2013
DOI: 10.1002/sec.695
|View full text |Cite
|
Sign up to set email alerts
|

A study of privacy problem solving using device and user authentication for M2M environments

Abstract: Inside a machine‐to‐machine (M2M) environment, a device is very much a communication subject. Machine and gateways are important communication subjects. It can be collecting or storing surrounding information as user's intention. There is a case that infringes other person's privacy such as not passing through a certification process of the user or communication chairman who requests communications among the information that is collected by the machine. Therefore, we wish to propose privacy problem solving usi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…However, the framework lacks the details of any specific authentication scheme, any specific application and the corresponding attacks. The contribution of [14] focuses mostly on withstanding man-in-themiddle attack. The protocol protects the information privacy of other machines and users that are not the subjects of the communication.…”
Section: Related Workmentioning
confidence: 99%
“…However, the framework lacks the details of any specific authentication scheme, any specific application and the corresponding attacks. The contribution of [14] focuses mostly on withstanding man-in-themiddle attack. The protocol protects the information privacy of other machines and users that are not the subjects of the communication.…”
Section: Related Workmentioning
confidence: 99%
“…A privacy problem solving using device and user authentication design has been proposed in . The design could not only support the certification process between the devices and users, which are the communication subjects, but also protect the privacy information of other users or machines that are not the subjects of the communication.…”
Section: Relate Workmentioning
confidence: 99%
“…While the works in only consider at most three types of attacks, the proposed authentication scheme with AIBCwKE mechanism provides a comprehensive protection for M2M communication through which the M2M system could withstand Man‐in‐the‐Middle attacks, impersonation attacks, replay attacks, DoS attacks, and compromised attacks. Furthermore, the proposed scheme provides detailed authentication procedures among multi‐parties, that is, mobile devices, environmental devices, and MSP, while the works in only describe the authentication between two parties and lack a specific description of authentication process. So the authentication protocol designed in the work has shown more significant achievements than the previous works.…”
Section: Relate Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Jin-Mook Kim et al [31] propose an efficient privacy problem solving using device and user authentication (PSDUA) design. The system can prevent the privacy of the parties from leaking to the communication which they are not involved in.…”
Section: Hyundong Lee and Mokdong Chungmentioning
confidence: 99%