检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Chintan Patel Ali Kashif Bashir Ahmad Ali AlZubi Rutvij Jhaveri
机构地区:[1]School of Artificial Intelligence,Information Technology and Cyber Security,Rashtriya Raksha University,Gujarat,India [2]Department of Computing and Mathematics,Manchester Metropolitan University,United Kingdom [3]Woxsen School of Business,Woxsen University,India [4]Department of Computer Science and Mathematics,Lebanese American University,Beirut,Lebanon [5]Computer Science Department,Community College,King Saud University,P.O.Box 28095,Riyadh,11437,Saudi Arabia [6]Department of Computer Science and Engineering,School of Technology,Pandit Deendayal Energy University,Gujarat,India
出 处:《Digital Communications and Networks》2023年第2期358-366,共9页数字通信与网络(英文版)
基 金:supported by the Researchers Supporting Project(No.RSP-2021/395);King Saud University,Riyadh,Saudi Arabia.
摘 要:Industrial IoT(IIoT)aims to enhance services provided by various industries,such as manufacturing and product processing.IIoT suffers from various challenges,and security is one of the key challenge among those challenges.Authentication and access control are two notable challenges for any IIoT based industrial deployment.Any IoT based Industry 4.0 enterprise designs networks between hundreds of tiny devices such as sensors,actuators,fog devices and gateways.Thus,articulating a secure authentication protocol between sensing devices or a sensing device and user devices is an essential step in IoT security.In this paper,first,we present cryptanalysis for the certificate-based scheme proposed for a similar environment by Das et al.and prove that their scheme is vulnerable to various traditional attacks such as device anonymity,MITM,and DoS.We then put forward an interdevice authentication scheme using an ECC(Elliptic Curve Cryptography)that is highly secure and lightweight compared to other existing schemes for a similar environment.Furthermore,we set forth a formal security analysis using the random oracle-based ROR model and informal security analysis over the Doleve-Yao channel.In this paper,we present comparison of the proposed scheme with existing schemes based on communication cost,computation cost and security index to prove that the proposed EBAKE-SE is highly efficient,reliable,and trustworthy compared to other existing schemes for an inter-device authentication.At long last,we present an implementation for the proposed EBAKE-SE using MQTT protocol.
关 键 词:Internet of things AUTHENTICATION Elliptic curve cryptography Secure key exchange Message Queuing telemetry transport
分 类 号:TN91[电子电信—通信与信息系统]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.229