메뉴 건너뛰기




Volumn 12, Issue 6, 2016, Pages 2074-2085

A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks

Author keywords

Authentication; Internet Protocol version 6 (IPv6) over low power wireless personal area networks (6LoWPAN); machine to machine (M2M); protocol composition logic (PCL)

Indexed keywords

AUTHENTICATION; COMMUNICATION CHANNELS (INFORMATION THEORY); COMPUTATION THEORY; COMPUTER CIRCUITS; DATA COMMUNICATION SYSTEMS; INTERNET OF THINGS; LOW POWER ELECTRONICS; MACHINE-TO-MACHINE COMMUNICATION; NETWORK SECURITY; PERSONAL COMMUNICATION SYSTEMS; WIRELESS LOCAL AREA NETWORKS (WLAN);

EID: 85027072390     PISSN: 15513203     EISSN: None     Source Type: Journal    
DOI: 10.1109/TII.2016.2604681     Document Type: Article
Times cited : (82)

References (26)
  • 1
    • 84899547581 scopus 로고    scopus 로고
    • FromM2M communications to the internet of things: Opportunities and challenges
    • J. N. Al-Karaki, K.-C. Chen, G.Morabito, and J. d. Oliveira, "FromM2M communications to the internet of things: Opportunities and challenges," Ad Hoc Netw., vol. 18, pp. 1-2, 2014.
    • (2014) Ad Hoc Netw. , vol.18 , pp. 1-2
    • Al-Karaki, J.N.1    Chen, K.-C.2    Morabito, G.3    Oliveira, J.D.4
  • 2
    • 84923122221 scopus 로고    scopus 로고
    • Machine-to-machine communications with in-network data aggregation, processing, and actuation for large-scale cyberphysical systems
    • Apr.
    • I. Stojmenovic, "Machine-to-machine communications with in-network data aggregation, processing, and actuation for large-scale cyberphysical systems," IEEE Internet Things J., vol. 1, no. 2, pp. 122-128, Apr. 2014.
    • (2014) IEEE Internet Things J. , vol.1 , Issue.2 , pp. 122-128
    • Stojmenovic, I.1
  • 3
    • 84894673236 scopus 로고    scopus 로고
    • M2M service platforms: Survey, issues, and enabling technologies
    • First Quarter
    • J.Kim, J. Lee, J. Kim, and J.Yun, "M2M service platforms: Survey, issues, and enabling technologies," IEEE Commun. Surveys. Tuts., vol. 16, no. 1, pp. 61-76, First Quarter 2014.
    • (2014) IEEE Commun. Surveys. Tuts. , vol.16 , Issue.1 , pp. 61-76
    • Kim, J.1    Lee, J.2    Kim, J.3    Yun, J.4
  • 5
    • 84961620802 scopus 로고    scopus 로고
    • An IoT-aware architecture for smart healthcare systems
    • Dec.
    • L. Catarinucci et al., "An IoT-aware architecture for smart healthcare systems," IEEE Internet Things J., vol. 2, no. 6, pp. 515-526, Dec. 2015.
    • (2015) IEEE Internet Things J. , vol.2 , Issue.6 , pp. 515-526
    • Catarinucci, L.1
  • 6
    • 84930268203 scopus 로고    scopus 로고
    • Feasibility and performance evaluation of a 6LoWPANenabled platform for ubiquitous healthcare monitoring
    • F. Touati, A. B. Mnaouer, O. Erdene-Ochir, W. Mehmood, A. Hassan, and B. Gaabab, "Feasibility and performance evaluation of a 6LoWPANenabled platform for ubiquitous healthcare monitoring," Wireless Commun. Mobile Comput., vol. 16, pp. 1271-1281, 2016.
    • (2016) Wireless Commun. Mobile Comput. , vol.16 , pp. 1271-1281
    • Touati, F.1    Mnaouer, A.B.2    Erdene-Ochir, O.3    Mehmood, W.4    Hassan, A.5    Gaabab, B.6
  • 7
    • 84961079547 scopus 로고    scopus 로고
    • A PKI adapted model for secure information dissemination in industrial control and automation 6LoWPANs
    • Jun.
    • S. Misra, S. Goswami, C. Taneja, A. Mukherjee, and M. S. Obaidat, "A PKI adapted model for secure information dissemination in industrial control and automation 6LoWPANs," IEEE Access, vol. 3, pp. 875-889, Jun. 2015.
    • (2015) IEEE Access , vol.3 , pp. 875-889
    • Misra, S.1    Goswami, S.2    Taneja, C.3    Mukherjee, A.4    Obaidat, M.S.5
  • 9
    • 84908448624 scopus 로고    scopus 로고
    • Security protocols and privacy issues into 6LoWPAN stack: A synthesis
    • Oct.
    • C. Hennebert and J. D. Santos, "Security protocols and privacy issues into 6LoWPAN stack: A synthesis," IEEE Internet Things J., vol. 1, no. 5, pp. 384-398, Oct. 2014.
    • (2014) IEEE Internet Things J. , vol.1 , Issue.5 , pp. 384-398
    • Hennebert, C.1    Santos, J.D.2
  • 14
    • 84944111806 scopus 로고    scopus 로고
    • A security authentication scheme in machine-to-machine home network service
    • X. Sun, S. Men, C. Zhao, and Z. Zhou, "A security authentication scheme in machine-to-machine home network service," Security Commun. Netw., vol. 8, pp. 2678-2686, 2012.
    • (2012) Security Commun. Netw. , vol.8 , pp. 2678-2686
    • Sun, X.1    Men, S.2    Zhao, C.3    Zhou, Z.4
  • 15
    • 84904112065 scopus 로고    scopus 로고
    • A dynamic-encryption authentication scheme for M2M security in cyber-physical systems
    • S. Chen and M. Ma, "A dynamic-encryption authentication scheme for M2M security in cyber-physical systems," in Proc. 2013 IEEE Global Commun. Conf., 2013, pp. 2897-2901.
    • (2013) Proc. 2013 IEEE Global Commun. Conf. , pp. 2897-2901
    • Chen, S.1    Ma, M.2
  • 16
    • 84865236311 scopus 로고    scopus 로고
    • An efficient handover authentication scheme with privacy preservation for
    • A. Fu, Y. Zhang, Z. Zhu, Q. Jing, and J. Feng, "An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network," Comput. Security, vol. 31, pp. 741-749, 2012.
    • (2012) IEEE 802.16m Network Comput. Security , vol.31 , pp. 741-749
    • Fu, A.1    Zhang, Y.2    Zhu, Z.3    Jing, Q.4    Feng, J.5
  • 17
    • 84947491809 scopus 로고    scopus 로고
    • Ticket-based authentication for fast handover in wireless mesh networks
    • X. Zhang, G. Li, and W. Han, "Ticket-based authentication for fast handover in wireless mesh networks," Wireless Pers. Commun., vol. 85, pp. 1509-1523, 2015.
    • (2015) Wireless Pers. Commun. , vol.85 , pp. 1509-1523
    • Zhang, X.1    Li, G.2    Han, W.3
  • 18
    • 84892614267 scopus 로고    scopus 로고
    • A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities
    • Dec.
    • Z. Sheng, S. Yang, Y. Yu, A. Vasilakos, J. A. McCann, and L. Kin, "A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities," IEEE Wireless Commun., vol. 20, no. 6, pp. 91-98, Dec. 2013.
    • (2013) IEEE Wireless Commun. , vol.20 , Issue.6 , pp. 91-98
    • Sheng, Z.1    Yang, S.2    Yu, Y.3    Vasilakos, A.4    McCann, J.A.5    Kin, L.6
  • 20
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Mar.
    • D. Dolev and A. C. Yao, "On the security of public key protocols," IEEE Trans. Inf. Theory, vol. 29, no. 2, pp. 198-208, Mar. 1983.
    • (1983) IEEE Trans. Inf. Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 21
    • 84885395306 scopus 로고    scopus 로고
    • Neighbor discovery optimization for IPv6 over low-power wireless personal area networks (6LoWPANs)
    • Z. Shelby, S. Chakrabarti, E. Nordmark, and C. Bormann, "Neighbor discovery optimization for IPv6 over low-power wireless personal area networks (6LoWPANs)," IETF RFC 6775, 2012.
    • IETF RFC , vol.6775 , pp. 2012
    • Shelby, Z.1    Chakrabarti, S.2    Nordmark, E.3    Bormann, C.4
  • 24
    • 85027698261 scopus 로고    scopus 로고
    • The AVISPA Team, AVISPA v1.1 User Manual, Jun. [Online]. Available
    • The AVISPA Team, AVISPA v1.1 User Manual, Jun. 2006. [Online]. Available: Http://www.avispa-project.org/package/user-manual.pdf
    • (2006)
  • 26
    • 78650373178 scopus 로고    scopus 로고
    • MoteAODV-An AODV implementation for tinyOS 2.0
    • P. Samarati, M. Tunstall, J. Posegga, K. Markantonakis, and D. Sauveron, Eds. Berlin, Germany: Springer-Verlag
    • W. Backes and J. Cordasco, "MoteAODV-An AODV implementation for tinyOS 2.0," Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices, vol. 6033, P. Samarati, M. Tunstall, J. Posegga, K. Markantonakis, and D. Sauveron, Eds. Berlin, Germany: Springer-Verlag, 2010, pp. 154-169.
    • (2010) Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices , vol.6033 , pp. 154-169
    • Backes, W.1    Cordasco, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.