Abstract
Recently, the application of the cyber-physical system (CPS) is increasingly widespread. As an important part of CPS, the machine-to-machine communication is also been given a lot of attention. In this paper, we propose a session key agreement scheme bases on elliptic curve for machine-to-machine communication in cyber-physical system. At first, it is easy to calculate, so that it could reduce the occupations of resources; Second, the messages are sent by public channel, which eliminates the cost of encrypted transmission; Third, the using of elliptic curve public key cryptosystem commendably ensures the security of key association. As for feasibility and security, the Burrows–Abadi–Needham (BAN) logic shows the proposed scheme is designed reasonably. The analysis suggest it could resist Replay attack, Man-in-the-middle attack, DoS attack and Impersonation attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yang, L., Yu, P., Bailing, W., Sirui, Y., Zihe, L.: Review on cyber-physical systems. IEEE/CAA J. Automatica Sinica 4(1), 27–40 (2017)
Lee, E.A. Cyber physical systems: Design challenges. In: Proceedings of 11th IEEE International Symposium on Object Oriented Real-Time Distributed Computing (ISORC), May 6, 2008, Orlando, FL, USA, pp. 363–369 (2008)
Cardenas, A.A., Amin, S., Sastry, S.: Secure control: towards survivable cyber-physical systems. In: Proceedings of IEEE 28th International Conference on Distributed Computing Systems, pp. 495–500, June 2008
Chen, M., Wan, J., Li, F.: Machine-to-machine communications: architectures, standards, and applications. KSII Trans. Internet Inf. Syst. 6(2), 480–497 (2012)
Qi, Q.: Strategic thinking of the internet of Things and M2M Services, ZTE Commun. (01) (2010)
Xu, L., Gulliver, T.A.: Performance analysis for M2M video transmission cooperative networks using transmit antenna selection. Multimedia Tools Appl. 76(22), 23891–23902 (2017)
Ma, C., He, J., Chen, H.H., Tang, Z.: Uncoordinated coexisting IEEE 802.15.4 networks for machine to machine communications. Peer-To-Peer Netw. Appl. 7(3), 274–284 (2014)
Ren, W., Yu, L., Ma, L., Ren, Y.: How to authenticate a device? Formal authentication models for M2M communications defending against ghost compromising
Lai, C., Lu, R., Zheng, D., Li, H., (Sherman) Shen, X.: GLARM: group-based lightweight authentication scheme for resource-constrained machine to machine communications
Qiu, Y., Ma, M., Chen, S.: An anonymous authentication scheme for multi-domain machine-to-machine communication in cyber-physical systems. Comput. Netw. 129, 306–318 (2017)
Chen, S., Ma, M.: An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems. Secur. Commun. Netw. 9(10), 1146–1157 (2016)
Ranjan, A.K., Hussain, M.: Terminal authentication in M2M communications in the context of internet of things. Procedia Comput. Sci. 89, 34–42 (2016)
Chen, H., You, I., Weng, C., Cheng, C., Huang, Y.: A security gateway application for end-to-end M2M communications. Comput. Stand. Interfaces 44, 85–93 (2016)
Kim, J.-M., Jeong, H.-Y., Hong, B.-H.: A study of privacy problem solving using device and user authentication for M2M environments. Secur. Commun. Netw. 7(10), 1528–1535 (2014)
Burrows, M., Abadi, M., Needham, R.M.: A Logic of Authentication, Technical report 39, Digital System Research Center (1989)
Cheng, R., Xu, R., Tang, X., Sheng, V.S., Cai, C.: An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment. CMC: Comput. Mater. Continua 55(1), 095–119 (2018)
Xiaonian, W., Chuyun, Z., Runlian, Z., Yujue, W., Jinhua, C.: A distributed intrusion detection model via nondestructive partitioning and balanced allocation for big data. CMC: Comput. Mater. Continua 56(1), 61–72 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Xiong, Y., Wu, C. (2019). Anonymous Authentication Scheme for Machine-to-machine Communication Based on Elliptic Curve. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11634. Springer, Cham. https://doi.org/10.1007/978-3-030-24271-8_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-24271-8_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24270-1
Online ISBN: 978-3-030-24271-8
eBook Packages: Computer ScienceComputer Science (R0)