Skip to main content

Anonymous Authentication Scheme for Machine-to-machine Communication Based on Elliptic Curve

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11634))

Included in the following conference series:

  • 1325 Accesses

Abstract

Recently, the application of the cyber-physical system (CPS) is increasingly widespread. As an important part of CPS, the machine-to-machine communication is also been given a lot of attention. In this paper, we propose a session key agreement scheme bases on elliptic curve for machine-to-machine communication in cyber-physical system. At first, it is easy to calculate, so that it could reduce the occupations of resources; Second, the messages are sent by public channel, which eliminates the cost of encrypted transmission; Third, the using of elliptic curve public key cryptosystem commendably ensures the security of key association. As for feasibility and security, the Burrows–Abadi–Needham (BAN) logic shows the proposed scheme is designed reasonably. The analysis suggest it could resist Replay attack, Man-in-the-middle attack, DoS attack and Impersonation attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yang, L., Yu, P., Bailing, W., Sirui, Y., Zihe, L.: Review on cyber-physical systems. IEEE/CAA J. Automatica Sinica 4(1), 27–40 (2017)

    Article  Google Scholar 

  2. Lee, E.A. Cyber physical systems: Design challenges. In: Proceedings of 11th IEEE International Symposium on Object Oriented Real-Time Distributed Computing (ISORC), May 6, 2008, Orlando, FL, USA, pp. 363–369 (2008)

    Google Scholar 

  3. Cardenas, A.A., Amin, S., Sastry, S.: Secure control: towards survivable cyber-physical systems. In: Proceedings of IEEE 28th International Conference on Distributed Computing Systems, pp. 495–500, June 2008

    Google Scholar 

  4. Chen, M., Wan, J., Li, F.: Machine-to-machine communications: architectures, standards, and applications. KSII Trans. Internet Inf. Syst. 6(2), 480–497 (2012)

    Google Scholar 

  5. Qi, Q.: Strategic thinking of the internet of Things and M2M Services, ZTE Commun. (01) (2010)

    Google Scholar 

  6. Xu, L., Gulliver, T.A.: Performance analysis for M2M video transmission cooperative networks using transmit antenna selection. Multimedia Tools Appl. 76(22), 23891–23902 (2017)

    Article  Google Scholar 

  7. Ma, C., He, J., Chen, H.H., Tang, Z.: Uncoordinated coexisting IEEE 802.15.4 networks for machine to machine communications. Peer-To-Peer Netw. Appl. 7(3), 274–284 (2014)

    Article  Google Scholar 

  8. Ren, W., Yu, L., Ma, L., Ren, Y.: How to authenticate a device? Formal authentication models for M2M communications defending against ghost compromising

    Google Scholar 

  9. Lai, C., Lu, R., Zheng, D., Li, H., (Sherman) Shen, X.: GLARM: group-based lightweight authentication scheme for resource-constrained machine to machine communications

    Google Scholar 

  10. Qiu, Y., Ma, M., Chen, S.: An anonymous authentication scheme for multi-domain machine-to-machine communication in cyber-physical systems. Comput. Netw. 129, 306–318 (2017)

    Article  Google Scholar 

  11. Chen, S., Ma, M.: An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems. Secur. Commun. Netw. 9(10), 1146–1157 (2016)

    Article  Google Scholar 

  12. Ranjan, A.K., Hussain, M.: Terminal authentication in M2M communications in the context of internet of things. Procedia Comput. Sci. 89, 34–42 (2016)

    Article  Google Scholar 

  13. Chen, H., You, I., Weng, C., Cheng, C., Huang, Y.: A security gateway application for end-to-end M2M communications. Comput. Stand. Interfaces 44, 85–93 (2016)

    Article  Google Scholar 

  14. Kim, J.-M., Jeong, H.-Y., Hong, B.-H.: A study of privacy problem solving using device and user authentication for M2M environments. Secur. Commun. Netw. 7(10), 1528–1535 (2014)

    Google Scholar 

  15. Burrows, M., Abadi, M., Needham, R.M.: A Logic of Authentication, Technical report 39, Digital System Research Center (1989)

    Google Scholar 

  16. Cheng, R., Xu, R., Tang, X., Sheng, V.S., Cai, C.: An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment. CMC: Comput. Mater. Continua 55(1), 095–119 (2018)

    Google Scholar 

  17. Xiaonian, W., Chuyun, Z., Runlian, Z., Yujue, W., Jinhua, C.: A distributed intrusion detection model via nondestructive partitioning and balanced allocation for big data. CMC: Comput. Mater. Continua 56(1), 61–72 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yao Xiong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xiong, Y., Wu, C. (2019). Anonymous Authentication Scheme for Machine-to-machine Communication Based on Elliptic Curve. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11634. Springer, Cham. https://doi.org/10.1007/978-3-030-24271-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24271-8_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24270-1

  • Online ISBN: 978-3-030-24271-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics