Inside a machine-to-machine M2M environment, a device is very much a communication subject. Machine and gateways are important communication subjects. It can be collecting or storing surrounding information as user's intention. There is a case that infringes other person's privacy such as not passing through a certification process of the user or communication chairman who requests communications among the information that is collected by the machine. Therefore, we wish to propose privacy problem solving using device and user authentication PSDUA that can support the certification process between device and user communicating the subject in M2M environment and can support the user in another certification work about various services. PSDUA proposes a design that can pass through a light certification process based on existent system. For example, Kerberos and public key infrastructure PKI can support very heavy certification process but our proposed scheme cannot. However, our proposed system can act easily and fast and that gradual access may be possible using time stamp, device identification, and user log-in information. It can also protect privacy information of other person or machines that are not the subject of communication. Additionally, we also check about confidentiality, integrity, and safety of machine-in-the-middle attack. Also, we can show safety in our proposed system. Our proposed scheme will provide solutions on various securities privacy problems. Copyright © 2013 John Wiley & Sons, Ltd.
[1]
Bong-Hwa Hong,et al.
A User Authentication Method for M2M Environments
,
2012
.
[2]
Xuemin Shen,et al.
Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks
,
2006,
IEEE Transactions on Wireless Communications.
[3]
Geng Wu,et al.
M2M: From mobile to embedded internet
,
2011,
IEEE Communications Magazine.
[4]
George Lawton,et al.
Machine-to-machine technology gears up for growth
,
2004,
Computer.
[5]
Huirong Fu,et al.
Authentication and Key Agreement Protocols Preserving Anonymity
,
2006,
Int. J. Netw. Secur..
[6]
Ashar Aziz,et al.
Privacy and authentication for wireless local area networks
,
1994,
IEEE Personal Communications.
[7]
Whitfield Diffie,et al.
New Directions in Cryptography
,
1976,
IEEE Trans. Inf. Theory.