信息网络安全 ›› 2021, Vol. 21 ›› Issue (7): 1-9.doi: 10.3969/j.issn.1671-1122.2021.07.001
收稿日期:
2021-03-31
出版日期:
2021-07-10
发布日期:
2021-07-23
通讯作者:
刘忻
E-mail:xinl@lzu.edu.cn
作者简介:
刘忻(1988—),男,甘肃,讲师,博士,主要研究方向为认证协议、零信任体系架构、机密计算等|杨浩睿(1998—),男,河南,硕士研究生,主要研究方向为认证协议、零信任体系架构等|郭振斌(1994—),男,山东,硕士研究生,主要研究方向为认证协议、机密计算等|王家寅(1998—),男,甘肃,硕士研究生,主要研究方向为区块链、车联网等
基金资助:
LIU Xin(), YANG Haorui, GUO Zhenbin, WANG Jiayin
Received:
2021-03-31
Online:
2021-07-10
Published:
2021-07-23
Contact:
LIU Xin
E-mail:xinl@lzu.edu.cn
摘要:
为了抵抗内部恶意用户的攻击、保护控制指令与工业数据的安全性,实现对用户与设备合法性的验证,文章设计了一种安全的适用于工业物联网的身份认证协议,在实现合法性验证的基础上,引入用户的权限分离机制和参与实体的在线注册机制提高协议的安全性和可用性。最后通过仿真工具AVISPA及非形式化安全性分析验证了协议的安全性。性能分析与对比分析表明,该协议能够较好地适用于工业物联网身份认证。
中图分类号:
刘忻, 杨浩睿, 郭振斌, 王家寅. 一种实现在线注册与权限分离的工业物联网身份认证协议[J]. 信息网络安全, 2021, 21(7): 1-9.
LIU Xin, YANG Haorui, GUO Zhenbin, WANG Jiayin. An Authentication Protocol Achieving Online Registration and Privilege Separation for Industrial Internet of Things[J]. Netinfo Security, 2021, 21(7): 1-9.
[1] | LASI H, FETTKE P, KEMPER H G, et al. Industry 4.0[J]. Business & Information Systems Engineering, 2014, 6(4):239-242. |
[2] | KANG Shilong, DU Zhongyi, LEI Yongmei, et al. Overview of Industrial Internet of Things[J]. Internet of Things Technologies, 2013, 3(6):80-82, 85. |
康世龙, 杜中一, 雷咏梅, 等. 工业物联网研究概述[J]. 物联网技术, 2013, 3(6):80-82,85. | |
[3] | LI Shining, LUO Guojia. The Overview of Technologies and Applications for Industrial IOT[J]. Telecommun Netw Technol, 2014(3):26-31. |
李士宁, 罗国佳. 工业物联网技术及应用概述[J]. 电信网技术, 2014(3):26-31. | |
[4] | ALESSANDRO A, JAVIER L, FABIO M. Foundations of Security Analysis and Design VII[M]. Heidelberg: Springer, 2014. |
[5] | JIANG Qi, MA Jianfeng, WEI Fushan, et al. An Untraceable Temporal-credential-based Two-factor Authentication Scheme Using ECC for Wireless Sensor Networks[EB/OL]. https://www.sciencedirect.com/science/article/abs/pii/S1084804516302302, 2020-11-14. |
[6] |
LI Xiong, NIU Jianwei, BHUIYAN M Z A, et al. A Robust ECC-based Provable Secure Authentication Protocol with Privacy Preserving for Industrial Internet of Things[J]. IEEE Transactions on Industrial Informatics, 2017, 14(8):3599-3609.
doi: 10.1109/TII.9424 URL |
[7] |
LI Xiong, NIU Jianwei, SARU K, et al. A Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments[J]. Journal of Network and Computer Applications, 2018, 103(C):194-204.
doi: 10.1016/j.jnca.2017.07.001 URL |
[8] |
BANERJEE S, ODELU V, DAS A K, et al. A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment[J]. IEEE Internet of Things Journal, 2019, 6(5):8739-8752.
doi: 10.1109/JIoT.6488907 URL |
[9] |
FAR H A N, BAYAT M, DAS A K, et al. LAPTAS: Lightweight Anonymous Privacy-preserving Three-factor Authentication Scheme for WSN-based IIoT[J]. Wireless Networks, 2021, 27(2):1389-1412.
doi: 10.1007/s11276-020-02523-9 URL |
[10] | AHMED M, HUANG Xu, SHARMA D, et al. Wireless Sensor Network Internal Attacker Identification with Multiple Evidence by Dempster-shafer Theory[C]// Springer. International Conference on Algorithms and Architectures for Parallel Processing, September 4-7, 2012, Fukuoka, Japan. Heidelberg: Springer, 2012: 255-263. |
[11] | AMIN R, BISWAS G P, A Secure Light Weight Scheme for User Authentication and Key Agreement in Multi-gateway Based Wireless Sensor Networks[EB/OL]. https://www.sciencedirect.com/science/article/abs/pii/S1570870515001274, 2020-12-20. |
[12] | YANG Jincui. Research on Key Technology of Control Security in Internet of Things Environment[D]. Beijing: Beijing University of Posts and Telecommunications, 2013. |
杨金翠. 物联网环境下的控制安全关键技术研究[D]. 北京:北京邮电大学, 2013. | |
[13] | ARMANDO A, BASIN D, BOICHUT Y, et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications[C]// Springer. International Conference on Computer Aided Verification, July 6-10, 2005, Edinburgh, United Kingdom. Heidelberg: Springer, 2005: 281-285. |
[14] | LEE H, KANG D, RYU J, et al. A Three-factor Anonymous User Authentication Scheme for Internet of Things Environments[EB/OL]. https://www.sciencedirect.com/science/article/pii/S2214212619308051, 2020-12-22. |
[15] |
ALZAHRANI B A, CHAUDHRY S A, BARNAWI A, et al. ILAS-IoT: An Improved and Lightweight Authentication Scheme for IoT Deployment[J]. Journal of Ambient Intelligence and Humanized Computing, 2020: 12(6):1-13.
doi: 10.1007/s12652-020-02846-7 URL |
[16] |
SHIM K A. BASIS: A Practical Multi-user Broadcast Authentication Scheme in Wireless Sensor Networks[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(7):1545-1554.
doi: 10.1109/TIFS.2017.2668062 URL |
[17] | LI Xiong, IBRAHIM M H, KUMARI S, et al. Anonymous Mutual Authentication and Key Agreement Scheme for Wearable Sensors in Wireless Body Area Networks[EB/OL]. https://www.sciencedirect.com/science/article/abs/pii/S1389128617301044, 2020-12-24. |
[18] | LIU Xin. Research on Authentication Scheme for Wireless Sensor Networks[D]. Lanzhou: Lanzhou University, 2019. |
刘忻. 基于无线传感器网络的身份认证协议的研究[D]. 兰州:兰州大学, 2019. |
[1] | 刘忻, 郭振斌, 宋宇宸. 一种基于SGX的工业物联网身份认证协议[J]. 信息网络安全, 2021, 21(6): 1-10. |
[2] | 王利, 李二霞, 纪宇晨, 李小勇. 基于PUF的抗物理克隆RFID安全认证协议[J]. 信息网络安全, 2020, 20(8): 89-97. |
[3] | 孙子文, 张向阳. 大规模移动RFID系统Shamir’s密钥共享PUF安全认证协议[J]. 信息网络安全, 2020, 20(6): 26-35. |
[4] | 韦永霜, 陈建华, 韦永美. 基于椭圆曲线密码的RFID/NFC安全认证协议[J]. 信息网络安全, 2019, 19(12): 64-71. |
[5] | 郝文江, 宋斐, 万月亮. 可穿戴单警装备安全认证协议研究[J]. 信息网络安全, 2018, 18(9): 25-29. |
[6] | 陈亚楠, 梅倩, 熊虎, 徐维祥. 适用于工业物联网的无证书并行密钥隔离签名[J]. 信息网络安全, 2018, 18(10): 1-9. |
[7] | 张小红, 郭焰辉. 基于椭圆曲线密码的RFID系统安全认证协议研究[J]. 信息网络安全, 2018, 18(10): 51-61. |
[8] | 段然, 徐乃阳, 胡爱群. 基于形式化分析工具的认证协议安全性研究[J]. 信息网络安全, 2015, 15(7): 71-76. |
[9] | 仇各各, 汪学明, 张言胜. 基于HECC的WSN身份认证协议研究[J]. 信息网络安全, 2015, 26(12): 54-58. |
[10] | . 轻量级RFID双向通信认证协议优化方案[J]. , 2014, 14(2): 58-. |
[11] | 夏戈明;史立哲;周文;沈恒丰. 轻量级RFID双向通信认证协议优化方案[J]. , 2014, 14(2): 0-0. |
[12] | 张璐;徐燕红;张浩;田伟. 基于秘密共享的安全云存储方案[J]. , 2013, 13(4): 0-0. |
[13] | 蒋天发;王维虎;蒋巍. 基于TCP/IP应用层密码认证协议的研究[J]. , 2011, 11(5): 0-0. |
[14] | 王琼;孙瑞冰;王良民;万可. 基于EPC物联网的公安数据通信安全认证协议研究[J]. , 2011, 11(12): 0-0. |
[15] | 陈宇;王晋东. 无线传感网身份认证协议研究[J]. , 2011, 11(12): 0-0. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||