Journal Home > Volume 18 , Issue 1

Wireless Machine to Machine (M2M) communications enable ubiquitous sensing, controlling, and acting via sensors, actuators, and actors. Reliability and security are of foremost importance in wireless M2M systems. A simple, target distinguishing attack can result in M2M’s failure. This paper presents a RelIable and SEcure scheme, RISE, which is a package of policies that guarantee the reliability of data (including sensor reports and actuator instructions) and devices (including sensors, actuators, and actors). The data reliability is improved by four algorithms, ChooseMedian, ChooseMost, ChooseNearest, and Trust-based Enhancement. Report attainability is improved via m repeat-sending and n multiple-reporting algorithms. Device reliability is guaranteed by device-indistinguishability, which comprises data-indistinguishability and behavior-indistinguishability. The security requirements are formally defined, and the security analysis proves the soundness and completeness of the scheme.


menu
Abstract
Full text
Outline
About this article

RISE: A RelIable and SEcure Scheme for Wireless Machine to Machine Communications

Show Author's information Wei Ren( )Linchen YuLiangli MaYi Ren
Department of Information Security, School of Computer Science, China University of Geosciences, Wuhan 430074, China
Department of Computer Science, Naval University of Engineering, Wuhan 430030, China
Department of Computer Science, "National" Chiao Tung University, Taiwan, China

Abstract

Wireless Machine to Machine (M2M) communications enable ubiquitous sensing, controlling, and acting via sensors, actuators, and actors. Reliability and security are of foremost importance in wireless M2M systems. A simple, target distinguishing attack can result in M2M’s failure. This paper presents a RelIable and SEcure scheme, RISE, which is a package of policies that guarantee the reliability of data (including sensor reports and actuator instructions) and devices (including sensors, actuators, and actors). The data reliability is improved by four algorithms, ChooseMedian, ChooseMost, ChooseNearest, and Trust-based Enhancement. Report attainability is improved via m repeat-sending and n multiple-reporting algorithms. Device reliability is guaranteed by device-indistinguishability, which comprises data-indistinguishability and behavior-indistinguishability. The security requirements are formally defined, and the security analysis proves the soundness and completeness of the scheme.

Keywords: reliability, security, Machine to Machine (M2M), target distinguishing attack

References(11)

[1]
A. Bartoli, M. Dohler, J. Serrano, A. Kountouris, and D. Barthel, Low-power low-rate goes long-range: The case for secure and cooperative machine-to-machine communications, Lecture Notes in Computer Science, vol. 61, no. 3, pp. 219-230, April 2011.
[2]
K. Chang, A. Soong, M. Tseng, and Z. Xiang, Global wireless machine-to-machine standardization, IEEE Internet Computing, vol. 15, no. 2, pp. 64-69, March-April 2011.
[3]
G. Lawton, Machine-to-machine technology gears up for growth, Computer, vol. 37, no. 9, pp. 12-15, September 2004.
[4]
C. Wietfeld, H. Georg, S. Groening, C. Lewandowski, C. Mueller, and J. Schmutzler, Wireless communication networks for smart grid applications, in Proc. 11th European Wireless Conference 2011 - Sustainable Wireless Technologies (European Wireless), Vienna, Austria, April 2011, pp. 1-7.
[5]
G. Wu, S. Talwar, K. Johnsson, N. Himayat, and K. Johnson, M2m: From mobile to embedded internet, IEEE Communications Magazine, vol. 49, no. 4, pp. 36-43, April 2011.
[6]
V. Zhang, R. Yu, S. Xie, W. Yao, Y. Xiao, and M. Guizani, Home m2m networks: Architectures, standards, and qos improvement, IEEE Communications Magazine, vol. 49, no. 4, pp. 44-52, April 2011.
[7]
S. Alam, M. Chowdhury, and J. Noll, Interoperability of security-enabled internet of things, Wireless Personal Communications, vol. 61, no. 3, pp. 567-586, April 2011.
[8]
A. Bartoli, J. Hernandez-Serrano, M. Soriano, M. Dohler, A. Kountouris, and D. Barthel, Securelossless aggregation over fading and shadowing channels for smart grid M2M networks, IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 844-864, December 2011.
[9]
I. Cha, Y. Shah, A. Schmidt, A. Leicher, and M. Meyerstein, Trust in M2M communication, IEEE Vehicular Technology Magazine, vol. 4, no. 3, pp. 69-75, September 2009.
[10]
Z. Fadlullah, M. Fouda, N. Kato, X. Shen, and Y. Nozaki, An early warning system against malicious activities for smart grid communications, IEEE Network, vol. 25, no. 5, pp. 50-55, September-October 2011.
[11]
R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, Grs: The green, reliability, and security of emerging machine to machine communications, IEEE Communications Magazine, vol. 49, no. 4, pp. 28-35, April 2011.
Publication history
Copyright
Acknowledgements
Rights and permissions

Publication history

Received: 10 November 2012
Accepted: 12 December 2012
Published: 07 February 2013
Issue date: February 2013

Copyright

© The author(s) 2013

Acknowledgements

This work was supported by the National Natural Science Foundation of China (No. 61170217), the Open Research Fund from the Shandong Provincial Key Laboratory of Computer Network (No. SDKLCN-2011-01), and Fundamental Research Funds for the Central Universities, China University of Geosciences (Wuhan) (No. 110109).

Rights and permissions

Return