2019
DOI: 10.1109/access.2019.2908499
|View full text |Cite
|
Sign up to set email alerts
|

Design of a Secure Password-Based Authentication Scheme for M2M Networks in IoT Enabled Cyber-Physical Systems

Abstract: The Internet of Things (IoT) forms a foundation for cyber-physical systems. We propose an efficient and secure authentication scheme for machine-to-machine (M2M) networks in IoT enabled cyber-physical systems. Smart objects and smart devices over CPS are capable of capturing a variety of multimedia contents; interact with each other and also with the physical world in a fully automatic manner without human interference. The proposed scheme allows any pair of entities in an M2M network to mutually authenticate … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
26
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(27 citation statements)
references
References 17 publications
0
26
0
1
Order By: Relevance
“…It is not clear in their protocol how the gateway remains synchronized with the sensor node and how it can resist synchronization attacks. They show that their scheme outperforms other related work in literature [11][12][13][14] with respect to computational performance. Only [7] is slightly more efficient.…”
Section: Related Workmentioning
confidence: 76%
See 1 more Smart Citation
“…It is not clear in their protocol how the gateway remains synchronized with the sensor node and how it can resist synchronization attacks. They show that their scheme outperforms other related work in literature [11][12][13][14] with respect to computational performance. Only [7] is slightly more efficient.…”
Section: Related Workmentioning
confidence: 76%
“…Only [7] is slightly more efficient. In addition, the communication cost of [6] is still lower compared to [12][13][14], but slightly higher than [7,11,14]. However, it has also been clearly shown that all of the schemes [7,[11][12][13][14] suffer significant weaknesses with respect to attacks like for instance tracking attack [7,11,13,14], offline identity guessing attack [7,11,12,14], impersonation attack [7,14], denial of service attack [7,[11][12][13][14], etc.…”
Section: Related Workmentioning
confidence: 99%
“…The execution-cost of LAKD protocol is presented in Table 5, together with that of protocols [22,[60][61][62][63], which were also designed for M2M communication. Concerning the Case 1 measurement, the proposal has less execution-time than the other protocols, except for the schemes of Esfahani et al [22] and Joshitta et al [63].…”
Section: Execution-time Analysismentioning
confidence: 99%
“…Unfortunately, the shared master key can easily experience severe risks if a CPS node is compromised, leading to several attacks in the group. Renuka et al proposed three security mechanisms for machine-to-machine network in CPS [9]. These mechanisms include: (i) mobile-gateway authentication, (ii) mobile-sensor authentication and (iii) sensor-sensor authentication.…”
Section: ) Traditional Approachesmentioning
confidence: 99%
“…In the mobile-gateway approach, the authors included a human-inloop approach where the user is being authenticated using a password. However, in [16], Lara et al claimed that the approaches proposed in [9] require high computational complexities and are vulnerable to several attacks, e.g., offline guessing attack, privileged insider, and denial-of-service (DoS). In addition, Lara et al proposed another solution to mitigate the issues in [9].…”
Section: ) Traditional Approachesmentioning
confidence: 99%