Dynamic User Authentication Protocol for Industrial IoT without Timestamping

被引:3
|
作者
Eldefrawy, Mohamed H. [1 ,2 ]
Ferrari, Nico [1 ]
Gidlund, Mikael [1 ]
机构
[1] Mid Sweden Univ, Dept Informat Syst & Technol, Sundsvall, Sweden
[2] Halmstad Univ, Sch Informat Technol, S-30118 Halmstad, Sweden
关键词
Remote User Authentication; IIoT Security; Formal Scyther Analysis; WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME;
D O I
10.1109/wfcs.2019.8757984
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Internet of Things (IoT) technology has drawn the attention of the industry, where it has been able to, and still can, solve many industrial intractable issues. However, the emerging technology suffers from severe security shortcomings. Authentication is a cornerstone of IoT security, as it presents the measures of checking the legitimacy of communication entities. The Industrial IoT (IIoT) technology has special conditions, resulting from a lack of resources and a shortage of security skills. As far as we can tell, from the literature, IIoT user authentication has not been studied extensively. In 2017 Tai et al. presented an authenticated key agreement for IoT networks. Here we prove that Tai et al. scheme is susceptible to sever security weaknesses, such as; i. unknown key share attacks, ii. node capturing attacks, iii node information secrecy. In this research article, we offer an innovative IIoT user authentication protocol that can achieve secure remote user authentication without timestamping requiring precise synchronization, our protocol only needs Hashing and Xor-ing. We examine the efficiency of the presented protocol using Tmote Sky node over an MSP430 microcontroller using a COOJA simulator. we also show its correctness using the Scyther verification tool.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] Continuous User Authentication using IoT Wearable Sensors
    Smyth, Conor
    Wang, Guoxin
    Panicker, Rajesh
    Nag, Avishek
    Cardiff, Barry
    John, Deepu
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [42] Prototype: User Authentication Scheme for IoT Using NFC
    Alharbi, Muhammad H.
    Alhazmi, Omar H.
    2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 345 - 349
  • [43] Digital Memories Based Mobile User Authentication for IoT
    Shone, Nathan
    Dobbins, Chelsea
    Hurst, William
    Shi, Qi
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1797 - 1803
  • [44] An ECC Based Remote User Authentication Protocol
    Shafiq, Akasha
    Altaf, Izwa
    Mahmood, Khalid
    Kumari, Saru
    Chen, Chien-Ming
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (01): : 285 - 294
  • [45] NAAP: A user-to-network authentication protocol
    Haverinen, H
    SMART NETWORKS, 2002, 84 : 279 - 292
  • [47] Security Analysis of Robust User Authentication Protocol
    Pura, Mihai-Lica
    Patriciu, Victor-Valeriu
    PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 457 - 460
  • [48] Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System
    Srinivas, Jangirala
    Das, Ashok Kumar
    Wazid, Mohammad
    Vasilakos, Athanasios V.
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (09): : 7727 - 7744
  • [49] Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database
    Chatterjee, Urbi
    Govindan, Vidya
    Sadhukhan, Rajat
    Mukhopadhyay, Debdeep
    Chakraborty, Rajat Subhra
    Mahata, Debashis
    Prabhu, Mukesh M.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (03) : 424 - 437
  • [50] Authentication Protocol for an IoT-Enabled LTE Network
    Saxena, Neetesh
    Grijalva, Santiago
    Chaudhari, Narendra S.
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2016, 16 (04)