hh.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Dynamic User Authentication Protocol for Industrial IoT without Timestamping
Department of Information Systems and Technology, Mid Sweden University, Sundsvall, Sweden.ORCID iD: 0000-0001-6408-5152
Department of Information Systems and Technology, Mid Sweden University, Sundsvall, Sweden.
Department of Information Systems and Technology, Mid Sweden University, Sundsvall, Sweden.
2019 (English)In: 2019 15TH IEEE INTERNATIONAL WORKSHOP ON FACTORY COMMUNICATION SYSTEMS (WFCS), Institute of Electrical and Electronics Engineers (IEEE), 2019Conference paper, Published paper (Refereed)
Abstract [en]

Internet of Things (IoT) technology has drawn the attention of the industry, where it has been able to, and still can, solve many industrial intractable issues. However, the emerging technology suffers from severe security shortcomings. Authentication is a cornerstone of IoT security, as it presents the measures of checking the legitimacy of communication entities. The Industrial IoT (IIoT) technology has special conditions, resulting from a lack of resources and a shortage of security skills. As far as we can tell, from the literature, IIoT user authentication has not been studied extensively. In 2017 Tai et al. presented an authenticated key agreement for IoT networks. Here we prove that Tai et al. scheme is susceptible to sever security weaknesses, such as; i. unknown key share attacks, ii. node capturing attacks, iii node information secrecy. In this research article, we offer an innovative IIoT user authentication protocol that can achieve secure remote user authentication without timestamping requiring precise synchronization, our protocol only needs Hashing and Xor-ing. We examine the efficiency of the presented protocol using Tmote Sky node over an MSP430 microcontroller using a COOJA simulator. we also show its correctness using the Scyther verification tool.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2019.
Keywords [en]
Remote User Authentication, IIoT Security, Formal Scyther Analysis
National Category
Communication Systems
Identifiers
URN: urn:nbn:se:hh:diva-41465DOI: 10.1109/WFCS.2019.8757984ISI: 000490866300013Scopus ID: 2-s2.0-85070082936ISBN: 978-1-7281-1268-8 (electronic)ISBN: 978-1-7281-1269-5 (print)OAI: oai:DiVA.org:hh-41465DiVA, id: diva2:1390199
Conference
15th IEEE International Workshop on Factory Communication Systems (WFCS 2019), Sundsvall, Sweden, May 27-29, 2019
Available from: 2020-01-31 Created: 2020-01-31 Last updated: 2021-05-11Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Eldefrawy, Mohamed Hamdy

Search in DiVA

By author/editor
Eldefrawy, Mohamed Hamdy
Communication Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 52 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf