메뉴 건너뛰기




Volumn 18, Issue 2, 2016, Pages 1241-1254

M2M Security: Challenges and Solutions

Author keywords

applications; machine to machine (M2M); privacy; security

Indexed keywords

APPLICATIONS; DATA PRIVACY; HETEROGENEOUS NETWORKS;

EID: 84971517463     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/COMST.2016.2515516     Document Type: Article
Times cited : (107)

References (68)
  • 3
    • 79953778099 scopus 로고    scopus 로고
    • Home M2M networks: Architectures, standards, and QoS improvement
    • Apr.
    • Y. Zhang, R. Yu, S. Xie, W. Yao, Y. Xiao, and M. Guizani, "Home M2M networks: Architectures, standards, and QoS improvement, " IEEE Commun. Mag., vol. 49, no. 4, pp. 44-52, Apr. 2011.
    • (2011) IEEE Commun. Mag. , vol.49 , Issue.4 , pp. 44-52
    • Zhang, Y.1    Yu, R.2    Xie, S.3    Yao, W.4    Xiao, Y.5    Guizani, M.6
  • 4
    • 84875055121 scopus 로고    scopus 로고
    • Smart grid communication: Its challenges and opportunities
    • Mar.
    • R. Ma, H.-H. Chen, Y.-R. Huang, and W. Meng, "Smart grid communication: Its challenges and opportunities, " IEEE Trans. Smart Grid, vol. 4, no. 1, pp. 36-46, Mar. 2013.
    • (2013) IEEE Trans. Smart Grid , vol.4 , Issue.1 , pp. 36-46
    • Ma, R.1    Chen, H.-H.2    Huang, Y.-R.3    Meng, W.4
  • 5
    • 67650822699 scopus 로고    scopus 로고
    • Security and privacy challenges in the smart grid
    • May
    • P. McDaniel and S. McLaughlin, "Security and privacy challenges in the smart grid, " IEEE Sec. Privacy, vol. 7, no. 3, pp. 75-77, May 2009.
    • (2009) IEEE Sec. Privacy , vol.7 , Issue.3 , pp. 75-77
    • McDaniel, P.1    McLaughlin, S.2
  • 6
    • 84953749189 scopus 로고    scopus 로고
    • A survey on security issues in smart grids
    • P. Jokar, N. Arianpoo, and V. C. M. Leung, "A survey on security issues in smart grids, " Sec. Commun. Netw., vol. 9, no. 3, pp. 262-273, 2016, doi: 10.1002/sec.559.
    • (2016) Sec. Commun. Netw. , vol.9 , Issue.3 , pp. 262-273
    • Jokar, P.1    Arianpoo, N.2    Leung, V.C.M.3
  • 7
    • 84913582851 scopus 로고    scopus 로고
    • Survey in smart grid and smart home security: Issues, challenges and countermeasures
    • Nov.
    • N. Komninos, E. Philippou, and A. Pitsillides, "Survey in smart grid and smart home security: Issues, challenges and countermeasures, " IEEE Commun. Surveys Tuts., vol. 16, no. 4, pp. 1933-1954, Nov. 2014.
    • (2014) IEEE Commun. Surveys Tuts. , vol.16 , Issue.4 , pp. 1933-1954
    • Komninos, N.1    Philippou, E.2    Pitsillides, A.3
  • 11
    • 84894673236 scopus 로고    scopus 로고
    • M2M service platforms: Survey, issues, and enabling technologies
    • Feb.
    • J. Kim, J. Lee, J. Kim, and J. Yun, "M2M service platforms: Survey, issues, and enabling technologies, " IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 61-76, Feb. 2014.
    • (2014) IEEE Commun. Surveys Tuts. , vol.16 , Issue.1 , pp. 61-76
    • Kim, J.1    Lee, J.2    Kim, J.3    Yun, J.4
  • 14
    • 84894170460 scopus 로고    scopus 로고
    • A survey of recent developments in home M2M networks
    • Feb.
    • M. Chen, J. Wan, S. Gonzalez, X. Liao, and V. Leung, "A survey of recent developments in home M2M networks, " IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 98-114, Feb. 2014.
    • (2014) IEEE Commun. Surveys Tuts. , vol.16 , Issue.1 , pp. 98-114
    • Chen, M.1    Wan, J.2    Gonzalez, S.3    Liao, X.4    Leung, V.5
  • 15
    • 84896479751 scopus 로고    scopus 로고
    • M2M communications for E-health and smart grid: An industry and standard perspective
    • Feb.
    • Z. Fan, R. Haines, and P. Kulkarni, "M2M communications for E-health and smart grid: An industry and standard perspective, " IEEE Wireless Commun., vol. 21, no. 1, pp. 62-69, Feb. 2014.
    • (2014) IEEE Wireless Commun. , vol.21 , Issue.1 , pp. 62-69
    • Fan, Z.1    Haines, R.2    Kulkarni, P.3
  • 16
    • 80052804927 scopus 로고    scopus 로고
    • Low-power low-rate goes long-range: The case for secure and cooperative machine-to-machine communications
    • A. Bartoli, M. Dohler, J. Hernández-Serrano, A. Kountouris, and D. Barthel, "Low-power low-rate goes long-range: The case for secure and cooperative machine-to-machine communications, " in Proc. Netw. Workshops, 2011, pp. 219-230.
    • (2011) Proc. Netw. Workshops , pp. 219-230
    • Bartoli, A.1    Dohler, M.2    Hernández-Serrano, J.3    Kountouris, A.4    Barthel, D.5
  • 24
    • 82155185181 scopus 로고    scopus 로고
    • Estimation of achievable power capacity from plug-in electric vehicles for V2G frequency regulation: Case studies for market participation
    • Dec.
    • S. Han, S. Han, and K. Sezaki, "Estimation of achievable power capacity from plug-in electric vehicles for V2G frequency regulation: Case studies for market participation, " IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 632-641, Dec. 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 632-641
    • Han, S.1    Han, S.2    Sezaki, K.3
  • 25
    • 79953792812 scopus 로고    scopus 로고
    • Toward intelligent machine-to-machine communications in smart grid
    • Apr.
    • Z. Fadlullah, M. Fouda, N. Kato, A. Takeuchi, N. Iwasaki, and Y. Nozaki, "Toward intelligent machine-to-machine communications in smart grid, " IEEE Commun. Mag., vol. 49, no. 4, pp. 60-65, Apr. 2011.
    • (2011) IEEE Commun. Mag. , vol.49 , Issue.4 , pp. 60-65
    • Fadlullah, Z.1    Fouda, M.2    Kato, N.3    Takeuchi, A.4    Iwasaki, N.5    Nozaki, Y.6
  • 27
    • 84933048120 scopus 로고    scopus 로고
    • The challenges facing physical layer security
    • Jun.
    • W. Trappe, "The challenges facing physical layer security, " IEEE Commun. Mag., vol. 53, no. 6, pp. 16-20, Jun. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.6 , pp. 16-20
    • Trappe, W.1
  • 28
    • 75149129550 scopus 로고    scopus 로고
    • Side-channel attacks on cryptographic software
    • Nov.
    • N. Lawson, "Side-channel attacks on cryptographic software, " IEEE Sec. Privacy, vol. 7, no. 6, pp. 65-68, Nov. 2009.
    • (2009) IEEE Sec. Privacy , vol.7 , Issue.6 , pp. 65-68
    • Lawson, N.1
  • 30
    • 84919476166 scopus 로고    scopus 로고
    • Fool me if you can: Mimicking attacks and anti-attacks in cyberspace
    • Jan.
    • S. Yu, S. Guo, and I. Stojmenovic, "Fool me if you can: Mimicking attacks and anti-attacks in cyberspace, " IEEE Trans. Comput., vol. 64, no. 1, pp. 139-151, Jan. 2015.
    • (2015) IEEE Trans. Comput. , vol.64 , Issue.1 , pp. 139-151
    • Yu, S.1    Guo, S.2    Stojmenovic, I.3
  • 33
    • 84891591283 scopus 로고    scopus 로고
    • Sakes: Secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6l0 WPAN)
    • Jul.
    • H. Hussen, G. Tizazu, M. Ting, T. Lee, Y. Choi, and K.-H. Kim, "Sakes: Secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6l0 WPAN), " in Proc. 5th Int. Conf. Ubiq. Future Netw. (ICUFN), Jul. 2013, pp. 246-251.
    • (2013) Proc. 5th Int. Conf. Ubiq. Future Netw. (ICUFN) , pp. 246-251
    • Hussen, H.1    Tizazu, G.2    Ting, M.3    Lee, T.4    Choi, Y.5    Kim, K.-H.6
  • 35
    • 84902282428 scopus 로고    scopus 로고
    • Efficient authentication and key management mechanisms for smart grid communications
    • Jun.
    • H. Nicanfar, P. Jokar, K. Beznosov, and V. Leung, "Efficient authentication and key management mechanisms for smart grid communications, " IEEE Syst. J., vol. 8, no. 2, pp. 629-640, Jun. 2014.
    • (2014) IEEE Syst. J. , vol.8 , Issue.2 , pp. 629-640
    • Nicanfar, H.1    Jokar, P.2    Beznosov, K.3    Leung, V.4
  • 36
    • 84883438554 scopus 로고    scopus 로고
    • Design of a key establishment protocol for smart home energy management system
    • Jun.
    • Y. Li, "Design of a key establishment protocol for smart home energy management system, " in Proc. 5th Int. Conf. Comput. Intell. Commun. Syst. Netw. (CICSyN), Jun. 2013, pp. 88-93.
    • (2013) Proc. 5th Int. Conf. Comput. Intell. Commun. Syst. Netw. (CICSyN) , pp. 88-93
    • Li, Y.1
  • 37
    • 84858420012 scopus 로고    scopus 로고
    • Light-weight key distribution and management for advanced metering infrastructure
    • J. Kamto, L. Qian, J. Fuller, and J. Attia, "Light-weight key distribution and management for advanced metering infrastructure, " in Proc. IEEE GLOBECOM Workshops, Dec. 2011, pp. 1216-1220.
    • (2011) Proc. IEEE GLOBECOM Workshops, Dec. , pp. 1216-1220
    • Kamto, J.1    Qian, L.2    Fuller, J.3    Attia, J.4
  • 38
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov.
    • W. Diffie and M. Hellman, "New directions in cryptography, " IEEE Trans. Inf. Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.
    • (1976) IEEE Trans. Inf. Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 40
    • 25844473466 scopus 로고    scopus 로고
    • Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach
    • W. Zhang and G. Cao, "Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach, " in Proc. 24th Annu. Joint Conf. IEEE Comput. Commun. Soc. (INFOCOM), Mar. 2005, vol. 1, pp. 503-514.
    • (2005) Proc. 24th Annu. Joint Conf. IEEE Comput. Commun. Soc. (INFOCOM), Mar. , vol.1 , pp. 503-514
    • Zhang, W.1    Cao, G.2
  • 41
    • 84890506273 scopus 로고    scopus 로고
    • Energy-efficient physical layer packet authenticator for machine-to-machine networks
    • [Online]
    • A. Bartoli, J. Hernondez-Serrano, O. Leon, A. Kountouris, and D. Barthel, "Energy-efficient physical layer packet authenticator for machine-to-machine networks, " Trans. Emerging Telecommun. Technol., vol. 24, no. 4, pp. 401-412, 2013 [Online]. Available: 10.1002/ett.2653
    • (2013) Trans. Emerging Telecommun. Technol. , vol.24 , Issue.4 , pp. 401-412
    • Bartoli, A.1    Hernondez-Serrano, J.2    Leon, O.3    Kountouris, A.4    Barthel, D.5
  • 43
    • 84904112065 scopus 로고    scopus 로고
    • A dynamic-encryption authentication scheme for M2M security in cyber-physical systems
    • S. Chen and M. Ma, "A dynamic-encryption authentication scheme for M2M security in cyber-physical systems, " in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2013, pp. 2897-2901.
    • (2013) Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. , pp. 2897-2901
    • Chen, S.1    Ma, M.2
  • 45
    • 84904855440 scopus 로고    scopus 로고
    • Physical unclon-able functions and applications: A tutorial
    • Aug.
    • C. Herder, M.-D. Yu, F. Koushanfar, and S. Devadas, "Physical unclon-able functions and applications: A tutorial, " Proc. IEEE, vol. 102, no. 8, pp. 1126-1141, Aug. 2014.
    • (2014) Proc. IEEE , vol.102 , Issue.8 , pp. 1126-1141
    • Herder, C.1    Yu, M.-D.2    Koushanfar, F.3    Devadas, S.4
  • 46
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • J. Feigenbaum, Ed. New York, NY, USA: Springer
    • T. Pedersen, "Non-interactive and information-theoretic secure verifiable secret sharing, " in Advances in Cryptology, J. Feigenbaum, Ed. New York, NY, USA: Springer, 1992, pp. 129-140.
    • (1992) Advances in Cryptology , pp. 129-140
    • Pedersen, T.1
  • 47
    • 85032873931 scopus 로고
    • Efficient identification and signatures for smart cards
    • J.-J. Quisquater and J. Vandewalle, Eds. New York, NY, USA: Springer
    • C. Schnorr, "Efficient identification and signatures for smart cards, " in Advances in Cryptology, J.-J. Quisquater and J. Vandewalle, Eds. New York, NY, USA: Springer, 1990, pp. 688-689.
    • (1990) Advances in Cryptology , pp. 688-689
    • Schnorr, C.1
  • 48
    • 84877664366 scopus 로고    scopus 로고
    • A group-based authentication and key agreement for MTC in LTE networks
    • J. Cao, M. Ma, and H. Li, "A group-based authentication and key agreement for MTC in LTE networks, " in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2012, pp. 1017-1022.
    • (2012) Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. , pp. 1017-1022
    • Cao, J.1    Ma, M.2    Li, H.3
  • 49
    • 84936759321 scopus 로고    scopus 로고
    • A novel group access authentication and key agreement protocol for machine-type communication
    • C. Lai, H. Li, X. Li, and J. Cao, "A novel group access authentication and key agreement protocol for machine-type communication, " Trans. Emerging Telecommun. Technol., vol. 26, no. 3, 2015 doi: 10.1002/ett.2635.
    • (2015) Trans. Emerging Telecommun. Technol. , vol.26 , Issue.3
    • Lai, C.1    Li, H.2    Li, X.3    Cao, J.4
  • 50
    • 84904098890 scopus 로고    scopus 로고
    • LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks
    • C. Lai, H. Li, R. Lu, R. Jiang, and X. Shen, "LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks, " in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2013, pp. 832-837.
    • (2013) Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. , pp. 832-837
    • Lai, C.1    Li, H.2    Lu, R.3    Jiang, R.4    Shen, X.5
  • 51
    • 84906996398 scopus 로고    scopus 로고
    • SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks
    • C. Lai, H. Li, R. Lu, R. Jiang, and X. Shen, "SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks, " in Proc. IEEE Int. Conf. Commun. (ICC), Jun. 2014, pp. 1011-1016.
    • (2014) Proc. IEEE Int. Conf. Commun. (ICC), Jun. , pp. 1011-1016
    • Lai, C.1    Li, H.2    Lu, R.3    Jiang, R.4    Shen, X.5
  • 52
    • 84883108018 scopus 로고    scopus 로고
    • Robust privacy-preserving authentication scheme for communication between electric vehicle as power energy storage and power stations
    • H. Nicanfar, S. Hosseininezhad, P. TalebiFard, and V. Leung, "Robust privacy-preserving authentication scheme for communication between electric vehicle as power energy storage and power stations, " in Proc. IEEE INFOCOM, Apr. 2013, pp. 3429-3434.
    • (2013) Proc. IEEE INFOCOM, Apr. , pp. 3429-3434
    • Nicanfar, H.1    Hosseininezhad, S.2    Talebifard, P.3    Leung, V.4
  • 53
    • 84893343089 scopus 로고    scopus 로고
    • A new payment system for enhancing location privacy of electric vehicles
    • Jan.
    • M. H. Au, J. Liu, J. Fang, Z. Jiang, W. Susilo, and J. Zhou, "A new payment system for enhancing location privacy of electric vehicles, " IEEE Trans. Veh. Technol., vol. 63, no. 1, pp. 3-18, Jan. 2014.
    • (2014) IEEE Trans. Veh. Technol. , vol.63 , Issue.1 , pp. 3-18
    • Au, M.H.1    Liu, J.2    Fang, J.3    Jiang, Z.4    Susilo, W.5    Zhou, J.6
  • 54
    • 33749993205 scopus 로고    scopus 로고
    • Constant-size dynamic K-TAA
    • R. De Prisco and M. Yung, Eds. New York, NY, USA: Springer
    • M. Au, W. Susilo, and Y. Mu, "Constant-size dynamic K-TAA, " in Security and Cryptography for Networks, R. De Prisco and M. Yung, Eds. New York, NY, USA: Springer, 2006, pp. 111-125.
    • (2006) Security and Cryptography for Networks , pp. 111-125
    • Au, M.1    Susilo, W.2    Mu, Y.3
  • 55
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • S. Goldwasser, S. Micali, and C. Rackoff, "The knowledge complexity of interactive proof systems, " SIAM J. Comput., vol. 18, no. 1, pp. 186-208, 1989.
    • (1989) SIAM J. Comput. , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 58
    • 84876751522 scopus 로고    scopus 로고
    • An enhanced measurement transmission scheme for privacy protection in smart grid
    • Jan.
    • S. Li, K. Choi, and K. Chae, "An enhanced measurement transmission scheme for privacy protection in smart grid, " in Proc. Int. Conf. Inf. Netw. (ICOIN), Jan. 2013, pp. 18-23.
    • (2013) Proc. Int. Conf. Inf. Netw. (ICOIN) , pp. 18-23
    • Li, S.1    Choi, K.2    Chae, K.3
  • 59
    • 84876479369 scopus 로고    scopus 로고
    • RISE: A reliable and secure scheme for wireless machine to machine communications
    • Feb.
    • W. Ren, L. Yu, L. Ma, and Y. Ren, "RISE: A reliable and secure scheme for wireless machine to machine communications, " Tsinghua Sci. Technol., vol. 18, pp. 100-117, Feb. 2013.
    • (2013) Tsinghua Sci. Technol. , vol.18 , pp. 100-117
    • Ren, W.1    Yu, L.2    Ma, L.3    Ren, Y.4
  • 60
    • 79953785474 scopus 로고    scopus 로고
    • GRS: The green, reliability, and security of emerging machine to machine communications
    • Apr.
    • R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, "GRS: The green, reliability, and security of emerging machine to machine communications, " IEEE Commun. Mag., vol. 49, no. 4, pp. 28-35, Apr. 2011.
    • (2011) IEEE Commun. Mag. , vol.49 , Issue.4 , pp. 28-35
    • Lu, R.1    Li, X.2    Liang, X.3    Shen, X.4    Lin, X.5
  • 64
    • 84968502759 scopus 로고
    • A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
    • Apr.
    • G. Frey and H.-G. Rück, "A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves, " Math. Comput., vol. 62, pp. 865-874, Apr. 1994.
    • (1994) Math. Comput. , vol.62 , pp. 865-874
    • Frey, G.1    Rück, H.-G.2
  • 65
    • 84874950120 scopus 로고    scopus 로고
    • Securing M2M with post-quantum public-key cryptography
    • Mar.
    • J.-R. Shih et al., "Securing M2M with post-quantum public-key cryptography, " IEEE J. Emerging Sel. Topics Circuits Syst., vol. 3, no. 1, pp. 106-116, Mar. 2013.
    • (2013) IEEE J. Emerging Sel. Topics Circuits Syst. , vol.3 , Issue.1 , pp. 106-116
    • Shih, J.-R.1
  • 66
    • 84947808606 scopus 로고    scopus 로고
    • NTRU: A ring-based public key cryptosystem
    • J. Buhler, Ed. New York, NY, USA: Springer
    • J. Hoffstein, J. Pipher, and J. Silverman, "NTRU: A ring-based public key cryptosystem, " in Algorithmic Number Theory, J. Buhler, Ed. New York, NY, USA: Springer, 1998, pp. 267-288.
    • (1998) Algorithmic Number Theory , pp. 267-288
    • Hoffstein, J.1    Pipher, J.2    Silverman, J.3
  • 67
    • 35048900285 scopus 로고    scopus 로고
    • TTS: High-speed signatures on a low-cost smart card
    • M. Joye and J.-J. Quisquater, Eds. New York, NY, USA: Springer
    • B.-Y. Yang, J.-M. Chen, and Y.-H. Chen, "TTS: High-speed signatures on a low-cost smart card, " in Cryptographic Hardware and Embedded Systems, M. Joye and J.-J. Quisquater, Eds. New York, NY, USA: Springer, 2004, pp. 371-385.
    • (2004) Cryptographic Hardware and Embedded Systems , pp. 371-385
    • Yang, B.-Y.1    Chen, J.-M.2    Chen, Y.-H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.