4.6 Article

WSNEAP: An Efficient Authentication Protocol for IIoT-Oriented Wireless Sensor Networks

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Edge-Assisted Intelligent Device Authentication in Cyber-Physical Systems

Yanrong Lu et al.

Summary: Cyber-physical system (CPS) combined with artificial intelligence (AI) is used to extract information from the large volumes of data in the Industrial Internet of Things (IIoT). However, the traditional host-centric communication model of the current Internet faces challenges due to the increasing data traffic and number of IIoT devices. To address this, we propose an information-centric networking (ICN)-based system model that processes data closer to the edge in CPS. We also propose an edge-assisted authentication scheme in CPS to protect against unauthorized access and reduce workload for resource-constrained devices.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Automation & Control Systems

An Improved Lightweight Two-Factor Authentication Protocol for IoT Applications

Amir Masoud Aminian Modarres et al.

Summary: The Internet of Things (IoT) is a network of connected objects or devices that gather information and exchange it through communication systems. Protecting sensitive data against security threats is crucial in IoT applications, and using multifactor authentication protocols is an efficient solution. This article analyzes a two-factor authentication protocol proposed by Aman et al., discusses its weaknesses, and proposes an improved protocol to provide stronger mutual authentication and overcome the mentioned issues.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Computer Science, Hardware & Architecture

PUF-Based Mutual Authentication and Key Exchange Protocol for Peer-to-Peer IoT Applications

Yue Zheng et al.

Summary: A lightweight PUF-based mutual authentication and key exchange protocol is proposed to address the incompatibility issue with existing PUF-enabled authentication protocols in P2P IoT scenarios. The protocol allows two resource-constrained PUF embedded endpoint devices to authenticate each other directly and establish a session key for secure data exchange without the need for local storage of challenge-response pairs (CRPs) or any private secrets. The proposed protocol is evaluated using game-based security analysis and the ProVerif security analysis tool, confirming its mutual authenticity, secrecy, and resistance against replay and man-in-the-middle (MITM) attacks. A physical prototype system is also constructed to demonstrate and validate the feasibility of the proposed secure P2P connection scheme using Avnet Ultra96-V2 boards. Comparative analysis shows that the proposed protocol outperforms related protocols in terms of security features, computational complexity, communication, and storage costs.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Computer Science, Interdisciplinary Applications

End-to-end industrial IoT platform for Quality 4.0 applications

Ioannis T. Christou et al.

Summary: This paper presents an end-to-end platform that addresses challenges in smart manufacturing, such as integrating data sources, applying machine learning techniques, and implementing configurable digital twins. The platform has been successfully deployed and positively evaluated in various industrial settings.

COMPUTERS IN INDUSTRY (2022)

Article Computer Science, Information Systems

Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks

Weizheng Wang et al.

Summary: This article introduces a lightweight and reliable authentication protocol for WMSN, based on blockchain technology and physically unclonable functions (PUFs). A fuzzy extractor scheme is used to handle biometric information, and two security evaluation methods are employed to prove the high reliability of the proposed scheme. Performance evaluation experiments demonstrate that the proposed mutual authentication protocol has the least computation and communication cost among the compared schemes.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

REAP-IIoT: Resource-Efficient Authentication Protocol for the Industrial Internet of Things

Muhammad Tanveer et al.

Summary: This article proposes a resource-efficient authentication protocol called REAP-IIoT for the Industrial Internet of Things (IIoT) environment, which utilizes lightweight cryptography (LWC) and hash function to address security and privacy concerns.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Automation & Control Systems

An Efficient and Provably Secure Certificateless Protocol for Industrial Internet of Things

Farva Rafique et al.

Summary: This article introduces a secure multifactor authenticated key agreement scheme for data transmission in the IoT environment. The scheme is resource-efficient and secure, using simple cryptographic operations like XOR and hashing to provide security for legitimate entities.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Information Systems

A Robust Authentication Protocol for Wireless Medical Sensor Networks Using Blockchain and Physically Unclonable Functions

Sungjin Yu et al.

Summary: Wireless medical sensor networks (WMSNs) are a promising paradigm in the Internet of Medical Things (IoMT), enabling patients and doctors to access healthcare services wirelessly. However, the security of sensitive information exchanged over insecure channels is a concern. This paper proposes a robust and lightweight authentication protocol using blockchain and physically unclonable functions (PUFs) for WMSNs to address security vulnerabilities in existing schemes.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Biology

Precision health data: Requirements, challenges and existing techniques for data security and privacy

Chandra Thapa et al.

Summary: Precision health utilizes various information sources to enable personalized care and disease prevention, but requires strict protection of privacy and security to establish public trust and participation in health data.

COMPUTERS IN BIOLOGY AND MEDICINE (2021)

Article Engineering, Electrical & Electronic

HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks

Tejasvi Alladi et al.

Summary: This paper introduces a two-way two-stage authentication protocol using Physical Unclonable Functions (PUFs) to address the physical security challenges of healthcare IoT devices. The protocol is lightweight and formally evaluated for security, compared to relevant protocols to show its suitability and robustness.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2021)

Article Computer Science, Information Systems

A Novel Three-Factor Authentication Protocol for Wireless Sensor Networks With IoT Notion

Fan Wu et al.

Summary: The study introduces a new three-factor authentication scheme for providing session keys to wireless sensor networks. Formal and informal verification demonstrate that the scheme has good security and practicality. Simulation results show that the scheme can operate normally in IoT environments with promising practical applications.

IEEE SYSTEMS JOURNAL (2021)

Article Computer Science, Information Systems

Data Access Control Based on Blockchain in Medical Cyber Physical Systems

Fulong Chen et al.

Summary: Effective data access control in medical cyber physical systems is crucial for modern medical functions, with blockchain technology playing a key role in ensuring secure and efficient access control mechanisms. Hyperledger Fabric network is utilized for managing access control rights distribution, enabling case-based medical data access control under the blockchain.

SECURITY AND COMMUNICATION NETWORKS (2021)

Article Chemistry, Analytical

WSN-SLAP: Secure and Lightweight Mutual Authentication Protocol for Wireless Sensor Networks

Deok Kyu Kwon et al.

Summary: The importance of secure authentication in WSN was discussed, with the introduction of Moghadam et al.'s protocol and its identified vulnerabilities, and the proposal of WSN-SLAP as an alternative solution to address these issues.

SENSORS (2021)

Article Computer Science, Information Systems

Secure and efficient mutual authentication protocol for smart grid under blockchain

Weizheng Wang et al.

Summary: Smart grid is recognized as the next-generation intelligent network that optimizes energy efficiency through bidirectional communication. However, security issues arise with its widespread deployment, especially regarding identity authentication. In this study, an authentication protocol combining blockchain, ECC, dynamic Join-and-Exit mechanism, and batch verification is proposed to address these issues, with assured security through computational hard problem assumptions.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2021)

Review Computer Science, Information Systems

Blockchain for the IoT and industrial IoT: A review

Qin Wang et al.

INTERNET OF THINGS (2020)

Article Computer Science, Information Systems

A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment

Alireza Esfahani et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Robust Privacy-Preserving Mutual Authenticated Key Agreement Scheme in Roaming Service for Global Mobility Networks

Yanrong Lu et al.

IEEE SYSTEMS JOURNAL (2019)

Article Engineering, Electrical & Electronic

Industrial Communication Systems and Their Future Challenges: Next-Generation Ethernet, IIoT, and 5G

Stefano Vitturi et al.

PROCEEDINGS OF THE IEEE (2019)

Article Computer Science, Information Systems

A Secure Authentication Protocol for Internet of Vehicles

Chien-Ming Chen et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Optimizing Bloom Filter: Challenges, Solutions, and Comparisons

Lailong Luo et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Review Computer Science, Theory & Methods

Internet of Things is a revolutionary approach for future technology enhancement: a review

Sachin Kumar et al.

JOURNAL OF BIG DATA (2019)

Article Automation & Control Systems

A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things

Xiong Li et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Automation & Control Systems

Real-Time Rejection and Mitigation of Time Synchronization Attacks on the Global Positioning System

Ali Khalajmehrabadi et al.

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2018)

Article Computer Science, Information Systems

A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things

Xiong Li et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Interdisciplinary Applications

Industrial IoT in 5G environment towards smart manufacturing

Jiangfeng Cheng et al.

JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION (2018)

Review Computer Science, Interdisciplinary Applications

5G Internet of Things: A survey

Shancang Li et al.

JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION (2018)

Proceedings Paper Computer Science, Theory & Methods

Differential Fault Intensity Analysis

Nahid Farhady Ghalaty et al.

2014 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2014) (2014)