A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things
The Internet of Things (IoT) is an emerging technology and expected to provide solutions for various industrial fields. As a basic technology of the IoT, wireless sensor networks (WSNs) can be used to collect the required environment parameters for specific applications. Due to the resource limitati...
Gespeichert in:
Veröffentlicht in: | IEEE internet of things journal 2018-06, Vol.5 (3), p.1606-1615 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1615 |
---|---|
container_issue | 3 |
container_start_page | 1606 |
container_title | IEEE internet of things journal |
container_volume | 5 |
creator | Xiong Li Jieyao Peng Jianwei Niu Fan Wu Junguo Liao Choo, Kim-Kwang Raymond |
description | The Internet of Things (IoT) is an emerging technology and expected to provide solutions for various industrial fields. As a basic technology of the IoT, wireless sensor networks (WSNs) can be used to collect the required environment parameters for specific applications. Due to the resource limitation of sensor node and the open nature of wireless channel, security has become an enormous challenge in WSN. Authentication as a basic security service can be used to guarantee the legality of data access in WSN. Recently, Chang and Le proposed two authentication protocols for WSN for different security requirements. However, their protocol cannot provide proper mutual authentication and has other security and functionality defects. We present a three-factor user authentication protocol for WSN to remove the weaknesses of previous protocols. The security of the proposed protocol is analyzed, and the security, functionality and performance of our protocol are compared with other related protocols. The comparison results and simulation results by NS-3 show that the proposed protocol is robust and energy efficient for IoT applications. |
doi_str_mv | 10.1109/JIOT.2017.2787800 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_JIOT_2017_2787800</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8241345</ieee_id><sourcerecordid>2055011179</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-b4d74c7acc54d84168d4a34069f182c8908446599c27294e8ef68a4d60af77c23</originalsourceid><addsrcrecordid>eNpNkM1KAzEURoMoWGofQNwEXE9NMpn8LEupWilUpOIypJmknVKTmmQWfXtTWsTV_RbfuZd7ALjHaIwxkk9v8-VqTBDmY8IFFwhdgQGpCa8oY-T6X74Fo5R2CKGCNViyAfiawI-w7lOG2rdw5m3cHOHMuc501mc46fO2zM7o3AUP32PIwYQ9dCHCuW8LFzu9LzHb6G2GwcHVtvObdAdunN4nO7rMIfh8nq2mr9Vi-TKfThaVIbLO1Zq2nBqujWloKyhmoqW6pohJhwUxQiJBKWukNIQTSa2wjglNW4a049yQeggez3sPMfz0NmW1C3305aQiqGnKo5jL0sLnlokhpWidOsTuW8ejwkidFKqTQnVSqC4KC_NwZjpr7V9fEIpr2tS_8XFr4g</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2055011179</pqid></control><display><type>article</type><title>A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things</title><source>IEEE Electronic Library (IEL)</source><creator>Xiong Li ; Jieyao Peng ; Jianwei Niu ; Fan Wu ; Junguo Liao ; Choo, Kim-Kwang Raymond</creator><creatorcontrib>Xiong Li ; Jieyao Peng ; Jianwei Niu ; Fan Wu ; Junguo Liao ; Choo, Kim-Kwang Raymond</creatorcontrib><description>The Internet of Things (IoT) is an emerging technology and expected to provide solutions for various industrial fields. As a basic technology of the IoT, wireless sensor networks (WSNs) can be used to collect the required environment parameters for specific applications. Due to the resource limitation of sensor node and the open nature of wireless channel, security has become an enormous challenge in WSN. Authentication as a basic security service can be used to guarantee the legality of data access in WSN. Recently, Chang and Le proposed two authentication protocols for WSN for different security requirements. However, their protocol cannot provide proper mutual authentication and has other security and functionality defects. We present a three-factor user authentication protocol for WSN to remove the weaknesses of previous protocols. The security of the proposed protocol is analyzed, and the security, functionality and performance of our protocol are compared with other related protocols. The comparison results and simulation results by NS-3 show that the proposed protocol is robust and energy efficient for IoT applications.</description><identifier>ISSN: 2327-4662</identifier><identifier>EISSN: 2327-4662</identifier><identifier>DOI: 10.1109/JIOT.2017.2787800</identifier><identifier>CODEN: IITJAU</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Authentication ; Authentication protocols ; Industrial applications ; Internet of Things ; Internet of Things (IoT) ; Logic gates ; privacy protection ; Protocol ; Protocol (computers) ; Protocols ; Remote sensors ; Security services ; Smart cards ; Wireless sensor networks ; wireless sensor networks (WSNs)</subject><ispartof>IEEE internet of things journal, 2018-06, Vol.5 (3), p.1606-1615</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-b4d74c7acc54d84168d4a34069f182c8908446599c27294e8ef68a4d60af77c23</citedby><cites>FETCH-LOGICAL-c293t-b4d74c7acc54d84168d4a34069f182c8908446599c27294e8ef68a4d60af77c23</cites><orcidid>0000-0002-8045-3733 ; 0000-0001-6619-554X ; 0000-0001-9208-5336 ; 0000-0003-3946-5107 ; 0000-0001-9023-3569</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8241345$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8241345$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Xiong Li</creatorcontrib><creatorcontrib>Jieyao Peng</creatorcontrib><creatorcontrib>Jianwei Niu</creatorcontrib><creatorcontrib>Fan Wu</creatorcontrib><creatorcontrib>Junguo Liao</creatorcontrib><creatorcontrib>Choo, Kim-Kwang Raymond</creatorcontrib><title>A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things</title><title>IEEE internet of things journal</title><addtitle>JIoT</addtitle><description>The Internet of Things (IoT) is an emerging technology and expected to provide solutions for various industrial fields. As a basic technology of the IoT, wireless sensor networks (WSNs) can be used to collect the required environment parameters for specific applications. Due to the resource limitation of sensor node and the open nature of wireless channel, security has become an enormous challenge in WSN. Authentication as a basic security service can be used to guarantee the legality of data access in WSN. Recently, Chang and Le proposed two authentication protocols for WSN for different security requirements. However, their protocol cannot provide proper mutual authentication and has other security and functionality defects. We present a three-factor user authentication protocol for WSN to remove the weaknesses of previous protocols. The security of the proposed protocol is analyzed, and the security, functionality and performance of our protocol are compared with other related protocols. The comparison results and simulation results by NS-3 show that the proposed protocol is robust and energy efficient for IoT applications.</description><subject>Authentication</subject><subject>Authentication protocols</subject><subject>Industrial applications</subject><subject>Internet of Things</subject><subject>Internet of Things (IoT)</subject><subject>Logic gates</subject><subject>privacy protection</subject><subject>Protocol</subject><subject>Protocol (computers)</subject><subject>Protocols</subject><subject>Remote sensors</subject><subject>Security services</subject><subject>Smart cards</subject><subject>Wireless sensor networks</subject><subject>wireless sensor networks (WSNs)</subject><issn>2327-4662</issn><issn>2327-4662</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkM1KAzEURoMoWGofQNwEXE9NMpn8LEupWilUpOIypJmknVKTmmQWfXtTWsTV_RbfuZd7ALjHaIwxkk9v8-VqTBDmY8IFFwhdgQGpCa8oY-T6X74Fo5R2CKGCNViyAfiawI-w7lOG2rdw5m3cHOHMuc501mc46fO2zM7o3AUP32PIwYQ9dCHCuW8LFzu9LzHb6G2GwcHVtvObdAdunN4nO7rMIfh8nq2mr9Vi-TKfThaVIbLO1Zq2nBqujWloKyhmoqW6pohJhwUxQiJBKWukNIQTSa2wjglNW4a049yQeggez3sPMfz0NmW1C3305aQiqGnKo5jL0sLnlokhpWidOsTuW8ejwkidFKqTQnVSqC4KC_NwZjpr7V9fEIpr2tS_8XFr4g</recordid><startdate>20180601</startdate><enddate>20180601</enddate><creator>Xiong Li</creator><creator>Jieyao Peng</creator><creator>Jianwei Niu</creator><creator>Fan Wu</creator><creator>Junguo Liao</creator><creator>Choo, Kim-Kwang Raymond</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-8045-3733</orcidid><orcidid>https://orcid.org/0000-0001-6619-554X</orcidid><orcidid>https://orcid.org/0000-0001-9208-5336</orcidid><orcidid>https://orcid.org/0000-0003-3946-5107</orcidid><orcidid>https://orcid.org/0000-0001-9023-3569</orcidid></search><sort><creationdate>20180601</creationdate><title>A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things</title><author>Xiong Li ; Jieyao Peng ; Jianwei Niu ; Fan Wu ; Junguo Liao ; Choo, Kim-Kwang Raymond</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-b4d74c7acc54d84168d4a34069f182c8908446599c27294e8ef68a4d60af77c23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Authentication</topic><topic>Authentication protocols</topic><topic>Industrial applications</topic><topic>Internet of Things</topic><topic>Internet of Things (IoT)</topic><topic>Logic gates</topic><topic>privacy protection</topic><topic>Protocol</topic><topic>Protocol (computers)</topic><topic>Protocols</topic><topic>Remote sensors</topic><topic>Security services</topic><topic>Smart cards</topic><topic>Wireless sensor networks</topic><topic>wireless sensor networks (WSNs)</topic><toplevel>online_resources</toplevel><creatorcontrib>Xiong Li</creatorcontrib><creatorcontrib>Jieyao Peng</creatorcontrib><creatorcontrib>Jianwei Niu</creatorcontrib><creatorcontrib>Fan Wu</creatorcontrib><creatorcontrib>Junguo Liao</creatorcontrib><creatorcontrib>Choo, Kim-Kwang Raymond</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE internet of things journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Xiong Li</au><au>Jieyao Peng</au><au>Jianwei Niu</au><au>Fan Wu</au><au>Junguo Liao</au><au>Choo, Kim-Kwang Raymond</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things</atitle><jtitle>IEEE internet of things journal</jtitle><stitle>JIoT</stitle><date>2018-06-01</date><risdate>2018</risdate><volume>5</volume><issue>3</issue><spage>1606</spage><epage>1615</epage><pages>1606-1615</pages><issn>2327-4662</issn><eissn>2327-4662</eissn><coden>IITJAU</coden><abstract>The Internet of Things (IoT) is an emerging technology and expected to provide solutions for various industrial fields. As a basic technology of the IoT, wireless sensor networks (WSNs) can be used to collect the required environment parameters for specific applications. Due to the resource limitation of sensor node and the open nature of wireless channel, security has become an enormous challenge in WSN. Authentication as a basic security service can be used to guarantee the legality of data access in WSN. Recently, Chang and Le proposed two authentication protocols for WSN for different security requirements. However, their protocol cannot provide proper mutual authentication and has other security and functionality defects. We present a three-factor user authentication protocol for WSN to remove the weaknesses of previous protocols. The security of the proposed protocol is analyzed, and the security, functionality and performance of our protocol are compared with other related protocols. The comparison results and simulation results by NS-3 show that the proposed protocol is robust and energy efficient for IoT applications.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/JIOT.2017.2787800</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0002-8045-3733</orcidid><orcidid>https://orcid.org/0000-0001-6619-554X</orcidid><orcidid>https://orcid.org/0000-0001-9208-5336</orcidid><orcidid>https://orcid.org/0000-0003-3946-5107</orcidid><orcidid>https://orcid.org/0000-0001-9023-3569</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2327-4662 |
ispartof | IEEE internet of things journal, 2018-06, Vol.5 (3), p.1606-1615 |
issn | 2327-4662 2327-4662 |
language | eng |
recordid | cdi_crossref_primary_10_1109_JIOT_2017_2787800 |
source | IEEE Electronic Library (IEL) |
subjects | Authentication Authentication protocols Industrial applications Internet of Things Internet of Things (IoT) Logic gates privacy protection Protocol Protocol (computers) Protocols Remote sensors Security services Smart cards Wireless sensor networks wireless sensor networks (WSNs) |
title | A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-24T22%3A26%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Robust%20and%20Energy%20Efficient%20Authentication%20Protocol%20for%20Industrial%20Internet%20of%20Things&rft.jtitle=IEEE%20internet%20of%20things%20journal&rft.au=Xiong%20Li&rft.date=2018-06-01&rft.volume=5&rft.issue=3&rft.spage=1606&rft.epage=1615&rft.pages=1606-1615&rft.issn=2327-4662&rft.eissn=2327-4662&rft.coden=IITJAU&rft_id=info:doi/10.1109/JIOT.2017.2787800&rft_dat=%3Cproquest_RIE%3E2055011179%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2055011179&rft_id=info:pmid/&rft_ieee_id=8241345&rfr_iscdi=true |