Dynamic User Authentication Protocol for Industrial IoT without Timestamping

被引:3
|
作者
Eldefrawy, Mohamed H. [1 ,2 ]
Ferrari, Nico [1 ]
Gidlund, Mikael [1 ]
机构
[1] Mid Sweden Univ, Dept Informat Syst & Technol, Sundsvall, Sweden
[2] Halmstad Univ, Sch Informat Technol, S-30118 Halmstad, Sweden
关键词
Remote User Authentication; IIoT Security; Formal Scyther Analysis; WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME;
D O I
10.1109/wfcs.2019.8757984
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Internet of Things (IoT) technology has drawn the attention of the industry, where it has been able to, and still can, solve many industrial intractable issues. However, the emerging technology suffers from severe security shortcomings. Authentication is a cornerstone of IoT security, as it presents the measures of checking the legitimacy of communication entities. The Industrial IoT (IIoT) technology has special conditions, resulting from a lack of resources and a shortage of security skills. As far as we can tell, from the literature, IIoT user authentication has not been studied extensively. In 2017 Tai et al. presented an authenticated key agreement for IoT networks. Here we prove that Tai et al. scheme is susceptible to sever security weaknesses, such as; i. unknown key share attacks, ii. node capturing attacks, iii node information secrecy. In this research article, we offer an innovative IIoT user authentication protocol that can achieve secure remote user authentication without timestamping requiring precise synchronization, our protocol only needs Hashing and Xor-ing. We examine the efficiency of the presented protocol using Tmote Sky node over an MSP430 microcontroller using a COOJA simulator. we also show its correctness using the Scyther verification tool.
引用
下载
收藏
页数:7
相关论文
共 50 条
  • [21] A secure dynamic remote user authentication without any secure channel
    Saxena, Ashutosh
    NEW TECHNOLOGIES, MOBILITY AND SECURITY, 2007, : 617 - 617
  • [22] DYNAMIC PASSWORD BASED REMOTE USER AUTHENTICATION WITHOUT TIME STAMPING
    Eldefrawy, Mohamed Hamdy
    Khan, Muhammad Khurram
    Alghathbar, Khaled
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2013, 9 (01): : 33 - 45
  • [23] A Secure and Lightweight Three-Factor Remote User Authentication Protocol for Future IoT Applications
    Taher, Bahaa Hussein
    Liu, Huiyu
    Abedi, Firas
    Lu, Hongwei
    Yassin, Ali A.
    Mohammed, Alzahraa J.
    JOURNAL OF SENSORS, 2021, 2021
  • [24] A user-centric privacy-preserving authentication protocol for IoT-AmI environments
    Masud, Mehedi
    Gaba, Gurjot Singh
    Kumar, Pardeep
    Gurtov, Andrei
    COMPUTER COMMUNICATIONS, 2022, 196 : 45 - 54
  • [25] User Authentication and Authorization Framework in IoT Protocols
    Mohammad, Ammar
    Al-Refai, Hasan
    Alawneh, Ali Ahmad
    COMPUTERS, 2022, 11 (10)
  • [26] Security weaknesses of dynamic ID-based remote user authentication protocol
    Lee, Hyoungseob
    Choi, Donghyun
    Lee, Yunho
    Won, Dongho
    Kim, Seungjoo
    World Academy of Science, Engineering and Technology, 2009, 35 : 190 - 193
  • [27] Security weaknesses of dynamic ID-based remote user authentication protocol
    Lee, Hyoungseob
    Choi, Donghyun
    Lee, Yunho
    Won, Dongho
    Kim, Seungjoo
    World Academy of Science, Engineering and Technology, 2009, 59 : 190 - 193
  • [28] A User Anonymous Mutual Authentication Protocol
    Kumari, Saru
    Li, Xiong
    Wu, Fan
    Das, Ashok Kumar
    Odelu, Vanga
    Khan, Muhammad Khurram
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (09): : 4508 - 4528
  • [29] A strong user authentication protocol for GSM
    Aydemir, Ö
    Selçuk, AA
    Fourteenth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Proceedings, 2005, : 150 - 153
  • [30] A Dynamic Identity End-to-End Authentication Key Exchange Protocol for IoT Environments
    Hsu, Chien-Lung
    Chuang, Tzu-Hsien
    Chen, Yu-Han
    Lin, Tzu-Wei
    Lu, Huang-Chia
    2017 TWELFTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT (ICDIM), 2017, : 133 - 138