当前位置: X-MOL 学术IEEE Trans. Ind. Inform. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
IEEE Transactions on Industrial Informatics ( IF 11.7 ) Pub Date : 5-8-2018 , DOI: 10.1109/tii.2018.2834351
Ding Wang , Wenting Li , Ping Wang

Dozens of two-factor authentication schemes have been proposed to secure real-time data access in industrial wireless sensor networks (WSNs). However, more often than not, the protocol designers advocate the merits of their scheme, but do not reveal (or unconsciously ignoring) the facets on which their scheme performs poorly. Such lack of an objective, comprehensive measurement leads to the unsatisfactory “break-fix-break-fix” cycle in this research area. In this paper, we make an attempt toward breaking this undesirable cycle by proposing a systematical evaluation framework for schemes to be assessed objectively, revisiting two foremost schemes proposed by Wu et al. (2017) and Srinivas et al. (2017) to reveal the challenges and difficulties in designing a sound scheme, and conducting a measurement of 44 representative schemes under our evaluation framework, thereby providing the missing evaluation for two-factor schemes in industrial WSNs. This work would help increase awareness of current measurement issues and improve the scientific process in our field.

中文翻译:


测量工业无线传感器网络中实时数据访问的双因素身份验证方案



人们提出了数十种双因素身份验证方案来保护工业无线传感器网络(WSN)中的实时数据访问。然而,协议设计者常常宣扬其方案的优点,但不会揭示(或无意识地忽略)其方案表现不佳的方面。缺乏客观、全面的测量导致该研究领域出现了令人不满意的“中断-修复-中断-修复”循环。在本文中,我们试图通过提出一个系统的评估框架来客观评估方案,从而打破这种不良循环,重新审视吴等人提出的两个最重要的方案。 (2017)和斯里尼瓦斯等人。 (2017)揭示了设计合理方案的挑战和困难,并在我们的评估框架下对44个代表性方案进行了测量,从而为工业无线传感器网络中的双因素方案提供了缺失的评估。这项工作将有助于提高对当前测量问题的认识并改进我们领域的科学流程。
更新日期:2024-08-22
down
wechat
bug