Preventing misuse of duplicate certificates in IoT/M2M systems

Yu Hao Hsu, Fuchun Lin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

The IoT/M2M service providers need security mechanisms to avoid illegal usage of the service. Normally, this can be accomplished by using the certificate to authenticate the device before providing the service. In this paper, we consider the situation where a malicious user attempts to pay only for the service of a device but deploy the same certificate for many other devices to access the service illegally. To address this problem of duplicate certificates, we design two prevention mechanisms on top of the security framework defined in the oneM2M standard. Furthermore, we implement these two protection mechanisms on the OM2M platform and evaluate them in terms of their cost and performance in order to find the most suitable one for service providers.

Original languageEnglish
Title of host publication2017 26th International Conference on Computer Communications and Networks, ICCCN 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509029914
DOIs
StatePublished - 14 Sep 2017
Event26th International Conference on Computer Communications and Networks, ICCCN 2017 - Vancouver, Canada
Duration: 31 Jul 20173 Aug 2017

Publication series

Name2017 26th International Conference on Computer Communications and Networks, ICCCN 2017

Conference

Conference26th International Conference on Computer Communications and Networks, ICCCN 2017
Country/TerritoryCanada
CityVancouver
Period31/07/173/08/17

Keywords

  • Authentication
  • Certificate
  • IoT
  • M2M
  • OM2M
  • OneM2M
  • Security

Fingerprint

Dive into the research topics of 'Preventing misuse of duplicate certificates in IoT/M2M systems'. Together they form a unique fingerprint.

Cite this