How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack

In Machine-to-Machine (M2M) communications, authentication of a device is of upmost importance for applications of Internet of Things. As traditional authentication schemes always assume the presence of a person, most authentication technologies cannot be applied in machine-centric M2M context. In t...

Full description

Bibliographic Details
Main Authors: Wei Ren, Linchen Yu, Liangli Ma, Yi Ren
Format: Article
Language:English
Published: SAGE Publishing 2013-02-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2013/679450