IEEE Communications Surveys and Tutorials, à paraître.International audienceMachine-to-Machine (M2M) is one of the emergent technologies that has attracted a lot of attention in both industrial and academic sectors and which is expected to grow in the next few years. Indeed, it opens the way to the Internet of Things (IoT), an internet where all devices are connected and communicate without any human intervention. Yet, an important hurdle that may slow down Machine-to-Machine growth and even hinder the massive roll-out of certain applications is security. Even though there have been a lot of research on Machine-to-Machine, nevertheless only few of them focus on the security aspects. As a fusion of heterogeneous networks, Machine-to-Machine poses a number of challenges, particularly to security design. In this paper, we provide a survey on Machine-to-Machine research and development works that mainly addresses security and more precisely the threats that Machine-to-Machine communications have to face. We also tackle the challenges that arise when trying to secure M2M communications along with an investigation of the existing approaches aiming to do so. Finally, we give a general comparison of existing solutions regarding some selected parameters
We devise a payment protocol that can be securely used on mobile devices, even infected by malicious applications. Our protocol only requires a light use of Secure Elements, which significantly simplify certification procedures and protocol maintenance. It is also fully compatible with the EMV SDA protocol and allows off-line payments for the users. We provide a formal model and full security proofs of our protocol using the TAMARIN prover.
National audienceThis paper studies the possibility of using TCG (Trusted Computing Group) specifications to establish trust in Cloud Computing, especially between the provider of Cloud Computing infrastructures and his customers. The first part describes the context and the motivations that led to TCG specifications. The second part describes the architecture, the functions and the properties of TPM (Trusted Platform Module) which is the root of trust in TCG. The last part analyses several approaches to adapt TPM in order to build trust in Cloud computing
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.