How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending Against Ghost Compromising Attack

Download Now
Provided by: China University of Geosciences
Topic: Security
Format: PDF
In Machine-To-Machine (M2M) communications, authentication of a device is of upmost importance for applications of Internet of Things. As traditional authentication schemes always assume the presence of a person, most authentication technologies cannot be applied in machine-centric M2M context. In this paper, the authors make the first attempt to formally model the authentication in M2M. They first model four attacking adversaries that can formulate all possible attacks in M2M, which are channel eavesdropping attack, credential compromise attack, function compromise attack, and ghost compromise attack. Next, they propose four models to tackle those corresponding adversaries, namely, credential-based model, machine-metrics-based model, reference-based model, and witness-based model.
Download Now

Find By Topic