A security authentication scheme in machine-to-machine home network service

Machine-to-machine M2M techniques have significant application potential in the emerging internet of things, which may cover many fields from intelligence to ubiquitous environment. However, because of the data exposure when transmitted via cable, wireless mobile devices, and other technologies, its security vulnerability has become a great concern during its further extending development. This problem may even get worse if the user privacy and property are considered. Therefore, the authentication process of communicating entities has attracted wide investigation. Meanwhile, the data confidentiality also becomes an important issue in M2M, especially when the data are transmitted in a public and thereby insecure channel. In this paper, we propose a promising M2M application model that connects a mobile user with the home network using the existing popular Time Division-Synchronous Code Division Multiple Access TD-SCDMA network. Subsequently, a password-based authentication and key establishment protocol is designed to identify the communicating parties and hence establish a secure channel for data transmissions. The final analysis shows the reliability of our proposed protocol. Copyright © 2012 John Wiley & Sons, Ltd.

[1]  Eui-nam Huh,et al.  A dynamic ID-based authentication scheme , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.

[2]  Hyungkyu Lee,et al.  The Efficient Security Architecture for Authentication and Authorization in the Home Network , 2007, Third International Conference on Natural Computation (ICNC 2007).

[3]  Dimitrios Makrakis,et al.  Device authentication mechanism for Smart Energy Home Area Networks , 2011, 2011 IEEE International Conference on Consumer Electronics (ICCE).

[4]  Manik Lal Das,et al.  A Simple and Secure Authentication and Key Establishment Protocol , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.

[5]  Jongpil Jeong,et al.  Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[6]  Jiang Du,et al.  A study of information security for M2M of IOT , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[7]  Yun-kyung Lee,et al.  Home Network Modelling and Home Network User Authentication Mechanism using Biometric Information , 2006, 2006 IEEE International Symposium on Consumer Electronics.

[8]  Hans-Joachim Hof,et al.  Industrial Sensor Network Security Architecture , 2010, 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies.

[9]  Chen Ming,et al.  Hand Tracking Based on Particle Filter and Improved Level Set , 2010 .

[10]  Inhyok Cha,et al.  Trust in M2M communication , 2009, IEEE Vehicular Technology Magazine.