当前位置: X-MOL 学术Comput. Commun. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem
Computer Communications ( IF 6 ) Pub Date : 2020-06-13 , DOI: 10.1016/j.comcom.2020.06.012
Mengxia Shuai , Ling Xiong , Changhui Wang , Nenghai Yu

Industrial Internet of Things (IIoT) is a non-negligible subset of IoT, which focuses on solving special requirements in industrial applications. In IIoT environments, remote monitoring based on wireless sensor networks (WSNs) is an important application instance, which facilitates the user like professional to manage the factory remotely. The sensitive data collected from industrial sensor nodes is very important for real-time decisions. Since the user and the industrial sensor nodes communicate over insecure communication channels, the transmitted information may be intercepted and altered easily by a malicious adversary, and any modifications on these parameters may have negative effect on decisions. Therefore, there is a great need to design a secure authentication scheme to protect the transmitted information from unauthorized access. Most of the existing schemes reported in the literature are vulnerable to various known attacks, especially the inability to provide forward secrecy between gateway node and the sensor nodes. In allusion to the above problems, in this paper, we propose a new secure authentication scheme with forward secrecy for IIoT systems, in which Rabin cryptosystem is employed and the password verification table is avoided. The rigorous formal proof and heuristic analysis demonstrate that the proposed scheme provides the desired security and functional features. Compared with nine related schemes, the proposed scheme achieves a delicate balance between security and efficiency, and it is more suitable for realistic scenarios.



中文翻译:

使用Rabin密码系统的具有前向保密性的工业物联网安全认证方案

工业物联网(IIoT)是物联网的不可忽略的子集,其重点是解决工业应用中的特殊要求。在IIoT环境中,基于无线传感器网络(WSN)的远程监控是一个重要的应用实例,它使像专业人士一样的用户可以远程管理工厂。从工业传感器节点收集的敏感数据对于实时决策非常重要。由于用户和工业传感器节点通过不安全的通信通道进行通信,因此所传送的信息可能会被恶意的对手轻易拦截和更改,对这些参数的任何修改都可能对决策产生负面影响。因此,非常需要设计一种安全的认证方案,以保护所传输的信息免遭未经授权的访问。文献中报道的大多数现有方案都容易受到各种已知攻击的影响,特别是无法在网关节点和传感器节点之间提供前向保密性。针对上述问题,本文提出了一种针对IIoT系统的具有前向保密性的新安全认证方案,该方案采用Rabin密码体制,避免了密码验证表。严格的形式证明和启发式分析表明,该方案提供了所需的安全性和功能特征。与九种相关方案相比,该方案在安全性和效率之间实现了微妙的平衡,并且更适合现实情况。特别是无法在网关节点和传感器节点之间提供前向保密性。针对上述问题,本文提出了一种针对IIoT系统的具有前向保密性的新安全认证方案,该方案采用Rabin密码体制,避免了密码验证表。严格的形式证明和启发式分析表明,该方案提供了所需的安全性和功能特征。与九种相关方案相比,该方案在安全性和效率之间实现了微妙的平衡,并且更适合现实情况。特别是无法在网关节点和传感器节点之间提供前向保密性。针对上述问题,本文提出了一种针对IIoT系统的具有前向保密性的新安全认证方案,该方案采用Rabin密码体制,避免了密码验证表。严格的形式证明和启发式分析表明,该方案提供了所需的安全性和功能特征。与九种相关方案相比,该方案在安全性和效率之间实现了微妙的平衡,并且更适合现实情况。其中采用Rabin密码系统,避免了密码验证表。严格的形式证明和启发式分析表明,该方案提供了所需的安全性和功能特征。与九种相关方案相比,该方案在安全性和效率之间实现了微妙的平衡,并且更适合现实情况。其中采用Rabin密码系统,避免了密码验证表。严格的形式证明和启发式分析表明,该方案提供了所需的安全性和功能特征。与九种相关方案相比,该方案在安全性和效率之间实现了微妙的平衡,并且更适合现实情况。

更新日期:2020-06-13
down
wechat
bug