Dynamic User Authentication Protocol for Industrial IoT without Timestamping


Information saknas

Research Areas

Information saknas

Publication Details

Författarlista: Eldefrawy, Mohamed;Ferrari, Nico;Gidlund, Mikael

Författare: IEEE

Publikationsår: 2019

ISBN: 978-1-7281-1268-8

DOI: http://dx.doi.org/10.1109/WFCS.2019.8757984


Internet of Things (IoT) technology has succeed ingetting a great attention in the industry where it has been ableand still can solve many industrial intractable issues. The emergingtechnology is suffering from severe security shortcomings.Authentication is a cornerstone of IoT security as it presents the measures of checking the legitimacy of communication’s entities.The Industrial IoT (IIoT) technology has special conditions, resulting from a lack of resources and a shortage of security skills. As far as we can tell, from the literature, IIoT user authentication has not been studied extensively. In 2017 Tai et al. presented an authenticated key agreement for IoT networks. Here we prove that Tai et al. is susceptible to sever security weaknesses, such as;i. stolen smart card attack, ii. unknown key share attack, iii. node capturing attack. In this research article, we offer an innovative IIoT user authentication scheme that can achieve secure remote user authentication without timestamping that requires precise synchronization, it only needs Hashing and Xor-ing. We examine the efficiency of our presented scheme using Tmote Sky node over an MSP430 microcontroller using COOJA simulator as well aswe show its correctness using Scyther verification tool.


Information saknas


Information saknas


Information saknas