A Lightweight Inter-domain Direct Anonymous Attestation Scheme for Machine-to-Machine Networks

  • Liquan C
  • Aiqun H
  • Jie H
  • et al.
N/ACitations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

As an important application mode of Internet of Things,Machine-to-Machine (M2M) networks have gained more and more concerns.However, the security problems such as privacy protection and platformauthentication in M2M networks are not fulfilled the requirements yet.Since the M2M devices are always assigned to desolate and uninhabitedcircumstances, it is vulnerable to be stolen or maliciously attacked bythose adversary or hacker. Meanwhile, the limiting computational andstorage capabilities of M2M device also restrain the application ofcomplicated security scheme. The inter-domain platform authentication ofM2M device belonged to different issuer is not fully resolved in thoseearly literatures. In this paper, we propose a Lightweight Inter-domainDirect Anonymous Attestation (L-IDAA) scheme to solve the securityproblems in inter-domain M2M networks according to the features of themand the characters of the M2M devices. We build a M2M CertificateAuthority system above the issuer domains, and use this CA system toassure the authenticity of Issuers and Verifiers in different DAAdomains. The proposed scheme can remedy the security fault of thoselegacy inter-domain schemes and gain higher computational efficiency.The computational cost for TPM is reduced to 1G(1)(2) and that for Hostis reduced to 16G(1)+1G(1)(2). Finally, we use the ideal/real-systemmodel to prove the security of L-IDAA scheme. The results show that theproposed L-IDAA scheme is feasible and is suitable for inter-domainanonymous attestation in M2M networks.

Cite

CITATION STYLE

APA

Liquan, C., Aiqun, H., Jie, H., & Johanna, V. (2013). A Lightweight Inter-domain Direct Anonymous Attestation Scheme for Machine-to-Machine Networks. In Proceedings of the The 1st International Workshop on Cloud Computing and Information Security (Vol. 52). Atlantis Press. https://doi.org/10.2991/ccis-13.2013.125

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free