Academia.eduAcademia.edu

A Distributed Approach for Secure M2M Communications

Abstract

A key establishment solution for heterogeneous Machine to Machine (M2M) communications is proposed. Decentralization in M2M environment leads to situations where highly resource-constrained nodes have to establish end-to-end secured contexts with powerful remote servers, which would normally be impossible because of the technological gap between these classes of devices. This paper proposes a novel collaborative session key exchange method, wherein a highly resource-constrained node obtains assistance from its more powerful neighbors when handling costly cryptographic operations. Formal security analysis and performance evaluation of this method are provided; they confirm the safety and efficiency of the proposed solution.

Key takeaways

  •  Preparation and split phases of the secret value x generated by A, and delivery to the proxies, followed by the secure transport of different segments of the secret key from each proxy to B.
  • Therefore, the delivery of ephemeral key pairs to all proxies begins with the client informing the trusted entity T of their respective identities, along with the size of the secret key that will be transmitted to the server.
  • For this purpose, we propose that the proxies support also the reception of the secret key y on behalf of the client in a cooperative manner.
  • Only the client and the server are involved in the final secret key derivation, while assisting nodes support the secure delivery of generated secrets between the two peers.
  • a. n proxies are selected to assist the key exchange between two peers b. m is a sufficient number of messages needed by A to learn y As shown in the table, in the simple scheme the constrained node A has to perform two public key operations (encrypt and sign) to push its secret x and two other public key operations (verify and decrypt) to receive the secret y.