Local Authentication and Access Control Scheme in M2M Communications With Computation Offloading

Local user access is important to machine-to-machine (M2M) communication because it possesses unique advantages over remote access in that it offers instant services, provides reliable connection, and offloads the traffic of M2M access networks. Local access control is also essential for authorized users to access M2M devices. In this paper, we propose a local authentication and access control scheme (LACS), which allows M2M devices to locally verify the access rights and access privileges of the users. In particular, the property of device heterogeneity is considered in our LACS. The resource-constrained M2M devices can securely outsource heavy computation to user equipment with or without the help of a gateway for energy saving. Our LACS satisfies the security criteria of: 1) user anonymity; 2) mutual authentication; 3) secure key agreement; and 4) securely outsourcing computation. All of these criteria are theoretically proved using a formal model. Experimental data also demonstrates the efficiency of the proposed LACS and the effectiveness of the design with regard to computation offloading.

[1]  Agusti Solanas,et al.  The pursuit of citizens' privacy: a privacy-aware smart city is possible , 2013, IEEE Communications Magazine.

[2]  Qun Li,et al.  Achieving Distributed User Access Control in Sensor Networks , 2022 .

[3]  Hovav Shacham,et al.  Short Group Signatures , 2004, CRYPTO.

[4]  Wenbo He,et al.  A Reservation-based Smart Parking System , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[5]  Chun Chen,et al.  Distributed Access Control with Privacy Support in Wireless Sensor Networks , 2011, IEEE Transactions on Wireless Communications.

[6]  Yang Xiao,et al.  Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.

[7]  Xianbin Wang,et al.  Security and privacy considerations for Wireless Sensor Networks in smart home environments , 2012, Proceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD).

[8]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[9]  Jianfeng Ma,et al.  New Algorithms for Secure Outsourcing of Modular Exponentiations , 2014, IEEE Trans. Parallel Distributed Syst..

[10]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[11]  Ma Jian-feng,et al.  An Access Control Scheme in Wireless Sensor Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[12]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[13]  Gene Tsudik,et al.  Secret Handshakes from CA-Oblivious Encryption , 2004, ASIACRYPT.

[14]  Mohsen Guizani,et al.  Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks , 2015, IEEE Transactions on Wireless Communications.

[15]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[16]  Gene Tsudik,et al.  Taming Big Brother Ambitions: More Privacy for Secret Handshakes , 2010, Privacy Enhancing Technologies.

[17]  Jerome H. Saltzer,et al.  Kerberos authentication and authorization system , 1987 .

[18]  Mihir Bellare,et al.  Entity Authentication and Key Distribution , 1993, CRYPTO.

[19]  Kui Ren,et al.  DP²AC: Distributed Privacy-Preserving Access Control in Sensor Networks , 2009, IEEE INFOCOM 2009.

[20]  Sungyoung Lee,et al.  An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare , 2011, J. Networks.

[21]  Robert H. Deng,et al.  Variations of Diffie-Hellman Problem , 2003, ICICS.

[22]  Anna Lysyanskaya,et al.  How to Securely Outsource Cryptographic Computations , 2005, TCC.

[23]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[24]  Mihir Bellare,et al.  A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.