Energy efficiency in M2M networks: A cooperative key establishment system

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Security requirements for the integration of emerging M2M networks in future internet of things are addressed. The heterogeneous nature of M2M devices raises new security challenges that existing proposals could not fulfill. Two entities may not be able to establish a secure end-to-end communication because of the technological gap between them and the resulting inconsistencies in their cryptographic primitives. This paper proposes a novel approach for establishing session keys for highly resource-constrained sensor nodes encountered in these M2M environments with an external server. The proposed system exploits collaboration between heterogeneous nodes by delegating heavy asymmetric cryptographic operations to a set of assisting nodes. A security analysis is conducted to verify that the proposed solution accomplishes safely and efficiently its objective.

Original languageEnglish
Title of host publication2011 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, ICUMT 2011
Publication statusPublished - 1 Dec 2011
Event2011 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, ICUMT 2011 - Budapest, Hungary
Duration: 5 Oct 20117 Oct 2011

Publication series

NameInternational Congress on Ultra Modern Telecommunications and Control Systems and Workshops
ISSN (Print)2157-0221
ISSN (Electronic)2157-023X

Conference

Conference2011 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, ICUMT 2011
Country/TerritoryHungary
CityBudapest
Period5/10/117/10/11

Keywords

  • M2M
  • cooperation
  • energy efficiency
  • key establishment
  • resource constraints
  • trust

Fingerprint

Dive into the research topics of 'Energy efficiency in M2M networks: A cooperative key establishment system'. Together they form a unique fingerprint.

Cite this