A distributed approach for secure M2M communications

Conference object, Article English OPEN
BEN SAIED , Yosra; OLIVEREAU , Alexis; LAURENT , Maryline;
  • Publisher: IEEE
  • Related identifiers: doi: 10.1109/NTMS.2012.6208702
  • Subject: Formal security analysis | [ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI] | [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] | [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] | Resource constraints | AVISPA | Energy efficiency | M2M | [ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR] | Key establishment

International audience; A key establishment solution for heterogeneous Machine to Machine (M2M) communications is proposed. Decentralization in M2M environment leads to situations where highly resource-constrained nodes have to establish end-to-end secured contexts with... View more
  • References (19)
    19 references, page 1 of 2

    [1] Y. Ben saied, A. Olivereau and D. Zeghlache,” Energy Efficiency in M2M Networks: A Cooperative Key Establishment System”, 3rd Int. Congress on Ultra Modern Telecommunications and Control Systems (ICUMT), 2011.

    [2] H. Chan, A. Perrig and D. Song,“Key Distribution Techniques for Sensor Networks,” Wireless Sensor Networks, T. Znati et al., eds., 2004.

    [3] P. Szczechowiak, L. B. Oliveira, M. Scott, M. Collier, and R. Dahab, “NanoECC: testing the limits of elliptic curve cryptography in sensor networks,” Proceedings of the 7th international Conference on Information Processing in Sensor Networks (IPSN '08), pp. 305-320, 2008.

    [4] H. Wang and Q. Li, “Efficient implementation of public key cryptosystems on mote sensors,” in Proceedings of the International Conference on Information and Communication Security (ICICS '06), pp. 519-528, December 2006.

    [5] R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, P. Kruss, “TinyPK: Securing sensor networks with public key technology,” in Proceedings of the 2nd ACM workshop W. Hu, P. Corke , W. C. Shih, L. Overs, “secFleck: A Public Key Technology Platform for Wireless Sensor Networks,” in Proceedings of the 6th European Conference on Wireless Sensor Networks, February 11-13, 2009, Cork, Ireland.

    P. Pecho, J. Nagy, and P. Hanáček, “Power consumption of hardware cryptography platform for wireless sensor,” in Proceedings of the International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT '09), pp. 318-323, December 2009.

    [8] G. Murphy, A. Keeshan, R. Agarwal, and E. Popovici, “Hardwaresoftware implementation of public-key cryptography for wireless sensor networks,” in IET Irish Signals and Systems Conference, pp. 463-468, June 2006.

    [9] R. Riaz, A. Naureen, A. Akram, A. Akbar, K. Kim, and H. Farooq Ahmed, “A unified security framework with three key management schemes for wireless sensor networks,” Computer Communications, vol. 31, no. 18, pp. 4269-4280, 2008.

    [10] J. Mache, C.-Y. Wan, and M. Yarvis, “Exploiting heterogeneity for sensor network security,” in Proceedings of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, June 2008, pp. 591-593.

    [11] M. Petrova et al, “ Overall secure PN architecture,” in My Personal Adaptive Global NET (MAGNET), D2.1.2/D4.1.3,Octobre 2005

  • Metrics