A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things

The Internet of Things (IoT) is an emerging technology and expected to provide solutions for various industrial fields. As a basic technology of the IoT, wireless sensor networks (WSNs) can be used to collect the required environment parameters for specific applications. Due to the resource limitati...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE internet of things journal 2018-06, Vol.5 (3), p.1606-1615
Hauptverfasser: Xiong Li, Jieyao Peng, Jianwei Niu, Fan Wu, Junguo Liao, Choo, Kim-Kwang Raymond
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1615
container_issue 3
container_start_page 1606
container_title IEEE internet of things journal
container_volume 5
creator Xiong Li
Jieyao Peng
Jianwei Niu
Fan Wu
Junguo Liao
Choo, Kim-Kwang Raymond
description The Internet of Things (IoT) is an emerging technology and expected to provide solutions for various industrial fields. As a basic technology of the IoT, wireless sensor networks (WSNs) can be used to collect the required environment parameters for specific applications. Due to the resource limitation of sensor node and the open nature of wireless channel, security has become an enormous challenge in WSN. Authentication as a basic security service can be used to guarantee the legality of data access in WSN. Recently, Chang and Le proposed two authentication protocols for WSN for different security requirements. However, their protocol cannot provide proper mutual authentication and has other security and functionality defects. We present a three-factor user authentication protocol for WSN to remove the weaknesses of previous protocols. The security of the proposed protocol is analyzed, and the security, functionality and performance of our protocol are compared with other related protocols. The comparison results and simulation results by NS-3 show that the proposed protocol is robust and energy efficient for IoT applications.
doi_str_mv 10.1109/JIOT.2017.2787800
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_JIOT_2017_2787800</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8241345</ieee_id><sourcerecordid>2055011179</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-b4d74c7acc54d84168d4a34069f182c8908446599c27294e8ef68a4d60af77c23</originalsourceid><addsrcrecordid>eNpNkM1KAzEURoMoWGofQNwEXE9NMpn8LEupWilUpOIypJmknVKTmmQWfXtTWsTV_RbfuZd7ALjHaIwxkk9v8-VqTBDmY8IFFwhdgQGpCa8oY-T6X74Fo5R2CKGCNViyAfiawI-w7lOG2rdw5m3cHOHMuc501mc46fO2zM7o3AUP32PIwYQ9dCHCuW8LFzu9LzHb6G2GwcHVtvObdAdunN4nO7rMIfh8nq2mr9Vi-TKfThaVIbLO1Zq2nBqujWloKyhmoqW6pohJhwUxQiJBKWukNIQTSa2wjglNW4a049yQeggez3sPMfz0NmW1C3305aQiqGnKo5jL0sLnlokhpWidOsTuW8ejwkidFKqTQnVSqC4KC_NwZjpr7V9fEIpr2tS_8XFr4g</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2055011179</pqid></control><display><type>article</type><title>A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things</title><source>IEEE Electronic Library (IEL)</source><creator>Xiong Li ; Jieyao Peng ; Jianwei Niu ; Fan Wu ; Junguo Liao ; Choo, Kim-Kwang Raymond</creator><creatorcontrib>Xiong Li ; Jieyao Peng ; Jianwei Niu ; Fan Wu ; Junguo Liao ; Choo, Kim-Kwang Raymond</creatorcontrib><description>The Internet of Things (IoT) is an emerging technology and expected to provide solutions for various industrial fields. As a basic technology of the IoT, wireless sensor networks (WSNs) can be used to collect the required environment parameters for specific applications. Due to the resource limitation of sensor node and the open nature of wireless channel, security has become an enormous challenge in WSN. Authentication as a basic security service can be used to guarantee the legality of data access in WSN. Recently, Chang and Le proposed two authentication protocols for WSN for different security requirements. However, their protocol cannot provide proper mutual authentication and has other security and functionality defects. We present a three-factor user authentication protocol for WSN to remove the weaknesses of previous protocols. The security of the proposed protocol is analyzed, and the security, functionality and performance of our protocol are compared with other related protocols. The comparison results and simulation results by NS-3 show that the proposed protocol is robust and energy efficient for IoT applications.</description><identifier>ISSN: 2327-4662</identifier><identifier>EISSN: 2327-4662</identifier><identifier>DOI: 10.1109/JIOT.2017.2787800</identifier><identifier>CODEN: IITJAU</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Authentication ; Authentication protocols ; Industrial applications ; Internet of Things ; Internet of Things (IoT) ; Logic gates ; privacy protection ; Protocol ; Protocol (computers) ; Protocols ; Remote sensors ; Security services ; Smart cards ; Wireless sensor networks ; wireless sensor networks (WSNs)</subject><ispartof>IEEE internet of things journal, 2018-06, Vol.5 (3), p.1606-1615</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-b4d74c7acc54d84168d4a34069f182c8908446599c27294e8ef68a4d60af77c23</citedby><cites>FETCH-LOGICAL-c293t-b4d74c7acc54d84168d4a34069f182c8908446599c27294e8ef68a4d60af77c23</cites><orcidid>0000-0002-8045-3733 ; 0000-0001-6619-554X ; 0000-0001-9208-5336 ; 0000-0003-3946-5107 ; 0000-0001-9023-3569</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8241345$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8241345$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Xiong Li</creatorcontrib><creatorcontrib>Jieyao Peng</creatorcontrib><creatorcontrib>Jianwei Niu</creatorcontrib><creatorcontrib>Fan Wu</creatorcontrib><creatorcontrib>Junguo Liao</creatorcontrib><creatorcontrib>Choo, Kim-Kwang Raymond</creatorcontrib><title>A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things</title><title>IEEE internet of things journal</title><addtitle>JIoT</addtitle><description>The Internet of Things (IoT) is an emerging technology and expected to provide solutions for various industrial fields. As a basic technology of the IoT, wireless sensor networks (WSNs) can be used to collect the required environment parameters for specific applications. Due to the resource limitation of sensor node and the open nature of wireless channel, security has become an enormous challenge in WSN. Authentication as a basic security service can be used to guarantee the legality of data access in WSN. Recently, Chang and Le proposed two authentication protocols for WSN for different security requirements. However, their protocol cannot provide proper mutual authentication and has other security and functionality defects. We present a three-factor user authentication protocol for WSN to remove the weaknesses of previous protocols. The security of the proposed protocol is analyzed, and the security, functionality and performance of our protocol are compared with other related protocols. The comparison results and simulation results by NS-3 show that the proposed protocol is robust and energy efficient for IoT applications.</description><subject>Authentication</subject><subject>Authentication protocols</subject><subject>Industrial applications</subject><subject>Internet of Things</subject><subject>Internet of Things (IoT)</subject><subject>Logic gates</subject><subject>privacy protection</subject><subject>Protocol</subject><subject>Protocol (computers)</subject><subject>Protocols</subject><subject>Remote sensors</subject><subject>Security services</subject><subject>Smart cards</subject><subject>Wireless sensor networks</subject><subject>wireless sensor networks (WSNs)</subject><issn>2327-4662</issn><issn>2327-4662</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkM1KAzEURoMoWGofQNwEXE9NMpn8LEupWilUpOIypJmknVKTmmQWfXtTWsTV_RbfuZd7ALjHaIwxkk9v8-VqTBDmY8IFFwhdgQGpCa8oY-T6X74Fo5R2CKGCNViyAfiawI-w7lOG2rdw5m3cHOHMuc501mc46fO2zM7o3AUP32PIwYQ9dCHCuW8LFzu9LzHb6G2GwcHVtvObdAdunN4nO7rMIfh8nq2mr9Vi-TKfThaVIbLO1Zq2nBqujWloKyhmoqW6pohJhwUxQiJBKWukNIQTSa2wjglNW4a049yQeggez3sPMfz0NmW1C3305aQiqGnKo5jL0sLnlokhpWidOsTuW8ejwkidFKqTQnVSqC4KC_NwZjpr7V9fEIpr2tS_8XFr4g</recordid><startdate>20180601</startdate><enddate>20180601</enddate><creator>Xiong Li</creator><creator>Jieyao Peng</creator><creator>Jianwei Niu</creator><creator>Fan Wu</creator><creator>Junguo Liao</creator><creator>Choo, Kim-Kwang Raymond</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-8045-3733</orcidid><orcidid>https://orcid.org/0000-0001-6619-554X</orcidid><orcidid>https://orcid.org/0000-0001-9208-5336</orcidid><orcidid>https://orcid.org/0000-0003-3946-5107</orcidid><orcidid>https://orcid.org/0000-0001-9023-3569</orcidid></search><sort><creationdate>20180601</creationdate><title>A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things</title><author>Xiong Li ; Jieyao Peng ; Jianwei Niu ; Fan Wu ; Junguo Liao ; Choo, Kim-Kwang Raymond</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-b4d74c7acc54d84168d4a34069f182c8908446599c27294e8ef68a4d60af77c23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Authentication</topic><topic>Authentication protocols</topic><topic>Industrial applications</topic><topic>Internet of Things</topic><topic>Internet of Things (IoT)</topic><topic>Logic gates</topic><topic>privacy protection</topic><topic>Protocol</topic><topic>Protocol (computers)</topic><topic>Protocols</topic><topic>Remote sensors</topic><topic>Security services</topic><topic>Smart cards</topic><topic>Wireless sensor networks</topic><topic>wireless sensor networks (WSNs)</topic><toplevel>online_resources</toplevel><creatorcontrib>Xiong Li</creatorcontrib><creatorcontrib>Jieyao Peng</creatorcontrib><creatorcontrib>Jianwei Niu</creatorcontrib><creatorcontrib>Fan Wu</creatorcontrib><creatorcontrib>Junguo Liao</creatorcontrib><creatorcontrib>Choo, Kim-Kwang Raymond</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE internet of things journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Xiong Li</au><au>Jieyao Peng</au><au>Jianwei Niu</au><au>Fan Wu</au><au>Junguo Liao</au><au>Choo, Kim-Kwang Raymond</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things</atitle><jtitle>IEEE internet of things journal</jtitle><stitle>JIoT</stitle><date>2018-06-01</date><risdate>2018</risdate><volume>5</volume><issue>3</issue><spage>1606</spage><epage>1615</epage><pages>1606-1615</pages><issn>2327-4662</issn><eissn>2327-4662</eissn><coden>IITJAU</coden><abstract>The Internet of Things (IoT) is an emerging technology and expected to provide solutions for various industrial fields. As a basic technology of the IoT, wireless sensor networks (WSNs) can be used to collect the required environment parameters for specific applications. Due to the resource limitation of sensor node and the open nature of wireless channel, security has become an enormous challenge in WSN. Authentication as a basic security service can be used to guarantee the legality of data access in WSN. Recently, Chang and Le proposed two authentication protocols for WSN for different security requirements. However, their protocol cannot provide proper mutual authentication and has other security and functionality defects. We present a three-factor user authentication protocol for WSN to remove the weaknesses of previous protocols. The security of the proposed protocol is analyzed, and the security, functionality and performance of our protocol are compared with other related protocols. The comparison results and simulation results by NS-3 show that the proposed protocol is robust and energy efficient for IoT applications.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/JIOT.2017.2787800</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0002-8045-3733</orcidid><orcidid>https://orcid.org/0000-0001-6619-554X</orcidid><orcidid>https://orcid.org/0000-0001-9208-5336</orcidid><orcidid>https://orcid.org/0000-0003-3946-5107</orcidid><orcidid>https://orcid.org/0000-0001-9023-3569</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2327-4662
ispartof IEEE internet of things journal, 2018-06, Vol.5 (3), p.1606-1615
issn 2327-4662
2327-4662
language eng
recordid cdi_crossref_primary_10_1109_JIOT_2017_2787800
source IEEE Electronic Library (IEL)
subjects Authentication
Authentication protocols
Industrial applications
Internet of Things
Internet of Things (IoT)
Logic gates
privacy protection
Protocol
Protocol (computers)
Protocols
Remote sensors
Security services
Smart cards
Wireless sensor networks
wireless sensor networks (WSNs)
title A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-24T22%3A26%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Robust%20and%20Energy%20Efficient%20Authentication%20Protocol%20for%20Industrial%20Internet%20of%20Things&rft.jtitle=IEEE%20internet%20of%20things%20journal&rft.au=Xiong%20Li&rft.date=2018-06-01&rft.volume=5&rft.issue=3&rft.spage=1606&rft.epage=1615&rft.pages=1606-1615&rft.issn=2327-4662&rft.eissn=2327-4662&rft.coden=IITJAU&rft_id=info:doi/10.1109/JIOT.2017.2787800&rft_dat=%3Cproquest_RIE%3E2055011179%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2055011179&rft_id=info:pmid/&rft_ieee_id=8241345&rfr_iscdi=true