miun.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Dynamic User Authentication Protocol for Industrial IoT without Timestamping
Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology. Halmstad Högskola.
Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology.
Mid Sweden University, Faculty of Science, Technology and Media, Department of Information Systems and Technology. (Communication Networks and Systems (CSN))ORCID iD: 0000-0003-0873-7827
2019 (English)In: 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS), IEEE, 2019Conference paper, Published paper (Refereed)
Abstract [en]

Internet of Things (IoT) technology has succeed ingetting a great attention in the industry where it has been ableand still can solve many industrial intractable issues. The emergingtechnology is suffering from severe security shortcomings.Authentication is a cornerstone of IoT security as it presents the measures of checking the legitimacy of communication’s entities.The Industrial IoT (IIoT) technology has special conditions, resulting from a lack of resources and a shortage of security skills. As far as we can tell, from the literature, IIoT user authentication has not been studied extensively. In 2017 Tai et al. presented an authenticated key agreement for IoT networks. Here we prove that Tai et al. is susceptible to sever security weaknesses, such as;i. stolen smart card attack, ii. unknown key share attack, iii. node capturing attack. In this research article, we offer an innovative IIoT user authentication scheme that can achieve secure remote user authentication without timestamping that requires precise synchronization, it only needs Hashing and Xor-ing. We examine the efficiency of our presented scheme using Tmote Sky node over an MSP430 microcontroller using COOJA simulator as well aswe show its correctness using Scyther verification tool.

Place, publisher, year, edition, pages
IEEE, 2019.
Keywords [en]
Industrial IoT, Security, Authentication, Timestamp
National Category
Communication Systems Computer Engineering
Identifiers
URN: urn:nbn:se:miun:diva-36732DOI: 10.1109/WFCS.2019.8757984ISBN: 978-1-7281-1268-8 (electronic)OAI: oai:DiVA.org:miun-36732DiVA, id: diva2:1337530
Conference
15th IEEE International Workshop on Factory Communication Systems (WFCS´19), Sundsvall, Sweden, May 27-29, 2019.
Projects
SMART
Funder
European Regional Development Fund (ERDF)Available from: 2019-07-15 Created: 2019-07-15 Last updated: 2019-08-13Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full text

Authority records BETA

Eldefrawy, MohamedFerrari, NicoGidlund, Mikael

Search in DiVA

By author/editor
Eldefrawy, MohamedFerrari, NicoGidlund, Mikael
By organisation
Department of Information Systems and Technology
Communication SystemsComputer Engineering

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 21 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf