2016
DOI: 10.1002/sec.1407
|View full text |Cite
|
Sign up to set email alerts
|

An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems

Abstract: The Internet has made the world smaller while there is still a gap between the cyber world and our physical world. In the future cyber‐physical system (CPS), all objects in cyber world and physical world would be connected, and the concepts of cyber world and physical world will no longer exist. The speed of information transmitting and processing will be faster, the abilities of controlling facilities and handling events will be more powerful, and our lives will be better. In the CPS, machine to machine (M2M)… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(10 citation statements)
references
References 29 publications
0
10
0
Order By: Relevance
“…Correspondingly, authors in [168] propose an identitybased cryptographic authentication scheme without the need of a Key-escrow mechanism to secure M2M interactions in CPS. The scheme saves upon precious computation and communication resources by averting the process of signature generation, transmission and verification.…”
Section: ) Preventive Measuresmentioning
confidence: 99%
See 1 more Smart Citation
“…Correspondingly, authors in [168] propose an identitybased cryptographic authentication scheme without the need of a Key-escrow mechanism to secure M2M interactions in CPS. The scheme saves upon precious computation and communication resources by averting the process of signature generation, transmission and verification.…”
Section: ) Preventive Measuresmentioning
confidence: 99%
“…For instance, issues concerning device security such as device identity [154,155,156], tamperproofing [154,160], registration and management [43], and secure boot [158] have been addressed by various tech giants including IBM, AT&T, TCG and Juniper Networks. Similarly, issues concerning data security and network access including authenticated encryption [168,169,170], privacy preserving computation (homomorphic encryption) [161], secure cloud access [17], mutual device and gateway authentication [86], and secure network access control [86,167] have also been meticulously tackled. Whenever we talk about cryptographic security, key management is an associated challenge, and it is always considered to be an open research issue [200].…”
Section: Lessons Learnt and Pitfallsmentioning
confidence: 99%
“…Recently, in [1], ID-based cryptosystems were employed, combined with key exchange strategies, in particular, the Authenticated Identity-Based Cryptography (IBC) without Key-Escrow (AIBCwKE) mechanism. The scheme seems to withstand most of the known attacks; however, the scheme requires the target sensors and mobile devices to perform computationally expensive cryptographic operations.…”
Section: Related Workmentioning
confidence: 99%
“…In the near future, this gap will vanish and all objects in the physical world will be connected to the cyber world by the Cyber-Physical System (CPS). Hence, there will be no longer a distinction between the cyber world and the physical world [1], [2]. Objects and devices over CPS are capable of capturing a variety of multimedia contents, are able to exchange information (e.g.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation