Improving an Identity Authentication Management Protocol in IIoT

被引:0
|
作者
AlAbdullatif, Asayel [1 ]
AlAjaji, Kholood [1 ]
Al-Serhani, Norah Saad [1 ]
Zagrouba, Rachid [1 ]
AlDossary, Maryam [1 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Cyber Secur & Digital Forens, Coll Comp Sci & Informat Technol, Dammam, Saudi Arabia
关键词
Internet of Things; Industrial IoT; coordinator; sensor; Authentication;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is where almost anything can be controlled and managed remotely. Although the IoT evolution led to quality of life enhancement, many of its devices are insecure. The lack of robust key management systems, efficient identity authentication, low fault tolerance, and many other issues lead IoT devices into being easily targeted by attackers. The aim of this research is to enhance an authentication protocol that helps in the authentication process of IoT devices and CPANs (Personal Area Network Coordinators) in an Industrial Internet of Things (IIoT) environment. To propose a solution for this issue, and to find out the optimal contribution, a comparison and analysis on the current IoT security solutions have been conducted. Based on the analysis, it is found that the superior solution was a Blockchain-based solution called BCTrust. In this paper, the aim is to improve the basis authentication protocol adopted by BCTrust. The protocol is to be improved mainly by two sides, firstly, eliminating the blacklisting mechanism that can be leveraged by attackers to negatively impact the network. Secondly, introducing a new way for generating the identifiers of the IIoT devices. This would enhance the security and efficiency of BCTrust, specifically in the generation of IIoT secret keys.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Simple, secure and lightweight authentication protocol with session-key generation for IIoT device in IIoT networks
    Jain, Usha
    Tripathi, Aprna
    Kumar, Sunil
    Kumar, Gireesh
    MICROSYSTEM TECHNOLOGIES-MICRO-AND NANOSYSTEMS-INFORMATION STORAGE AND PROCESSING SYSTEMS, 2025, 31 (02): : 299 - 311
  • [2] Efficient and Privacy-Preserving Authentication Protocol for Heterogeneous Systems in IIoT
    Xiong, Hu
    Wu, Yan
    Jin, Chuanjie
    Kumari, Saru
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (12): : 11713 - 11724
  • [3] ASAP-IIOT: An Anonymous Secure Authentication Protocol for Industrial Internet of Things
    Li, Na
    Ma, Maode
    Wang, Hui
    SENSORS, 2024, 24 (04)
  • [4] WSNEAP: An Efficient Authentication Protocol for IIoT-Oriented Wireless Sensor Networks
    Yi, Fumin
    Zhang, Lei
    Xu, Lijuan
    Yang, Shumian
    Lu, Yanrong
    Zhao, Dawei
    SENSORS, 2022, 22 (19)
  • [5] A Lightweight Cross-Layer Mutual Authentication With Key Agreement Protocol for IIoT
    Yu, Liying
    Wu, Wen
    Mei, Lin
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (06): : 7051 - 7066
  • [6] A robust and effective 3-factor authentication protocol for smart factory in IIoT
    Zou, Shihong
    Cao, Qiang
    Lu, Ruichao
    Wang, Chenyu
    Xu, Guoai
    Ma, Huanhuan
    Cheng, Yingyi
    Xi, Jinwen
    COMPUTER COMMUNICATIONS, 2024, 220 : 81 - 93
  • [7] IIoT Security Using Industrial Identity Management System
    Alrawashdeh, Khaled
    Abu Al-Haija, Qasem
    IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, NAECON 2024, 2024, : 50 - 55
  • [8] Identity-based authentication protocol for grid
    Li Hongwei
    JournalofSystemsEngineeringandElectronics, 2008, (04) : 860 - 865
  • [9] An Identity Authentication Protocol in Online Social Networks
    Li, Lingjun
    Zhao, Xinxin
    Xue, Guoliang
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [10] Identity-based deniable authentication protocol
    Shi, Y
    Li, J
    ELECTRONICS LETTERS, 2005, 41 (05) : 241 - 242