Elliptic curve cryptography based key management for the M2M local cloud platform

Machine-to-Machine (M2M) technology is one of the key enablers of Internet of Things (IoT) vision which allows communication among smart things in the network and the back end system. Ensuring security through proper key management utilization is without a doubt an important requirement of any M2M system. This paper proposed a key management scheme based on the Elliptic Curve Cryptography (ECC) for the M2M local cloud platform which consists of multiple gateways, which provides scalability to the distributed architecture of the platform while suitable for the low powered device. The scheme has been implemented as part of the M2M platform and its performance has been evaluated. The analysis of the evaluation results in terms of processing time to perform various operations will be discussed.

[1]  A. Shamm Identity-based cryptosystems and signature schemes , 1985 .

[2]  P. Balamuralidhar,et al.  An identity based encryption using elliptic curve cryptography for secure M2M communication , 2012, SecurIT '12.

[3]  Walid Abdallah,et al.  A chaos-based authentication and key management scheme for M2M communication , 2014, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014).

[4]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[5]  Neeli R. Prasad,et al.  Evaluation of secure capability-based access control in the M2M local cloud platform , 2016 .

[6]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[7]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[8]  Kazumaro Aoki,et al.  SEC X.2: Recommended Elliptic Curve Domain Parameters , 2008 .

[9]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[10]  Matthew J. Campagna,et al.  A Cryptographic Suite for Embedded Systems (SuiteE) , 2012 .

[11]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[12]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[13]  Chunming Rong,et al.  Identity-based key agreement and encryption for wireless sensor networks , 2006 .

[14]  Vijay Varadharajan,et al.  Wireless sensor network key management survey and taxonomy , 2010, J. Netw. Comput. Appl..

[15]  Eui-nam Huh,et al.  A dynamic ID-based authentication scheme , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.

[16]  Neeli R. Prasad,et al.  BETaaS: A Platform for Development and Execution of Machine-to-Machine Applications in the Internet of Things , 2016, Wirel. Pers. Commun..