About this Journal Submit a Manuscript Table of Contents
International Journal of Distributed Sensor Networks
Volume 2013 (2013), Article ID 679450, 9 pages
http://dx.doi.org/10.1155/2013/679450
Research Article

How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack

1School of Computer Science, China University of Geosciences, Wuhan 430074, China
2Shandong Provincial Key Laboratory of Computer Network, Jinan 250014, China
3School of Electronic Engineering, Naval University of Engineering, Wuhan 430033, China
4Department of Computer Science, National Chiao Tung University, Hsinchu 30010, Taiwan

Received 22 August 2012; Revised 27 November 2012; Accepted 29 November 2012

Academic Editor: Liguo Zhang

Copyright © 2013 Wei Ren et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

How to Cite this Article

Wei Ren, Linchen Yu, Liangli Ma, and Yi Ren, “How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 679450, 9 pages, 2013. doi:10.1155/2013/679450