Dynamic User Authentication Protocol for Industrial IoT without Timestamping


No matching items found.

Research Areas

No matching items found.

Publication Details

Author list: Eldefrawy, Mohamed;Ferrari, Nico;Gidlund, Mikael

Publisher: IEEE

Publication year: 2019

ISBN: 978-1-7281-1268-8

DOI: http://dx.doi.org/10.1109/WFCS.2019.8757984


Internet of Things (IoT) technology has succeed ingetting a great attention in the industry where it has been ableand still can solve many industrial intractable issues. The emergingtechnology is suffering from severe security shortcomings.Authentication is a cornerstone of IoT security as it presents the measures of checking the legitimacy of communication’s entities.The Industrial IoT (IIoT) technology has special conditions, resulting from a lack of resources and a shortage of security skills. As far as we can tell, from the literature, IIoT user authentication has not been studied extensively. In 2017 Tai et al. presented an authenticated key agreement for IoT networks. Here we prove that Tai et al. is susceptible to sever security weaknesses, such as;i. stolen smart card attack, ii. unknown key share attack, iii. node capturing attack. In this research article, we offer an innovative IIoT user authentication scheme that can achieve secure remote user authentication without timestamping that requires precise synchronization, it only needs Hashing and Xor-ing. We examine the efficiency of our presented scheme using Tmote Sky node over an MSP430 microcontroller using COOJA simulator as well aswe show its correctness using Scyther verification tool.


No matching items found.


No matching items found.


No matching items found.