Implementing and Verifying a Secure M2m Mutual Authentication Protocol Based on Hash Functions
Kun-Hee Han1, Yoon-Su Jeong2, Woo-Sik Bae3

1Kun-Hee Han, Department of Information Communication Engineering, Baekseok University, Anseo-Dong, Cheonan, Chungnam, South Korea, East Asia.

2Yoon-Su Jeong, Department of Information Communication Engineering, Mokwon University, Doanbuk-Ro, Seo-Gu, Daejeon, Korea, East Asia.

3Woo-Sik Bae, Department of AIS Center, Ajou Motor College, Daehak Road, Jupo-Myeon, Boryeong-Si, Chungnam, Korea, East Asia. 

Manuscript received on 10 June 2019 | Revised Manuscript received on 17 June 2019 | Manuscript Published on 22 June 2019 | PP: 665-669 | Volume-8 Issue-8S2 June 2019 | Retrieval Number: H11110688S219/19©BEIESP

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (

Abstract: M2M (Machine To Machine) communication works using the information shared between devices, between a server and devices and between servers without a direct human intervention. As M2M communication service uses the information of devices, it is crucial to authenticate if devices involved are authorized ones prior to the completion of communication. Also, given the potential vulnerability of communication data to such security threats as theft, exposure and modification, it is necessary to develop a secure authentication method against security threats [1,2]. This paper proposes a protocol for mutual authentication and key exchange between devices in M2M communication. The proposed method ensures secure authentication using hash functions and two nonces. To verify the security performance of the proposed authentication protocol for M2M devices, Casper/FDR verification tools are used. The formal verification results highlight the proposed authentication protocol for M2M devices ensures secure mutual authentication and key exchange against masquerade, replay attack and man in the middles.

Keywords: Authentication Protocol, M2M Service, Integrated Authentication protocol, Model Checking, Security Policy.
Scope of the Article: Authentication, Authorization, Accounting