Inter-device Mutual authentication and Formal Verification in M2M Environment

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack

In Machine-to-Machine (M2M) communications, authentication of a device is of upmost importance for applications of Internet ofThings. As traditional authentication schemes always assume the presence of a person, most authentication technologies cannot be applied in machine-centric M2M context. In this paper, we make the first attempt to formally model the authentication in M2M. We first model f...

متن کامل

Verification of an Authentication Protocol for M2M Communication Signal Processing

With the advancement of RFID/USN system technology, M2M (Machine-to-Machine) communication draws attention as a promising future industry. M2M communication is intended for inter-machine communication especially in a space hardly accessible to humans in such fields as disaster, safety, construction, health and welfare, weather, environment, logistics, national defense, medical care and agro-liv...

متن کامل

Design and formal verification of DZMBE+

In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...

متن کامل

Formal Verification of Distributed Mutual-exclusion Circuits

Distributed mutual-exclusion (DME) circuits are an interesting example of asynchronous circuits. They are composed of identical DME cells connected in a ring of arbitrary size. Each DME cell provides a connection point for one user, and all users compete for exclusive access to a shared resource. This paper reports about formal verification of two well-known DME circuit implementations. Externa...

متن کامل

Extending Formal Analysis of Mobile Device Authentication

Authentication between mobile devices in ad-hoc computing environments is a challenging problem. Without pre-shared knowledge, existing applications must rely on additional communication methods, such as out-of-band or location-limited channels for device authentication. Much of the focus in development of new applications in this area seeks to reduce or eliminate the impact of this additional ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Digital Convergence

سال: 2014

ISSN: 1738-1916

DOI: 10.14400/jdc.2014.12.9.219