4.8 Article

A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things

Journal

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Volume 14, Issue 8, Pages 3599-3609

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2017.2773666

Keywords

Authentication; industrial Internet of Things (IIoT); key agreement; privacy; wireless sensor networks (WSNs)

Funding

  1. National Natural Science Foundation of China [61300220, 61572013, 61772194]
  2. Scientific Research Fund of Hunan Provincial Education Department [16B089]
  3. University Grants Commission, India through UGC-BSR [3(A)(60)31]

Ask authors/readers for more resources

Wireless sensor networks (WSNs) play an important role in the industrial Internet of Things (IIoT) and have been widely used in many industrial fields to gather data of monitoring area. However, due to the open nature of wireless channel and resource-constrained feature of sensor nodes, how to guarantee that the sensitive sensor data can only be accessed by a valid user becomes a key challenge in IIoT environment. Some user authentication protocols for WSNs have been proposed to address this issue. However, previous works more or less have their own weaknesses, such as not providing user anonymity and other ideal functions or being vulnerable to some attacks. To provide secure communication for IIoT, a user authentication protocol scheme with privacy protection for IIoT has been proposed. The security of the proposed scheme is proved under a random oracle model, and other security discussions show that the proposed protocol is robust to various attacks. Furthermore, the comparison results with other related protocols and the simulation by NS-3 show that the proposed protocol is secure and efficient for IIoT.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available