Indian Journal of Science and Technology
DOI: 10.17485/ijst/2015/v8i27/81018
Year: 2015, Volume: 8, Issue: 27, Pages: 1-4
Original Article
Kun-Hee Han1 and Woo-Sik Bae2*
1 Department of Information Communication Engineering, Baekseok University, Cheonan Chungnam, Korea; [email protected]
2 Department of AIS Center, Ajou Motor College, Boryeong Chungnam, Korea; [email protected]
Not only M2M (Machine-to-Machine) communication but also IoT (Internet of Things)technology has emerged against the backdrop of evolving ICT industry, drawing much attention in all fields including auto industry. Being first adopted in such fields as factories, logistics, meteorology, environment, defense and agriculture and stockbreeding, M2M systems enable devices to communicate automatically with one another and to operate in response to varying conditions. As for vehicles, M2M technology is applied to interactions between internal and external vehicular devices, between vehicles, between vehicles and traffic systems and between vehicles and peripheral devices. Yet, wireless communication systems are prone to hacking attacks in transmission sections. Thus, any attacks on vehicles’ brakes, multiple control systems and engine control parts will put passengers and safety at risk. In this context, many researchers explore the security measures for inter-device communication. This paper designed a protocol for safe communication between vehicular devices using hash function and complex mathematical formulae, and tested it with Casper/FDR, a formal verification tool for protocols. The proposed protocol proved to guard against diverse attacks and to be effectively applicable in practice.
Keywords: Authentication Protocol, Internet of things, Location privacy, Model Checking
Subscribe now for latest articles and news.