首页> 外文OA文献 >SELAMAT: A New Secure and Lightweight Multi-Factor Authentication Scheme for Cross-Platform Industrial IoT Systems
【2h】

SELAMAT: A New Secure and Lightweight Multi-Factor Authentication Scheme for Cross-Platform Industrial IoT Systems

机译:Selamat:跨平台工业IOT系统的一种新的安全和轻量级多因素认证方案

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

The development of the industrial Internet of Things (IIoT) promotes the integration of the cross-platform systems in fog computing, which enable users to obtain access to multiple application located in different geographical locations. Fog users at the network’s edge communicate with many fog servers in different fogs and newly joined servers that they had never contacted before. This communication complexity brings enormous security challenges and potential vulnerability to malicious threats. The attacker may replace the edge device with a fake one and authenticate it as a legitimate device. Therefore, to prevent unauthorized users from accessing fog servers, we propose a new secure and lightweight multi-factor authentication scheme for cross-platform IoT systems (SELAMAT). The proposed scheme extends the Kerberos workflow and utilizes the AES-ECC algorithm for efficient encryption keys management and secure communication between the edge nodes and fog node servers to establish secure mutual authentication. The scheme was tested for its security analysis using the formal security verification under the widely accepted AVISPA tool. We proved our scheme using Burrows Abdi Needham’s logic (BAN logic) to prove secure mutual authentication. The results show that the SELAMAT scheme provides better security, functionality, communication, and computation cost than the existing schemes.
机译:工业互联网的发展(IIOT)促进了雾化计算中的跨平台系统的集成,使用户能够获得对不同地理位置中的多个应用程序的访问。网络边缘的雾用户与不同的雾气中的许多雾服务器通信,新加入的服务器以前从未联系过。这种通信复杂性带来了巨大的安全挑战和对恶意威胁的潜在脆弱性。攻击者可以用假装替换边缘设备并将其验证为合法设备。因此,为了防止未经授权的用户访问FOG服务器,我们为跨平台IOT系统(Selamat)提出了一种新的安全和轻量级的多因素认证方案。该方案扩展了Kerberos工作流程,并利用AES-ECC算法用于高效的加密密钥管理和边缘节点和FOG节点服务器之间的安全通信,以建立安全的相互认证。在广泛接受的AVISPA工具下使用正式的安全验证测试了该计划的安全分析。我们证明了我们的计划,使用Burrows Abdi Consureham的逻辑(禁令逻辑)来证明安全相互认证。结果表明,Selamat方案提供比现有方案更好的安全性,功能,通信和计算成本。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号