Improving an Identity Authentication Management Protocol in IIoT

被引:0
|
作者
AlAbdullatif, Asayel [1 ]
AlAjaji, Kholood [1 ]
Al-Serhani, Norah Saad [1 ]
Zagrouba, Rachid [1 ]
AlDossary, Maryam [1 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Cyber Secur & Digital Forens, Coll Comp Sci & Informat Technol, Dammam, Saudi Arabia
关键词
Internet of Things; Industrial IoT; coordinator; sensor; Authentication;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is where almost anything can be controlled and managed remotely. Although the IoT evolution led to quality of life enhancement, many of its devices are insecure. The lack of robust key management systems, efficient identity authentication, low fault tolerance, and many other issues lead IoT devices into being easily targeted by attackers. The aim of this research is to enhance an authentication protocol that helps in the authentication process of IoT devices and CPANs (Personal Area Network Coordinators) in an Industrial Internet of Things (IIoT) environment. To propose a solution for this issue, and to find out the optimal contribution, a comparison and analysis on the current IoT security solutions have been conducted. Based on the analysis, it is found that the superior solution was a Blockchain-based solution called BCTrust. In this paper, the aim is to improve the basis authentication protocol adopted by BCTrust. The protocol is to be improved mainly by two sides, firstly, eliminating the blacklisting mechanism that can be leveraged by attackers to negatively impact the network. Secondly, introducing a new way for generating the identifiers of the IIoT devices. This would enhance the security and efficiency of BCTrust, specifically in the generation of IIoT secret keys.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Improving Bio-Cryptography Authentication Protocol
    Fadil, Irfan
    Barmawi, Ari Moesriami
    2015 9TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS SERVICES AND APPLICATIONS (TSSA), 2015,
  • [22] BLMA: Editable Blockchain-Based Lightweight Massive IIoT Device Authentication Protocol
    Li, Fengqi
    Xu, Hui
    Song, Qingqing
    Zhang, Lupeng
    Du, Xuefeng
    Tong, Ning
    Wang, Deguang
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (24) : 21633 - 21646
  • [23] An identity authentication protocol for acknowledgment in IEEE 802.15.4 network
    Heo, J
    Hong, CS
    NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2005, 3779 : 355 - 358
  • [24] Design and Security Analysis of Mobile Identity Authentication Protocol
    Wang Qin
    Zhi Fenhe
    Ao Jinghai
    MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 2645 - 2649
  • [25] An Identity-Based Authentication Protocol for Sensor Networks
    Yang, Mee Loong
    Al-Anbuky, Adnan
    Liu, William
    2014 IEEE NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING (IEEE ISSNIP 2014), 2014,
  • [26] An efficient RFID authentication protocol using dynamic identity
    Chiou, Shin-Yan
    International Journal of Network Security, 2019, 21 (05): : 728 - 734
  • [27] An Identity-based Restricted Deniable Authentication Protocol
    Fan, Chengyu
    Zhou, Shijie
    Li, Fagen
    2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 474 - 478
  • [28] Identity (ID)-based authentication and the key agreement protocol
    School of Electronics and Information Engineering, Beijing Jiaotong Univ., Beijing 100044, China
    不详
    不详
    Xi'an Dianzi Keji Daxue Xuebao, 2008, 3 (559-562):
  • [29] Identity based authentication protocol for wireless sensor networks
    Salinas Rosales, Moises
    Duchen Sanchez, Gonzalo
    REVISTA FACULTAD DE INGENIERIA-UNIVERSIDAD DE ANTIOQUIA, 2010, (52): : 196 - 205
  • [30] Identity-based authentication protocol in manufacturing grid
    Shu, Jian
    Xu, Chun-Xiang
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2009, 15 (04): : 797 - 802