期刊
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
卷 14, 期 8, 页码 3599-3609出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2017.2773666
关键词
Authentication; industrial Internet of Things (IIoT); key agreement; privacy; wireless sensor networks (WSNs)
类别
资金
- National Natural Science Foundation of China [61300220, 61572013, 61772194]
- Scientific Research Fund of Hunan Provincial Education Department [16B089]
- University Grants Commission, India through UGC-BSR [3(A)(60)31]
Wireless sensor networks (WSNs) play an important role in the industrial Internet of Things (IIoT) and have been widely used in many industrial fields to gather data of monitoring area. However, due to the open nature of wireless channel and resource-constrained feature of sensor nodes, how to guarantee that the sensitive sensor data can only be accessed by a valid user becomes a key challenge in IIoT environment. Some user authentication protocols for WSNs have been proposed to address this issue. However, previous works more or less have their own weaknesses, such as not providing user anonymity and other ideal functions or being vulnerable to some attacks. To provide secure communication for IIoT, a user authentication protocol scheme with privacy protection for IIoT has been proposed. The security of the proposed scheme is proved under a random oracle model, and other security discussions show that the proposed protocol is robust to various attacks. Furthermore, the comparison results with other related protocols and the simulation by NS-3 show that the proposed protocol is secure and efficient for IIoT.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据