Dynamic User Authentication Protocol for Industrial IoT without Timestamping

被引:3
|
作者
Eldefrawy, Mohamed H. [1 ,2 ]
Ferrari, Nico [1 ]
Gidlund, Mikael [1 ]
机构
[1] Mid Sweden Univ, Dept Informat Syst & Technol, Sundsvall, Sweden
[2] Halmstad Univ, Sch Informat Technol, S-30118 Halmstad, Sweden
关键词
Remote User Authentication; IIoT Security; Formal Scyther Analysis; WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME;
D O I
10.1109/wfcs.2019.8757984
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Internet of Things (IoT) technology has drawn the attention of the industry, where it has been able to, and still can, solve many industrial intractable issues. However, the emerging technology suffers from severe security shortcomings. Authentication is a cornerstone of IoT security, as it presents the measures of checking the legitimacy of communication entities. The Industrial IoT (IIoT) technology has special conditions, resulting from a lack of resources and a shortage of security skills. As far as we can tell, from the literature, IIoT user authentication has not been studied extensively. In 2017 Tai et al. presented an authenticated key agreement for IoT networks. Here we prove that Tai et al. scheme is susceptible to sever security weaknesses, such as; i. unknown key share attacks, ii. node capturing attacks, iii node information secrecy. In this research article, we offer an innovative IIoT user authentication protocol that can achieve secure remote user authentication without timestamping requiring precise synchronization, our protocol only needs Hashing and Xor-ing. We examine the efficiency of the presented protocol using Tmote Sky node over an MSP430 microcontroller using a COOJA simulator. we also show its correctness using the Scyther verification tool.
引用
下载
收藏
页数:7
相关论文
共 50 条
  • [1] An Improved User Authentication Protocol for IoT
    Cui, Jianming
    Zhang, Zuowen
    Li, Hengzhong
    Sui, Rongquan
    2018 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC 2018), 2018, : 59 - 62
  • [2] A Robust Anonymous Remote User Authentication Protocol for IoT Services
    Ghahramani, Meysam
    Javidan, Reza
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 121 (03) : 2347 - 2369
  • [3] A Robust Anonymous Remote User Authentication Protocol for IoT Services
    Meysam Ghahramani
    Reza Javidan
    Wireless Personal Communications, 2021, 121 : 2347 - 2369
  • [4] A Secure, Lightweight, and Anonymous User Authentication Protocol for IoT Environments
    Son, Seunghwan
    Park, Yohan
    Park, Youngho
    SUSTAINABILITY, 2021, 13 (16)
  • [5] A Lightweight and Robust User Authentication Protocol with User Anonymity for IoT-Based Healthcare
    Chen, Chien-Ming
    Liu, Shuangshuang
    Chaudhry, Shehzad Ashraf
    Chen, Yeh-Cheng
    Khan, Muhammad Asghar
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2022, 131 (01): : 307 - 329
  • [6] MagSign: Harnessing Dynamic Magnetism for User Authentication on IoT Devices
    Cao, Hangcheng
    Liu, Daibo
    Jiang, Hongbo
    Luo, Jun
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (01) : 597 - 611
  • [7] ATT-Auth: A Hybrid Protocol for Industrial IoT Attestation With Authentication
    Aman, Muhammad Naveed
    Sikdar, Biplab
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (06): : 5119 - 5131
  • [8] Honey-list based authentication protocol for industrial IoT swarms
    El-Zawawy, Mohamed A.
    Kaliyar, Pallavi
    Conti, Mauro
    Katsikas, Sokratis
    COMPUTER COMMUNICATIONS, 2023, 211 : 239 - 253
  • [9] A Lightweight Symmetric Cryptography based User Authentication Protocol for IoT based Applications
    Reddy, Alumuru Mahesh
    Rao, M. Kameswara
    PRZEGLAD ELEKTROTECHNICZNY, 2024, 100 (01): : 172 - 176
  • [10] A LIGHTWEIGHT SYMMETRIC CRYPTOGRAPHY BASED USER AUTHENTICATION PROTOCOL FOR IOT BASED APPLICATIONS
    Reddy, A. mahesh
    Gudivada, Durvasi
    Rao, M. kameswara
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (03): : 1647 - 1657