Journal
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Volume 14, Issue 8, Pages 3599-3609Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2017.2773666
Keywords
Authentication; industrial Internet of Things (IIoT); key agreement; privacy; wireless sensor networks (WSNs)
Categories
Funding
- National Natural Science Foundation of China [61300220, 61572013, 61772194]
- Scientific Research Fund of Hunan Provincial Education Department [16B089]
- University Grants Commission, India through UGC-BSR [3(A)(60)31]
Ask authors/readers for more resources
Wireless sensor networks (WSNs) play an important role in the industrial Internet of Things (IIoT) and have been widely used in many industrial fields to gather data of monitoring area. However, due to the open nature of wireless channel and resource-constrained feature of sensor nodes, how to guarantee that the sensitive sensor data can only be accessed by a valid user becomes a key challenge in IIoT environment. Some user authentication protocols for WSNs have been proposed to address this issue. However, previous works more or less have their own weaknesses, such as not providing user anonymity and other ideal functions or being vulnerable to some attacks. To provide secure communication for IIoT, a user authentication protocol scheme with privacy protection for IIoT has been proposed. The security of the proposed scheme is proved under a random oracle model, and other security discussions show that the proposed protocol is robust to various attacks. Furthermore, the comparison results with other related protocols and the simulation by NS-3 show that the proposed protocol is secure and efficient for IIoT.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available