In Machine-to-Machine (M2M) communications, authentication of a device is of upmost importance for applications of Internet of Things. As traditional authentication schemes always assume the presence of a person, most authentication technologies cannot be applied in machine-centric M2M context. In this paper, we make the first attempt to formally model the authentication in M2M. We first model four attacking adversaries that can formulate all possible attacks in M2M, which are channel eavesdropping attack, credential compromise attack, function compromise attack, and ghost compromise attack. Next, we propose four models to tackle those corresponding adversaries, namely, credential-based model, machine-metrics-based model, reference-based mo...
Abstract – The deficient of a good authentication protocol in a ubiquitous application environment h...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
With the proliferation of smart devices capable of communicating over a network using different prot...
In Machine-to-Machine (M2M) communications, authentication of a device is of upmost importance for a...
In the emerging Industrial IoT era, Machine-to-Machine (M2M) communication technology is considered ...
In the emerging Industrial IoT era, Machine-to-Machine (M2M) communication technology is considered ...
As the next generation of network, the emerging cyber-physical systems (CPS) are going to connect al...
AbstractSecurity and Privacy is a major concern in IoT and within terminal authentication is a major...
Publisher Copyright: © 2021 Copyright held by the owner/author(s).Mobile device authentication has b...
Abstract M2M (Machine-to-Machine Communication) refers to technologies that allow wired and wireless...
In the modern technological world, the existence of minuscule devices that are able to exchange data...
Internet of Medical Things (IoMT) is an application-specific extension of the generalized Internet o...
AbstractThe remote anonymous trusted authentication of M2M equipments is a key problem in Internet o...
Abstract: Security component in IoT system are very crucial because the devices within the IoT syste...
Machine-to-machine (M2M) communication is one of the critical technologies of the industrial Interne...
Abstract – The deficient of a good authentication protocol in a ubiquitous application environment h...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
With the proliferation of smart devices capable of communicating over a network using different prot...
In Machine-to-Machine (M2M) communications, authentication of a device is of upmost importance for a...
In the emerging Industrial IoT era, Machine-to-Machine (M2M) communication technology is considered ...
In the emerging Industrial IoT era, Machine-to-Machine (M2M) communication technology is considered ...
As the next generation of network, the emerging cyber-physical systems (CPS) are going to connect al...
AbstractSecurity and Privacy is a major concern in IoT and within terminal authentication is a major...
Publisher Copyright: © 2021 Copyright held by the owner/author(s).Mobile device authentication has b...
Abstract M2M (Machine-to-Machine Communication) refers to technologies that allow wired and wireless...
In the modern technological world, the existence of minuscule devices that are able to exchange data...
Internet of Medical Things (IoMT) is an application-specific extension of the generalized Internet o...
AbstractThe remote anonymous trusted authentication of M2M equipments is a key problem in Internet o...
Abstract: Security component in IoT system are very crucial because the devices within the IoT syste...
Machine-to-machine (M2M) communication is one of the critical technologies of the industrial Interne...
Abstract – The deficient of a good authentication protocol in a ubiquitous application environment h...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
With the proliferation of smart devices capable of communicating over a network using different prot...