Other

Dynamic User Authentication Protocol for Industrial IoT without Timestamping

Authors/Editors

Information saknas



Research Areas

Information saknas


Publication Details

Författarlista: Eldefrawy, Mohamed;Ferrari, Nico;Gidlund, Mikael

Författare: IEEE

Publikationsår: 2019

ISBN: 978-1-7281-1268-8

DOI: http://dx.doi.org/10.1109/WFCS.2019.8757984


Sammanfattning

Internet of Things (IoT) technology has succeed ingetting a great attention in the industry where it has been ableand still can solve many industrial intractable issues. The emergingtechnology is suffering from severe security shortcomings.Authentication is a cornerstone of IoT security as it presents the measures of checking the legitimacy of communication’s entities.The Industrial IoT (IIoT) technology has special conditions, resulting from a lack of resources and a shortage of security skills. As far as we can tell, from the literature, IIoT user authentication has not been studied extensively. In 2017 Tai et al. presented an authenticated key agreement for IoT networks. Here we prove that Tai et al. is susceptible to sever security weaknesses, such as;i. stolen smart card attack, ii. unknown key share attack, iii. node capturing attack. In this research article, we offer an innovative IIoT user authentication scheme that can achieve secure remote user authentication without timestamping that requires precise synchronization, it only needs Hashing and Xor-ing. We examine the efficiency of our presented scheme using Tmote Sky node over an MSP430 microcontroller using COOJA simulator as well aswe show its correctness using Scyther verification tool.


Projects

Information saknas


Keywords

Information saknas


Documents

Information saknas