Improving an Identity Authentication Management Protocol in IIoT

被引:0
|
作者
AlAbdullatif, Asayel [1 ]
AlAjaji, Kholood [1 ]
Al-Serhani, Norah Saad [1 ]
Zagrouba, Rachid [1 ]
AlDossary, Maryam [1 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Cyber Secur & Digital Forens, Coll Comp Sci & Informat Technol, Dammam, Saudi Arabia
关键词
Internet of Things; Industrial IoT; coordinator; sensor; Authentication;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is where almost anything can be controlled and managed remotely. Although the IoT evolution led to quality of life enhancement, many of its devices are insecure. The lack of robust key management systems, efficient identity authentication, low fault tolerance, and many other issues lead IoT devices into being easily targeted by attackers. The aim of this research is to enhance an authentication protocol that helps in the authentication process of IoT devices and CPANs (Personal Area Network Coordinators) in an Industrial Internet of Things (IIoT) environment. To propose a solution for this issue, and to find out the optimal contribution, a comparison and analysis on the current IoT security solutions have been conducted. Based on the analysis, it is found that the superior solution was a Blockchain-based solution called BCTrust. In this paper, the aim is to improve the basis authentication protocol adopted by BCTrust. The protocol is to be improved mainly by two sides, firstly, eliminating the blacklisting mechanism that can be leveraged by attackers to negatively impact the network. Secondly, introducing a new way for generating the identifiers of the IIoT devices. This would enhance the security and efficiency of BCTrust, specifically in the generation of IIoT secret keys.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Identity Authentication Protocol With Message Recovery in Microgrid SCADA System
    Zuo L.
    Zhang M.
    Ding S.
    Chen Y.
    Dianwang Jishu/Power System Technology, 2019, 43 (12): : 4299 - 4305
  • [42] Quantum Identity Authentication in the Counterfactual Quantum Key Distribution Protocol
    Liu, Bin
    Gao, Zhifeng
    Xiao, Di
    Huang, Wei
    Zhang, Zhiqing
    Xu, Bingjie
    ENTROPY, 2019, 21 (05)
  • [43] An Identity-Based Authentication Protocol for Clustered ZigBee Network
    Chen, Wei
    Zhang, Xiaoshuan
    Tian, Dong
    Fu, Zetian
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF ARTIFICIAL INTELLIGENCE, 2010, 6216 : 503 - 510
  • [44] Cryptanalysis on an Enhanced Identity-based Deniable Authentication Protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Lee, Hoonjae
    2008 6TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3, 2008, : 549 - +
  • [45] Identity-Based Edge Computing Anonymous Authentication Protocol
    Kang, Naixin
    Ning, Zhenhu
    Zhang, Shiqiang
    Rehman, Sadaqat Ur
    Waqas
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (02): : 3931 - 3943
  • [46] A Secure Identity-based Deniable Authentication Protocol for MANETs
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019), 2019, : 91 - 95
  • [47] Research on Hadoop Identity Authentication Based on Improved Kerberos Protocol
    Hu, Daming
    Chen, Deyun
    Zhang, Yuanxu
    Pei, Shujun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (11): : 429 - 438
  • [48] AN AUTHENTICATION AND SESSION KEY AGREEMENT PROTOCOL BASED ON IDENTITY SIGNATURE
    Li, Ning
    Yeap, Tet
    Yu, Chongxiu
    CIICT 2008: PROCEEDINGS OF CHINA-IRELAND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGIES 2008, 2008, : 311 - +
  • [49] Identity-based Authentication protocol with Paring of Tate on WSN
    Wang Wei-hong
    Cu Yi-ling
    Chen Tie-ming
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4599 - 4602
  • [50] Identity-based deniable authentication protocol from pairings
    Liao, I-En
    Lee, Cheng-Chi
    Shiang, Wufeng
    Hwang, Min-Shiang
    PROCEEDINGS OF THE 10TH IASTED INTERNATIONAL CONFERENCE ON INTERNET AND MULTIMEDIA SYSTEMS AND APPLICATIONS, 2006, : 112 - +