DocumentCode :
113514
Title :
A chaos-based authentication and key management scheme for M2M communication
Author :
Boubakri, Wided ; Abdallah, Walid ; Boudriga, Noureddine
Author_Institution :
Commun. Networks & Security Res. Lab., Univ. of Carthage, Tunis, Tunisia
fYear :
2014
fDate :
8-10 Dec. 2014
Firstpage :
366
Lastpage :
371
Abstract :
Machine to Machine (M2M) communication is an emerging technology that allows dynamic configuration of networks connecting many heterogeneous devices. Machines are used to assess and monitor the environment conditions and exchange information in an autonomous fashion. In many critical applications, machines are located in hazardous and even hostile environments, which facilitate security attacks and manipulation by adversary parties. This paper proposes a security architecture for M2M communication networks that can ensure mutual authentication and key management based on RFID and chaotic encryption techniques. This scheme allows dynamic sharing of different kinds of keys intended to secure unicast and multicast traffics whilst meeting the scalability requirement of the M2M communication. In addition, security analysis and simulation work, show that it ensures efficiency in terms of communication overhead, memory requirement, and energy consumption.
Keywords :
chaos; cryptography; radiofrequency identification; M2M communication networks; RFID; autonomous fashion; chaos-based authentication; key management scheme; machine to machine communication; multicast traffics; mutual authentication; security architecture; security attacks; unicast traffics; Authentication; Chaotic communication; Encryption; Logic gates; Public key; Radiofrequency identification; M2M; RFI; chaotic encryption; key management;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference for
Conference_Location :
London
Type :
conf
DOI :
10.1109/ICITST.2014.7038839
Filename :
7038839
Link To Document :
بازگشت