Improving an Identity Authentication Management Protocol in IIoT

被引:0
|
作者
AlAbdullatif, Asayel [1 ]
AlAjaji, Kholood [1 ]
Al-Serhani, Norah Saad [1 ]
Zagrouba, Rachid [1 ]
AlDossary, Maryam [1 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Cyber Secur & Digital Forens, Coll Comp Sci & Informat Technol, Dammam, Saudi Arabia
关键词
Internet of Things; Industrial IoT; coordinator; sensor; Authentication;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is where almost anything can be controlled and managed remotely. Although the IoT evolution led to quality of life enhancement, many of its devices are insecure. The lack of robust key management systems, efficient identity authentication, low fault tolerance, and many other issues lead IoT devices into being easily targeted by attackers. The aim of this research is to enhance an authentication protocol that helps in the authentication process of IoT devices and CPANs (Personal Area Network Coordinators) in an Industrial Internet of Things (IIoT) environment. To propose a solution for this issue, and to find out the optimal contribution, a comparison and analysis on the current IoT security solutions have been conducted. Based on the analysis, it is found that the superior solution was a Blockchain-based solution called BCTrust. In this paper, the aim is to improve the basis authentication protocol adopted by BCTrust. The protocol is to be improved mainly by two sides, firstly, eliminating the blacklisting mechanism that can be leveraged by attackers to negatively impact the network. Secondly, introducing a new way for generating the identifiers of the IIoT devices. This would enhance the security and efficiency of BCTrust, specifically in the generation of IIoT secret keys.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Efficient identity authentication protocol and its formal analysis
    Chen, Li
    Zhang, Guixiang
    Li, Xiangdong
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 712 - +
  • [32] A semi-quantum authentication protocol for message and identity
    Wen, Xiao-Jun
    Zhao, Xing-Qiang
    Gong, Li-Hua
    Zhou, Nan-Run
    LASER PHYSICS LETTERS, 2019, 16 (07)
  • [33] Improving Identity and Authentication Assurance in Research & Education Federations
    Ziegler, Jule Anna
    Schmidt, Michael
    Linden, Mikael
    SECURITY AND TRUST MANAGEMENT, STM 2019, 2019, 11738 : 1 - 18
  • [34] Assessing and improving authentication confidence management
    Pearce M.
    Zeadally S.
    Hunt R.
    Information Management and Computer Security, 2010, 18 (02): : 124 - 139
  • [35] Improving the Authentication Scheme and Access Control Protocol for VANETs
    Wu, Wei-Chen
    Chen, Yi-Ming
    ENTROPY, 2014, 16 (11) : 6152 - 6165
  • [36] Reverse Authentication in Financial Transactions and Identity Management
    Bangdao Chen
    Long Hoang Nguyen
    A. W. Roscoe
    Mobile Networks and Applications, 2013, 18 : 712 - 727
  • [37] Reverse Authentication in Financial Transactions and Identity Management
    Chen, Bangdao
    Long Hoang Nguyen
    Roscoe, A. W.
    MOBILE NETWORKS & APPLICATIONS, 2013, 18 (05): : 712 - 727
  • [38] Blockchain-based identity and authentication scheme for MQTT protocol
    Abubakar, Mwrwan Abdelrazig
    Jaroucheh, Zakwan
    Al-Dubai, Ahmed
    Liu, Xiaodong
    2021 THE 3RD INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY, ICBCT 2021, 2021, : 73 - 81
  • [39] Anonymous chaotic-based identity authentication protocol in IoT
    Long, Jing
    Su, Xin
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2021, 14 (02) : 194 - 200
  • [40] An Anonymous and Certificateless Identity Authentication Protocol for Mobile Edge Computing
    Ma, Yuqian
    Cheng, Qingfeng
    IEEE SYSTEMS JOURNAL, 2023, 17 (04): : 5604 - 5615