A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack
2013
International Journal of Distributed Sensor Networks
In Machine-to-Machine (M2M) communications, authentication of a device is of upmost importance for applications of Internet of Things. As traditional authentication schemes always assume the presence of a person, most authentication technologies cannot be applied in machine-centric M2M context. In this paper, we make the first attempt to formally model the authentication in M2M. We first model four attacking adversaries that can formulate all possible attacks in M2M, which are channel
doi:10.1155/2013/679450
fatcat:vtwroczryrhoznqcx64hiw2s6q