elliptic Curve Diffie Hellman) cryptography based protected cipher-key exchange operation used on initial setup and key-injection operations to provide secure user registration, user password change and home gateway network join phases. We simulated both the proposed and Sun et al.’s schemes. We analyzed Sun et al.’s scheme for performance, network congestion and resource usage. Missing privacy-preserving was analyzed and compared with the GLARM scheme, and the storage cost of each phase was analyzed according to Ferrag et al.’s survey proposal. In Sun et al.’s scheme, future work for the security architecture of the home network is related to Li et al.’s protocol being implemented in our proposed design.
机译:在本文中,我们分析了Sun等人的方案,该方案通过使用现有的TD SCMA(时分 - 同步码分割多次访问)网络来提出M2M(机器到机器)安全通信方案。它们提供基于密码的身份验证和用于相互身份验证的密钥建立协议。此外,其提出的安全渠道建立协议使用对称密码和单向散列算法,并考虑使用它们的受保护用户和智能家庭网络的频道模型。在本文中,我们建议完成Sun等人的缺失部分。的计划。这可以通过解决隐私保留和消息修改保护来进行。此外,可以对MITM(中间人)攻击性,异常检测和DOS(拒绝服务)攻击进行改进。 ECDH(椭圆曲线Diffie Hellman)基于密码的受保护密码交换操作,用于初始设置和键注射操作,提供安全的用户注册,用户密码更改和家庭网关网络连接阶段。我们模拟了建议和Sun等人。的计划。我们分析了Sun等人。的性能,网络拥塞和资源使用计划。分析并与Glarm方案进行了分析并与Glarm方案进行了分析并进行比较,并且根据Ferrag等人进行分析每个阶段的储存成本。的调查提案。在Sun等人的计划中,家庭网络安全架构的未来工作与Li等人有关。在我们提出的设计中实施的协议。

著录项

  • 作者

    Uğur Coruh; Oğuz Bayat;

  • 作者单位
  • 年度 2018
  • 总页数
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号