Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 3/2016

01.05.2016

Designing and verifying a P2P service security protocol in M2M environment

verfasst von: Woo-Sik Bae

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 3/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Multifunctional high-performance electronic systems in M2M(Machine-to-Machine) industry have been evolving substantially in tandem with the advancement of IT. M2M, standing for machine-to-machine communication, replaces people in cases where human intervention is hardly viable or in such fields as weather, environment or disasters where long-term monitoring is required. Yet, due to the nature of M2M devices involving wireless communication, they are exposed to intruders’ attacks. Thus, the overriding concern in M2M communication is mutual authentication and security. In this context, security communication protocols are considered worth exploring. This paper concerns designing a safe communication protocol by applying hash locks, random numbers and session keys. Instead of arguing for the security of the protocol based on mathematical theorem proving as most previous studies did, the present paper demonstrates the proposed protocol is safe against a variety of intruders’ attacks by formally verifying it using Casper/FDR. In short, the proposed protocol is verified in terms of safety, deadlock and livelock.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Song JS (2013) M2M standards and technology trends. TTA J 150:84–89 Song JS (2013) M2M standards and technology trends. TTA J 150:84–89
2.
Zurück zum Zitat Pyo CS (2013) M2M techonolgy and its standardization trends, oneM2M 2013 Seoul International Conference Pyo CS (2013) M2M techonolgy and its standardization trends, oneM2M 2013 Seoul International Conference
3.
Zurück zum Zitat Wu G, TalwReader S, Johnsson K, Himayat N, Johnson KD (2011) M2M: from mobile to embedded internet. IEEE Commun Mag 49(4):36–43CrossRef Wu G, TalwReader S, Johnsson K, Himayat N, Johnson KD (2011) M2M: from mobile to embedded internet. IEEE Commun Mag 49(4):36–43CrossRef
4.
Zurück zum Zitat Ngo HH, Wu X, Le PD, Srinivasan B (2010) An individual and group authentication model for wireless network services. J Convergence Inf Technol 5(1):82–94CrossRef Ngo HH, Wu X, Le PD, Srinivasan B (2010) An individual and group authentication model for wireless network services. J Convergence Inf Technol 5(1):82–94CrossRef
5.
Zurück zum Zitat ETSI (2011) “Machine to machine communications (M2M); M2M functional architecture,” ETSI, TS 102 690 ETSI (2011) “Machine to machine communications (M2M); M2M functional architecture,” ETSI, TS 102 690
6.
Zurück zum Zitat Hummen R, Ziegeldorf JH, Shafagh H, Raza S, Wehrle K (2013) “Towards viable certificate-based authentication for the Internet of Things”. In: Proc, ACM HotWiSec.’13: 37–42 Hummen R, Ziegeldorf JH, Shafagh H, Raza S, Wehrle K (2013) “Towards viable certificate-based authentication for the Internet of Things”. In: Proc, ACM HotWiSec.’13: 37–42
7.
Zurück zum Zitat Kalyani P, Chellappan C (2011) Heterogeneous wireless mobile sensor network mobile based routing adapted to dynamic topology. Eur J Sci Res 50(1):143–150 Kalyani P, Chellappan C (2011) Heterogeneous wireless mobile sensor network mobile based routing adapted to dynamic topology. Eur J Sci Res 50(1):143–150
8.
Zurück zum Zitat Aiash M, Mapp G, Lasebae A, Phan R, Loo J (2012) A formally verified AKA protocol for vertical handover in hetero-geneous environments using Casper/FDR. EURASIP J Wirel Commun Netw 2012:57–80CrossRef Aiash M, Mapp G, Lasebae A, Phan R, Loo J (2012) A formally verified AKA protocol for vertical handover in hetero-geneous environments using Casper/FDR. EURASIP J Wirel Commun Netw 2012:57–80CrossRef
11.
Zurück zum Zitat Aiash M, Mapp G, Lasebae A, Nemrat A AL (2012) “Supporting LTE networks in heterogeneous environment using the Y-Comm framework”. In: Proceeding of The Fourth International Conference on Networks & Communications (NETCOM-2012), Chennai, India, pp. 125–136 Aiash M, Mapp G, Lasebae A, Nemrat A AL (2012) “Supporting LTE networks in heterogeneous environment using the Y-Comm framework”. In: Proceeding of The Fourth International Conference on Networks & Communications (NETCOM-2012), Chennai, India, pp. 125–136
12.
Zurück zum Zitat He D, Chen C, Chan S, Bu J (2012) Strong roaming authentication technique for wireless and mobile networks. Int J Commun Syst. doi:10.1002/dac.1387, Early view of an online version He D, Chen C, Chan S, Bu J (2012) Strong roaming authentication technique for wireless and mobile networks. Int J Commun Syst. doi:10.​1002/​dac.​1387, Early view of an online version
13.
Zurück zum Zitat Chen C, He D, Chan S, Bu J, Gao Y, Fan R (2010) Lightweight and provably secure user authentication with anonymity for the global mobility network. Int J Commun Syst 2010 24:347–362. doi:10.1002/dac.1158 CrossRef Chen C, He D, Chan S, Bu J, Gao Y, Fan R (2010) Lightweight and provably secure user authentication with anonymity for the global mobility network. Int J Commun Syst 2010 24:347–362. doi:10.​1002/​dac.​1158 CrossRef
14.
Zurück zum Zitat Stig Fr M, Joe-Kai T (2012) “Computational security analysis of the UMTS and LTE authentication and key agreement protocols”. CoRR, abs, pp. 1203–3866 Stig Fr M, Joe-Kai T (2012) “Computational security analysis of the UMTS and LTE authentication and key agreement protocols”. CoRR, abs, pp. 1203–3866
15.
Zurück zum Zitat Aiash M, Mapp G, Lasebae A, Phan R (2012) A survey on authentication and key agreement protocols in heterogeneous networks. Int J Netw Secur Appl (IJNSA) 2012 4(4):199–214 Aiash M, Mapp G, Lasebae A, Phan R (2012) A survey on authentication and key agreement protocols in heterogeneous networks. Int J Netw Secur Appl (IJNSA) 2012 4(4):199–214
16.
Zurück zum Zitat Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2010) Vulnerability analysis of RFID protocols for tag ownership transfer. Comput Netw 54(9):1502–1508CrossRefMATH Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2010) Vulnerability analysis of RFID protocols for tag ownership transfer. Comput Netw 54(9):1502–1508CrossRefMATH
17.
Zurück zum Zitat Song B, Mitchell CJ (2011) Scalable RFID security protocols supporting tag ownership transfer. Comput Commun 34(4):556–566CrossRef Song B, Mitchell CJ (2011) Scalable RFID security protocols supporting tag ownership transfer. Comput Commun 34(4):556–566CrossRef
18.
Zurück zum Zitat Chen H, Yu S, Shang J etc. (2009) “Comparison with several fuzzy trust methods for P2P-based system”. In proceedings of the 2009 International Conference on Information Technology and Computer Science, Washington, DC, USA, pp. 188–119 Chen H, Yu S, Shang J etc. (2009) “Comparison with several fuzzy trust methods for P2P-based system”. In proceedings of the 2009 International Conference on Information Technology and Computer Science, Washington, DC, USA, pp. 188–119
19.
Zurück zum Zitat Aringhieri R, Damiani E, Vimercati SDCD, Paraboschi S, Samarati P (2006) Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems, special topic section on soft approaches to information retrieval and information access on the web. J Am Soc Inf Sci Technol 57(4):528–553CrossRef Aringhieri R, Damiani E, Vimercati SDCD, Paraboschi S, Samarati P (2006) Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems, special topic section on soft approaches to information retrieval and information access on the web. J Am Soc Inf Sci Technol 57(4):528–553CrossRef
20.
Zurück zum Zitat Shin K, Reeves DS, Rhee I (2009) “Treat-before-trick: free-riding prevention for bittorrent-like peer-to-peer networks”. Proceedings of 23rd IEEE international parallel and distributed processing symposium, pp. 1–12 Shin K, Reeves DS, Rhee I (2009) “Treat-before-trick: free-riding prevention for bittorrent-like peer-to-peer networks”. Proceedings of 23rd IEEE international parallel and distributed processing symposium, pp. 1–12
21.
Zurück zum Zitat Sarjaz BS, Abbaspour M (2013) Securing BitTorrent using a new reputation-based trust management system. Peer-to-Peer Netw Appl 6:86–100CrossRef Sarjaz BS, Abbaspour M (2013) Securing BitTorrent using a new reputation-based trust management system. Peer-to-Peer Netw Appl 6:86–100CrossRef
22.
Zurück zum Zitat Nam T, Lee H, Jeong C, Han C (2005) A harmful content protection in peer-to-peer networks. Artif Intell Simul 3397:617–626CrossRef Nam T, Lee H, Jeong C, Han C (2005) A harmful content protection in peer-to-peer networks. Artif Intell Simul 3397:617–626CrossRef
23.
Zurück zum Zitat Lowe G (2009) Casper: a compiler for the analysis of security protocols. Oxford University Computing Laboratory, Oxford Lowe G (2009) Casper: a compiler for the analysis of security protocols. Oxford University Computing Laboratory, Oxford
24.
Zurück zum Zitat Kim l-G, Jeon C-W, Kim H-S, Choi J-Y, Kang I-H (2005) Formal methodology for analysis of security protocols. J Korea Inst Inf Secur Cryptol 15:17–27 Kim l-G, Jeon C-W, Kim H-S, Choi J-Y, Kang I-H (2005) Formal methodology for analysis of security protocols. J Korea Inst Inf Secur Cryptol 15:17–27
25.
Zurück zum Zitat Fromal system(Europe) Ltd (2010) Failures-divergence refinement FDR2 user manual. Oxford University Computing Laboratory, Oxford Fromal system(Europe) Ltd (2010) Failures-divergence refinement FDR2 user manual. Oxford University Computing Laboratory, Oxford
26.
Zurück zum Zitat Pura M-L (2010) Victor valeriu patriciu, ion bica. “Formal verification of G-PAKE using Casper/FDR2-securing a group PAKE protocol using Casper/FDR2,” Security and Cryprography Proceedings of the 2010 International Conference. pp. 1–5 Pura M-L (2010) Victor valeriu patriciu, ion bica. “Formal verification of G-PAKE using Casper/FDR2-securing a group PAKE protocol using Casper/FDR2,” Security and Cryprography Proceedings of the 2010 International Conference. pp. 1–5
27.
Zurück zum Zitat Bae WS (2014) Formal verification of an RFID authentication protocol based on hash function and secret code. Wirel Pers Commun Int J 79(4):2595–2609CrossRef Bae WS (2014) Formal verification of an RFID authentication protocol based on hash function and secret code. Wirel Pers Commun Int J 79(4):2595–2609CrossRef
Metadaten
Titel
Designing and verifying a P2P service security protocol in M2M environment
verfasst von
Woo-Sik Bae
Publikationsdatum
01.05.2016
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 3/2016
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-015-0396-1

Weitere Artikel der Ausgabe 3/2016

Peer-to-Peer Networking and Applications 3/2016 Zur Ausgabe