Pairwise and group key setup mechanism for secure machine-to-machine communication

In the ubiquitous environment, more and more devices are deployed in our daily life, and need to communicate with one another. M2M (Machine-to-Machine) communication is considered to be one of the major issues in future networks. M2M is expected to bring various benefits in wireless communications when it is interconnected with cellular networks. Considering the characteristics of cellular M2M networks, traditional security solutions are not proper to be applied to cellular M2M networks because the M2M network itself is vulnerable to various attacks. We consider security aspects for cellular M2M communications and propose a key management mechanism including the pairwise key and group key establishment. Our proposal could provide reliability and efficiency for the cellular M2M communication network in the secure manner.

[1]  Xukai Zou,et al.  DGKD: distributed group key distribution with authentication capability , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[2]  Jesus Alonso-Zarate,et al.  Machine-to-machine: an emerging communication paradigm , 2013, Trans. Emerg. Telecommun. Technol..

[3]  Yong Guan,et al.  A robust group-based key management scheme for wireless sensor networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[4]  Yong Wang,et al.  Group Rekeying Schemes for Secure Group Communication in Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[5]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[6]  Kijoon Chae,et al.  Key Establishment and Management for Secure Cellular Machine-to-Machine Communication , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[7]  Lusheng Ji,et al.  A first look at cellular machine-to-machine traffic: large scale measurement and characterization , 2012, SIGMETRICS '12.

[8]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[9]  Gene Tsudik,et al.  Tree-based group key agreement , 2004, TSEC.

[10]  Guohong Cao,et al.  Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[11]  Inhyok Cha,et al.  Trust in M2M communication , 2009, IEEE Vehicular Technology Magazine.

[12]  Richard Han,et al.  A Level Key Infrastructure for Secure and Efficient Group Communication in Wireless Sensor Network , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[13]  B.B. Amberker,et al.  Key management scheme for multiple simultaneous secure group communication , 2009, 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA).

[14]  Min Young Chung,et al.  Group Key Management for Secure Mobile IPTV Service , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[15]  Kijoon Chae,et al.  Key management approach for secure mobile open IPTV service , 2013, Comput. Sci. Inf. Syst..