Abstract

In this paper, we analyzed Sun et al.’s scheme which proposes an M2M (Machine-to-Machine) secure communication scheme by using existing TD SCMA (Time Division-Synchronous Code Division Multiple Access) networks. They offer a password-based authentication and key establishment protocol for mutual authentication. Moreover, their proposed secure channel establishment protocol uses symmetric cryptography and one-way hash algorithms and they considered using their protected channel model for mobile users and smart home networks. In this paper, we propose to complete the missing part of Sun et al.’s scheme. This can occur by addressing privacy-preserving and message modification protection. Moreover, improvements can be made to MITM (Man-In-The-Middle) attack resistance, anomaly detection and DoS (Denial-of-Service) attacks with timing. ECDH (Elliptic Curve Diffie Hellman) cryptography based protected cipher-key exchange operation used on initial setup and key-injection operations to provide secure user registration, user password change and home gateway network join phases. We simulated both the proposed and Sun et al.’s schemes. We analyzed Sun et al.’s scheme for performance, network congestion and resource usage. Missing privacy-preserving was analyzed and compared with the GLARM scheme, and the storage cost of each phase was analyzed according to Ferrag et al.’s survey proposal. In Sun et al.’s scheme, future work for the security architecture of the home network is related to Li et al.’s protocol being implemented in our proposed design.

Highlights

  • Security trade-off and optimization are the most common problems in IoT (Internet-of-Things) devices which come with limited resources

  • The improvement of consumer products improves smart home networks and this leads to an increase in wireless network connected devices per user

  • This situation increases the deployment of private information to public networks and increases the security requirements for M2M communication according to the attacks essentially stated in [1]

Read more

Summary

Introduction

Security trade-off and optimization are the most common problems in IoT (Internet-of-Things) devices which come with limited resources. The improvement of consumer products improves smart home networks and this leads to an increase in wireless network connected devices per user This situation increases the deployment of private information to public networks and increases the security requirements for M2M communication according to the attacks essentially stated in [1]. The contributions of this paper focus on message modification, privacy-preserving considered in [2], state management, anomaly detection with the timing for reliable communication, and home gateway and user device revocation. We updated current scheme phases and provided security for user registration, password change, and home gateway join stages. Current protection for a number of attacks and we propose an end-to-end enhanced secure authentication and communication scheme.

Related Works
Proposed Scheme
Protocol Analysis
Security Analysis
Performance and Security Comparisons
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call