• Title/Summary/Keyword: M2M communication

Search Result 1,997, Processing Time 0.032 seconds

A Study on M2M Identifier for M2M Service in Mobile Communication Networks (이동통신 네트워크에서 M2M 서비스를 위한 M2M 식별자 연구)

  • Hong, Yong-Geun;Youn, JooSang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.11
    • /
    • pp.63-71
    • /
    • 2012
  • Recently, due to the development of the mobile communication system and communication technology, a communication paradigm changes from human-to-human(H2H) communication to machine-to-human(M2H) and machine-to-machine(M2M) communication. The machine means a device with networking capabilities Also, if M2M services will be activated, we can expect that many M2M devices connect to mobile communication networks, which leads to the lack of M2M identifier to identify a M2M device in mobile communication system. Therefore, this paper proposes the group identifier based M2M identification scheme to identify many M2M devices in mobile communication based M2M service network. In the future, the proposed M2M identification scheme can be utilized as a way to solve the shortage problem of M2M identifier.

Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments (안전한 M2M 통신 구축을 위한 상호인증 및 키 교환 프로토콜)

  • Eun, Sun-Ki;Jeon, Seo-Kwan;Ahn, Jae-Young;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.73-83
    • /
    • 2010
  • Recently, as IT technologies developed, communication technologies of a various forms that satisfied convenience of user are being researched. Among various research, unlike traditional forms of communication, M2M communication is getting attention that without any control or involvement of people to establish communication between devices. However, the M2M communication could more easily be exposed to many security problems such as data exposure, data theft, unauthorized change and delete and privacy. Therefore, in this paper, we derive security requirements and propose the M2M communication architecture that provide a secure M2M communication environment. Also, we propose a secure mutual authentication and key establishment protocol between a M2M device or gateway domain and a M2M network domain. The proposed protocol is secure against replay attack, impersonation attack and protect a user privacy and tracing.

Inter-device Mutual authentication and Formal Verification in M2M Environment (M2M 환경에서 장치간 상호 인증 및 정형검증)

  • Bae, WooSik
    • Journal of Digital Convergence
    • /
    • v.12 no.9
    • /
    • pp.219-223
    • /
    • 2014
  • In line with the advanced wireless communication technology, M2M (Machine-to-Machine) communication has drawn attention in industry. M2M communication features are installed and operated in the fields where human accessibility is highly limited such as disaster, safety, construction, health and welfare, climate, environment, logistics, culture, defense, medical care, agriculture and stockbreeding. In M2M communication, machine replaces people for automatic communication and countermeasures as part of unmanned information management and machine operation. Wireless M2M inter-device communication is likely to be exposed to intruders' attacks, causing security issues, which warrants proper security measures including cross-authentication of whether devices are legitimate. Therefore, research on multiple security protocols has been conducted. The present study applied SessionKey, HashFunction and Nonce to address security issues in M2M communication and proposed a safe protocol with reinforced security properties. Notably, unlike most previous studies arguing for the security of certain protocols based on mathematical theorem proving, the present study used the formal verification with Casper/FDR to prove the safety of the proposed protocol. In short, the proposed protocol was found to be safe and secure.

Throughput Analysis of Wireless Transmission Platform using Multiple Wireless Chips for M2M Networks (M2M 어플리케이션 지원을 위한 무선 결합 전송 플랫폼의 전송률 분석)

  • Wang, Hanho;Woo, Choongchae
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.63 no.3
    • /
    • pp.195-199
    • /
    • 2014
  • Various M2M applications have different quality-of-service(QoS) requirements to be implemented practically. QoS requirements are normally data rate and delay constraint. However, there are limited number of wireless communication chip solutions which cannot support QoS requirements for all M2M application. Hence, aggregated usage of plural wireless communication chip solutions should be needed to implement M2M applications. In this paper, we consider the case that two wireless communication chips using random access protocol work together to transmit data of an M2M application. In such case, data rate and delay performance are mathematically analyzed. In our results, practical data rate can be improved from 2.5 to 7 times while delay constraints are satisfied if we simply use two wireless communication chips together.

A Scheme of Standard M2M and FIPA based Agent Communication in M2M Environment (M2M(Machine to Machine) 모델 표준화 개요 및 M2M 환경에서의 FIPA 기반 Agent 간 통신에 대한 연구)

  • Kim D.H.;Song J.Y.;Lee S.W.;Lim S.J.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2005.06a
    • /
    • pp.1887-1892
    • /
    • 2005
  • In the future, a machine-tool will be more improved in the form of a knowledge evolution based device. In order to develop the knowledge evolution based machine-tool, this paper proposes the structure of standard M2M(Machine To Machine) and the scheme of agent communication in environment. The communication agent such as dialogue agent has a role of interfacing with another machine for cooperation. To design of the communication agent module in M2M environment, FIPA(Foundation of Intelligent Physical Agent) and ping agent based on JADE(Java Agent Development Framework) or FIPA-OS(Open Source) are analyzed in this study. Through this, it is expected that the agent communication can be more efficiently designed and the knowledge evolution based machine-tool can be hereafter more easily implemented.

  • PDF

Smart Phone and Vehicle Authentication Scheme with M2M Device (M2M 기기에서 스마트폰 및 차량 인증 기법)

  • Yeo, Seong-Gwon;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.2 no.4
    • /
    • pp.1-7
    • /
    • 2011
  • As the developing of the information technology, M2M market that is using communication between devices is growing rapidly and many companies are involved in M2M business. In this paper, the concept of telematics and vulnerabilities of vehicle network security are discussed. The convergence of vehicle and information technology, the development of mobile communication technology have improved quality of service that provided to user but as a result security threats has diverse. We proposed new business model that be occurred to the participation of mobile carriers in telematics business and we analyzed mobile radio communication network security vulnerabilities. We proposed smart phone and Vehicle authentication scheme with M2M device as a way to solve vulnerabilities.

A remote device authentication scheme in M2M communications (M2M 통신에서 원격장치 인증 기법)

  • Lee, Song-Hee;Park, Nam-Sup;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.309-316
    • /
    • 2013
  • Machine-to-machine (M2M) communication occurs when devices exchange information independent of human intervention. Prominent among the technical challenges to M2M communication are security issues, such as eavesdropping, spoofing, modification, and privacy violation. Hence, it is very important to establish secure communication. In this paper, we propose a remote authentication scheme, based on dynamic ID, which provides secure communication while avoiding exposure of data through authentication between the M2M domain and the network domain in the M2M architecture. We then prove the correctness and security of the proposed scheme using a logic-based formal method.

Group Key Generation and Exchange Scheme using a Trapdoor Collision Hash in M2M Communications Environment (M2M 통신 환경에서 트랩도어 충돌 해쉬를 이용한 그룹키 생성 및 교환 기법)

  • Kim, Sung-Soo;Jun, Moon-Seog;Choi, Do-Hyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.9-17
    • /
    • 2015
  • The development of wireless communication technology and change in the ICT market has led to the development of the M2M service and technology. Under these circumstances, the M2M environment has been the focus of communication environment construction between machines without control or direct intervention of human being. With characteristics of wireless communication environment, the possibility of being exposed to numerous security threats and safe communication security technology have becoming an issue an important requirements for problems such as data exposure, forgery, modulation, deletion, and privacy. This research analyzes requirements of trapdoor collision hash, generates keys between groups under the M2M environment by using the specificity of trapdoor, and suggests technology to exchange keys with session keys. Further, it also suggests techniques to confirm authentication of device and gateway in accordance with group key generation. The techniques herein suggested are confirmed as safe methods in that they have attack resistance such as Masquerade Attack, Man-in-the-Middle Attack, and Replay Attack in the group communication block by using the speciality of collision message and collision hash.

State of the Art 3GPP M2M Communications toward Smart Grid

  • Kwon, Young-Min;Kim, Jun-Suk;Chung, Min-Young;Choo, Hyun-Seung;Lee, Tae-Jin;Kim, Mi-Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.468-479
    • /
    • 2012
  • Recent advances in wireless communications and electronics has enabled the development of machine-to-machine (M2M) communications. This communication paradigm has been expected as an automated control and report solution for smart grid. The smart grid enables customers and operators to utilize the collected usage information from a large number of meters with transceivers for efficiency and safety. In this paper, we introduce architecture, requirements and challenges of M2M communications for smart grid. We extract technical issues that should be resolved in M2M communications to support the smart grid via third-generation partnership project (3GPP) cellular networks. We then present the current state of the art of research results to deal with such issues. Finally, we outline the open research issues.

An Error Control in a Whiteboard for M2M Environment (사물 통신 환경을 위한 화이트보드에서의 오류 처리)

  • Bae, Cheol-Soo;Ko, Eung-Nam
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.1
    • /
    • pp.109-113
    • /
    • 2016
  • The necessity of M2M(Machine to Machine) and Multimedia CSCW is described, and error control for multimedia CSCW(Computer Supported Cooperated Works) based on M2M is suggested. The relationship of information collection and utility is relationship of man to man, but is developed object to object by information communication and control system. This paper describes an error control and a white board in multimedia CSCW for M2M environment.