Extending hybrid approach to secure Trivial File Transfer Protocol in M2M communication: a comparative analysis
Nur Nabila Mohamed (),
Yusnani Mohd Yussoff (),
Mohd Anuar Mat Isa () and
Habibah Hashim ()
Additional contact information
Nur Nabila Mohamed: Universiti Teknologi, MARA
Yusnani Mohd Yussoff: Universiti Teknologi, MARA
Mohd Anuar Mat Isa: Universiti Teknologi, MARA
Habibah Hashim: Universiti Teknologi, MARA
Telecommunication Systems: Modelling, Analysis, Design and Management, 2019, vol. 70, issue 4, No 2, 523 pages
Abstract:
Abstract Embedded Machine-to-Machine (M2M) is one of the hottest research topics in recent industrial Internet of Things. In order to serve the communication to effectively transfer data and messages between machines, the system must incorporate a file transfer protocol, known as Trivial File Transfer Protocol (TFTP). However, the main constraint is lack of security mechanism during TFTP Client–Server communication whereby its reliability is questionable as the protocol does not support any authentication or encryption methods, also provide no access control and zero protection from Man-In-The-Middle. Hence, in order to enhance the protocol security, hybrid security approach combining Diffie Hellman Key Exchange (DHKE) scheme and Advanced Encryption Standard symmetric encryption algorithm are proposed to be integrated into TFTP packet header. In this work, we present a performance comparison of three different protocols: the original TFTP protocol, TFTP protocol with single security extension, and our proposed TFTP protocol integrated with hybrid security approach to analyse the effectiveness of the method. The finding demonstrates that our proposed secure TFTP protocol generates comparable execution time as when implementing single encryption option, also more reliable to be used in the commercial system especially for low-cost M2M embedded infrastructure.
Keywords: Machine-to-Machine; Man-In-The-Middle; Trivial File Transfer Protocol; Diffie Hellman Key Exchange; Advanced Encryption Standard (search for similar items in EconPapers)
Date: 2019
References: View references in EconPapers View complete reference list from CitEc
Citations:
Downloads: (external link)
http://link.springer.com/10.1007/s11235-018-0522-5 Abstract (text/html)
Access to the full text of the articles in this series is restricted.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:telsys:v:70:y:2019:i:4:d:10.1007_s11235-018-0522-5
Ordering information: This journal article can be ordered from
http://www.springer.com/journal/11235
DOI: 10.1007/s11235-018-0522-5
Access Statistics for this article
Telecommunication Systems: Modelling, Analysis, Design and Management is currently edited by Muhammad Khan
More articles in Telecommunication Systems: Modelling, Analysis, Design and Management from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().