Inter-device Mutual authentication and Formal Verification in M2M Environment
نویسندگان
چکیده
منابع مشابه
How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack
In Machine-to-Machine (M2M) communications, authentication of a device is of upmost importance for applications of Internet ofThings. As traditional authentication schemes always assume the presence of a person, most authentication technologies cannot be applied in machine-centric M2M context. In this paper, we make the first attempt to formally model the authentication in M2M. We first model f...
متن کاملVerification of an Authentication Protocol for M2M Communication Signal Processing
With the advancement of RFID/USN system technology, M2M (Machine-to-Machine) communication draws attention as a promising future industry. M2M communication is intended for inter-machine communication especially in a space hardly accessible to humans in such fields as disaster, safety, construction, health and welfare, weather, environment, logistics, national defense, medical care and agro-liv...
متن کاملDesign and formal verification of DZMBE+
In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...
متن کاملFormal Verification of Distributed Mutual-exclusion Circuits
Distributed mutual-exclusion (DME) circuits are an interesting example of asynchronous circuits. They are composed of identical DME cells connected in a ring of arbitrary size. Each DME cell provides a connection point for one user, and all users compete for exclusive access to a shared resource. This paper reports about formal verification of two well-known DME circuit implementations. Externa...
متن کاملExtending Formal Analysis of Mobile Device Authentication
Authentication between mobile devices in ad-hoc computing environments is a challenging problem. Without pre-shared knowledge, existing applications must rely on additional communication methods, such as out-of-band or location-limited channels for device authentication. Much of the focus in development of new applications in this area seeks to reduce or eliminate the impact of this additional ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Digital Convergence
سال: 2014
ISSN: 1738-1916
DOI: 10.14400/jdc.2014.12.9.219