相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article
Computer Science, Information Systems
Yanrong Lu et al.
Summary: Cyber-physical system (CPS) combined with artificial intelligence (AI) is used to extract information from the large volumes of data in the Industrial Internet of Things (IIoT). However, the traditional host-centric communication model of the current Internet faces challenges due to the increasing data traffic and number of IIoT devices. To address this, we propose an information-centric networking (ICN)-based system model that processes data closer to the edge in CPS. We also propose an edge-assisted authentication scheme in CPS to protect against unauthorized access and reduce workload for resource-constrained devices.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Automation & Control Systems
Amir Masoud Aminian Modarres et al.
Summary: The Internet of Things (IoT) is a network of connected objects or devices that gather information and exchange it through communication systems. Protecting sensitive data against security threats is crucial in IoT applications, and using multifactor authentication protocols is an efficient solution. This article analyzes a two-factor authentication protocol proposed by Aman et al., discusses its weaknesses, and proposes an improved protocol to provide stronger mutual authentication and overcome the mentioned issues.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2023)
Article
Computer Science, Hardware & Architecture
Yue Zheng et al.
Summary: A lightweight PUF-based mutual authentication and key exchange protocol is proposed to address the incompatibility issue with existing PUF-enabled authentication protocols in P2P IoT scenarios. The protocol allows two resource-constrained PUF embedded endpoint devices to authenticate each other directly and establish a session key for secure data exchange without the need for local storage of challenge-response pairs (CRPs) or any private secrets. The proposed protocol is evaluated using game-based security analysis and the ProVerif security analysis tool, confirming its mutual authenticity, secrecy, and resistance against replay and man-in-the-middle (MITM) attacks. A physical prototype system is also constructed to demonstrate and validate the feasibility of the proposed secure P2P connection scheme using Avnet Ultra96-V2 boards. Comparative analysis shows that the proposed protocol outperforms related protocols in terms of security features, computational complexity, communication, and storage costs.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2023)
Article
Computer Science, Interdisciplinary Applications
Ioannis T. Christou et al.
Summary: This paper presents an end-to-end platform that addresses challenges in smart manufacturing, such as integrating data sources, applying machine learning techniques, and implementing configurable digital twins. The platform has been successfully deployed and positively evaluated in various industrial settings.
COMPUTERS IN INDUSTRY
(2022)
Article
Computer Science, Information Systems
Weizheng Wang et al.
Summary: This article introduces a lightweight and reliable authentication protocol for WMSN, based on blockchain technology and physically unclonable functions (PUFs). A fuzzy extractor scheme is used to handle biometric information, and two security evaluation methods are employed to prove the high reliability of the proposed scheme. Performance evaluation experiments demonstrate that the proposed mutual authentication protocol has the least computation and communication cost among the compared schemes.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Muhammad Tanveer et al.
Summary: This article proposes a resource-efficient authentication protocol called REAP-IIoT for the Industrial Internet of Things (IIoT) environment, which utilizes lightweight cryptography (LWC) and hash function to address security and privacy concerns.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Automation & Control Systems
Farva Rafique et al.
Summary: This article introduces a secure multifactor authenticated key agreement scheme for data transmission in the IoT environment. The scheme is resource-efficient and secure, using simple cryptographic operations like XOR and hashing to provide security for legitimate entities.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Article
Computer Science, Information Systems
Sungjin Yu et al.
Summary: Wireless medical sensor networks (WMSNs) are a promising paradigm in the Internet of Medical Things (IoMT), enabling patients and doctors to access healthcare services wirelessly. However, the security of sensitive information exchanged over insecure channels is a concern. This paper proposes a robust and lightweight authentication protocol using blockchain and physically unclonable functions (PUFs) for WMSNs to address security vulnerabilities in existing schemes.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Biology
Chandra Thapa et al.
Summary: Precision health utilizes various information sources to enable personalized care and disease prevention, but requires strict protection of privacy and security to establish public trust and participation in health data.
COMPUTERS IN BIOLOGY AND MEDICINE
(2021)
Article
Engineering, Electrical & Electronic
Tejasvi Alladi et al.
Summary: This paper introduces a two-way two-stage authentication protocol using Physical Unclonable Functions (PUFs) to address the physical security challenges of healthcare IoT devices. The protocol is lightweight and formally evaluated for security, compared to relevant protocols to show its suitability and robustness.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
(2021)
Article
Computer Science, Information Systems
Fan Wu et al.
Summary: The study introduces a new three-factor authentication scheme for providing session keys to wireless sensor networks. Formal and informal verification demonstrate that the scheme has good security and practicality. Simulation results show that the scheme can operate normally in IoT environments with promising practical applications.
IEEE SYSTEMS JOURNAL
(2021)
Article
Computer Science, Information Systems
Fulong Chen et al.
Summary: Effective data access control in medical cyber physical systems is crucial for modern medical functions, with blockchain technology playing a key role in ensuring secure and efficient access control mechanisms. Hyperledger Fabric network is utilized for managing access control rights distribution, enabling case-based medical data access control under the blockchain.
SECURITY AND COMMUNICATION NETWORKS
(2021)
Article
Chemistry, Analytical
Deok Kyu Kwon et al.
Summary: The importance of secure authentication in WSN was discussed, with the introduction of Moghadam et al.'s protocol and its identified vulnerabilities, and the proposal of WSN-SLAP as an alternative solution to address these issues.
Article
Computer Science, Information Systems
Weizheng Wang et al.
Summary: Smart grid is recognized as the next-generation intelligent network that optimizes energy efficiency through bidirectional communication. However, security issues arise with its widespread deployment, especially regarding identity authentication. In this study, an authentication protocol combining blockchain, ECC, dynamic Join-and-Exit mechanism, and batch verification is proposed to address these issues, with assured security through computational hard problem assumptions.
PEER-TO-PEER NETWORKING AND APPLICATIONS
(2021)
Article
Chemistry, Analytical
Karanjeet Choudhary et al.
Review
Computer Science, Information Systems
Qin Wang et al.
INTERNET OF THINGS
(2020)
Article
Computer Science, Information Systems
Joonyoung Lee et al.
Article
Computer Science, Information Systems
Alireza Esfahani et al.
IEEE INTERNET OF THINGS JOURNAL
(2019)
Article
Computer Science, Information Systems
Yanrong Lu et al.
IEEE SYSTEMS JOURNAL
(2019)
Article
Engineering, Electrical & Electronic
Stefano Vitturi et al.
PROCEEDINGS OF THE IEEE
(2019)
Article
Computer Science, Information Systems
Chien-Ming Chen et al.
Article
Computer Science, Information Systems
Lailong Luo et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2019)
Review
Computer Science, Theory & Methods
Sachin Kumar et al.
JOURNAL OF BIG DATA
(2019)
Article
Computer Science, Information Systems
Soumya Banerjee et al.
Article
Automation & Control Systems
Xiong Li et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2018)
Article
Automation & Control Systems
Ali Khalajmehrabadi et al.
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS
(2018)
Article
Computer Science, Information Systems
Xiong Li et al.
IEEE INTERNET OF THINGS JOURNAL
(2018)
Article
Computer Science, Interdisciplinary Applications
Jiangfeng Cheng et al.
JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION
(2018)
Review
Computer Science, Interdisciplinary Applications
Shancang Li et al.
JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION
(2018)
Proceedings Paper
Computer Science, Theory & Methods
Nahid Farhady Ghalaty et al.
2014 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2014)
(2014)