Skip to main navigation Skip to search Skip to main content

A distributed approach for secure M2M communications

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

A key establishment solution for heterogeneous Machine to Machine (M2M) communications is proposed. Decentralization in M2M environment leads to situations where highly resource-constrained nodes have to establish end-to-end secured contexts with powerful remote servers, which would normally be impossible because of the technological gap between these classes of devices. This paper proposes a novel collaborative session key exchange method, wherein a highly resource-constrained node obtains assistance from its more powerful neighbors when handling costly cryptographic operations. Formal security analysis and performance evaluation of this method are provided; they confirm the safety and efficiency of the proposed solution.

Original languageEnglish
Title of host publication2012 5th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2012 Conference and Workshops
DOIs
Publication statusPublished - 23 Jul 2012
Event2012 5th International Conference on New Technologies, Mobility and Security, NTMS 2012 - Istanbul, Turkey
Duration: 7 May 201210 May 2012

Publication series

Name2012 5th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2012 Conference and Workshops

Conference

Conference2012 5th International Conference on New Technologies, Mobility and Security, NTMS 2012
Country/TerritoryTurkey
CityIstanbul
Period7/05/1210/05/12

UN SDGs

This output contributes to the following UN Sustainable Development Goals (SDGs)

  1. SDG 7 - Affordable and Clean Energy
    SDG 7 Affordable and Clean Energy

Keywords

  • AVISPA
  • M2M
  • energy efficiency
  • formal security analysis
  • key establishment
  • resource constraints

Fingerprint

Dive into the research topics of 'A distributed approach for secure M2M communications'. Together they form a unique fingerprint.

Cite this