A Secure Model for Machine to Machine Device Domain Based Group in a Smart City Architecture

Mariya Ouaissa, Ecole Nationale Supérieure des Arts et Métiers Moulay-Ismail University, Abdallah Rhattoy, Moulay-Ismail University
2019 International Journal of Intelligent Engineering and Systems  
The new Internet of Things (IoT) applications are enabling Smart City initiatives worldwide. It provides the ability to remotely monitor, manage and control devices. The main features of a smart city include privacy of users and security of communication. The distributed architecture of IoT aims at providing location awareness and low-latency interactions to Machine-to-Machine (M2M) applications. In this context, the Long Term Evolution (LTE) technology and its evolutions are expected to play a
more » ... major role as a communication infrastructure that guarantees low deployment costs and embedded security, we show how a network deployment that exploits Deviceto-Device (D2D) communications and Wireless Sensor Network (WSN), currently under definition within 3rd Generation Partnership Project (3GPP) and non-3GPP access network, can be employed to support efficient communication between M2M devices (nodes and smart objects) and the core network in LTE system. In this paper, we propose a secure group model include different authentication mechanisms combined between D2D and WSN technologies that allow the protection of M2M devices through strong encryption and authentication means, so that devices can benefit from high security functionalities without however having to execute computationally intensive operations with a low communication complexity. The results obtained show that our model firstly solve the initial key establishment and integrity problems in the presence of the inside adversaries in networks and offers best performance than the standard Bluetooth in D2D link. Secondly our proposed examine the area of authentication for sensor networks by make a combination between algorithms such as TinyPK and Timed Efficient Stream Loss-Tolerant Authentication (TESLA) in order to secure the link between sensors and achieve a high levels of security.
doi:10.22266/ijies2019.0228.16 fatcat:6jd4fxj6hfanlnzddhcu55lhti