Online citations, reference lists, and bibliographies.
← Back to Search

Two-factor Authentication In Industrial Internet-of-Things: Attacks, Evaluation And New Construction

W. Li, Ping Wang
Published 2019 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Abstract Due to the sensitiveness of the physical environments and resource-constrained nature of edge devices, how to securely and efficiently access real-time data in Industrial Internet-of-Things (IIoT) is becoming an increasingly imperative concern. Though intensive efforts have been made to design password-based user authentication schemes for IIoT environments, the majority of them are subject to weaknesses, either suffering from various known attacks or lack of critical features. To ameliorate this situation, firstly, we put forward a criteria set on the basis of related state-of-art evaluation set to fairly assess authentication schemes for IIoT environments. The effectiveness and practicality of our criteria are tested by 42 representative schemes. Secondly, we revisit two representative schemes, namely Amin et al.’s scheme and Gope-Hwang’s scheme, as case studies to demonstrate the common pitfalls in designing robust schemes. Finally, we propose a practical authentication scheme for Industrial Internet-of-Things with provable security, and shed light on how to tackle node capture attack by using the “honeywords” technique. The security and performance evaluation results show that our new scheme is superior to other related ones, and thus, more suitable for IIoT environments.
This paper references
10.1016/j.adhoc.2015.05.014
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
M. Farash (2016)
10.1145/3098243.3098264
Quantifying the reflective DDoS attack capability of household IoT devices
Minzhao Lyu (2017)
10.3390/s140406443
Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks
Jiye Kim (2014)
10.1002/dac.2933
A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor
A. K. Das (2017)
10.1155/2013/407971
An Efficient Biometric Authentication Protocol for Wireless Sensor Networks
O. Althobaiti (2013)
10.1016/j.jnca.2012.03.011
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
A. K. Das (2012)
10.1109/ACCESS.2017.2673239
Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks
Q. Jiang (2017)
10.1109/TWC.2008.080128
Two-factor user authentication in wireless sensor networks
M. Das (2009)
10.3390/s17112681
A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks
Ling Xiong (2017)
10.1007/s12083-014-0285-z
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
Q. Jiang (2015)
10.1002/sec.1591
Provably secure biometric-based user authentication and key agreement scheme in cloud computing
M. Wazid (2016)
10.1007/978-3-030-05764-0_17
A Dynamic Scalable Blockchain Based Communication Architecture for IoT
Han Qiu (2018)
10.1016/j.future.2016.12.028
A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
R. Amin (2018)
10.1007/s10916-012-9839-x
An Authentication Scheme to Healthcare Security under Wireless Sensor Networks
Tsung-Chih Hsiao (2012)
10.1016/j.jnca.2016.12.008
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
F. Wu (2017)
10.3390/s110505020
RUASN: A Robust User Authentication Framework for Wireless Sensor Networks
Pardeep Kumar (2011)
10.1007/s12083-015-0408-1
Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks
Omid Mir (2017)
10.1016/j.comcom.2010.02.011
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'
M. Khan (2011)
10.3390/s130809589
An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks
C. Li (2013)
10.1109/TDSC.2017.2764083
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment
M. Wazid (2020)
10.1109/TWC.2015.2473165
A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
C. Chang (2016)
10.1155/2019/4520685
An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing
Jiaqing Mo (2019)
10.1109/TCE.2004.1309441
A dynamic ID-based remote user authentication scheme
M. Das (2004)
10.1016/j.future.2018.03.043
Privacy-preserving multi-channel communication in Edge-of-Things
Keke Gai (2018)
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
Daojing He (2010)
10.1016/j.compeleceng.2017.08.003
An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
S. Challa (2018)
10.1109/JIOT.2017.2714179
Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things
S. Roy (2018)
10.1631/jzus.C1000377
An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks
Rong Fan (2011)
10.1016/j.ins.2015.02.010
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
D. He (2015)
10.1109/TIE.2016.2585081
A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks
Prosanta Gope (2016)
10.1007/s12083-014-0324-9
A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
A. K. Das (2016)
10.1007/s12083-015-0404-5
A new and secure authentication scheme for wireless sensor networks with formal proof
F. Wu (2017)
10.1016/j.future.2016.10.004
Design of a provably secure biometrics-based multi-cloud-server authentication scheme
S. Kumari (2017)
10.3390/s17030644
Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks
J. Jung (2017)
Security Enhancement of Robust User Authentication Framework for Wireless Sensor Networks
Jiang (2012)
10.1007/978-3-319-62024-4_3
A Robust Authentication Protocol with Privacy Protection for Wireless Sensor Networks
Xiong Li (2016)
10.1098/rspa.1989.0125
A logic of authentication
M. Burrows (1989)
10.1016/j.comnet.2016.01.006
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
R. Amin (2016)
10.1109/TDSC.2016.2605087
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
Ding Wang (2018)
10.1016/j.adhoc.2014.03.009
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
Muhamed Turkanovic (2014)
10.3390/s110504767
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Hsiu-lien Yeh (2011)
10.1016/j.comnet.2014.07.010
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
Ding Wang (2014)
10.1109/TII.2018.2834351
Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
Ding Wang (2018)
10.1007/s11859-010-0318-2
A biometric-based user authentication for wireless sensor networks
J. Yuan (2010)
10.1109/TII.2017.2773666
A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things
X. Li (2018)
10.1002/sec.1573
Provably secure user authentication and key agreement scheme for wireless sensor networks
A. K. Das (2016)
10.1155/2018/9062675
A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment
Chenyu Wang (2018)
10.1007/S11276-018-1841-X
Lightweight three factor scheme for real-time data access in wireless sensor networks
Hanguang Luo (2020)
10.1109/JIOT.2018.2830340
Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things
Keke Gai (2018)
10.1016/j.jnca.2012.01.007
Dynamic ID-based remote user password authentication schemes using smart cards: A review
R. Madhusudhan (2012)
10.1016/j.future.2017.06.018
A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring
R. Ali (2018)
10.1016/j.comnet.2017.06.013
The role of big data analytics in Internet of Things
E. Ahmed (2017)
10.1016/j.jnca.2012.05.010
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
K. Xue (2013)
10.4218/ETRIJ.10.1510.0134
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen (2010)
10.1002/dac.2468
Security flaws in two improved remote user authentication schemes using smart cards
C. Ma (2014)
10.1016/J.INFFUS.2019.02.002
An efficient key distribution system for data fusion in V2X heterogeneous networks
Han Qiu (2019)
10.1145/3133956.3134016
STACCO: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves
Y. Xiao (2017)
10.1016/j.adhoc.2016.11.002
Secure and efficient user authentication scheme for multi-gateway wireless sensor networks
J. Srinivas (2017)
10.1093/IDPL/IPV004
Internet of Things: security and privacy implications
M. Maras (2015)
10.1002/dac.3913
An enhanced anonymous and unlinkable user authentication and key agreement protocol for TMIS by utilization of ECC
Arezou Ostad-Sharif (2019)
10.1016/j.jnca.2017.07.001
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
X. Li (2018)



This paper is referenced by
Semantic Scholar Logo Some data provided by SemanticScholar