2023
DOI: 10.1109/tifs.2023.3234873
|View full text |Cite
|
Sign up to set email alerts
|

HMACCE: Establishing Authenticated and Confidential Channel From Historical Data for Industrial Internet of Things

Abstract: Industrial Internet of Things (IIoT) is a new paradigm for building intelligent industrial control systems, and how to establish a secure channel in IIoT for machine-to-machine (M2M) communication is a critical problem because the devices in IIoT suffer from various attacks and may leak confidential information. Traditional authenticated and confidential channel establishment (ACCE) protocols neither apply for resource-constrained IIoT devices nor satisfy leakage resilience. In this paper, we introduce a new s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2024
2024
2025
2025

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(9 citation statements)
references
References 47 publications
0
9
0
Order By: Relevance
“…Some studies opt for mutual authentication protocols to address privacy protection problems [45,70], while others are dependent on highly flawed centralized authentication [78,79]. Others were motivated to have the authentication process in IoT integrated into another practical, real-world system or hardware (such as pollution detection systems [39], digital health solutions [11,35,48], medical devices [34,37], automated monitoring systems [49,54], intelligent transport systems [49], multiple integrated access control systems [32], and the vulnerability of servers in cyber-physical systems [75,76]. Some emerging problems involve addressing cross-domain authentication in IoT devices [12,42,69,70], multi-layered architecture communication [8,69], resource-friendly security mechanisms [36,58,64], and Internet-enabled smart devices [9,27,60].…”
Section: Rq4 What Is the Contribution Of Authentication In Iot System?mentioning
confidence: 99%
See 4 more Smart Citations
“…Some studies opt for mutual authentication protocols to address privacy protection problems [45,70], while others are dependent on highly flawed centralized authentication [78,79]. Others were motivated to have the authentication process in IoT integrated into another practical, real-world system or hardware (such as pollution detection systems [39], digital health solutions [11,35,48], medical devices [34,37], automated monitoring systems [49,54], intelligent transport systems [49], multiple integrated access control systems [32], and the vulnerability of servers in cyber-physical systems [75,76]. Some emerging problems involve addressing cross-domain authentication in IoT devices [12,42,69,70], multi-layered architecture communication [8,69], resource-friendly security mechanisms [36,58,64], and Internet-enabled smart devices [9,27,60].…”
Section: Rq4 What Is the Contribution Of Authentication In Iot System?mentioning
confidence: 99%
“…Studies in [13,[46][47][48][49]76], use an IoT device authentication scheme based on ambient access points, utilizing broadcast message data for authentication and affirming proximity between devices in an ad hoc IoT network. The authors in [50,51], both present a secure, lightweight authentication and key agreement protocol for IoT environments, achieving semantic security and critical properties like anonymity, robust synchronization, and forward security secrecy without using public-key cryptographic primitives.…”
Section: Communicationmentioning
confidence: 99%
See 3 more Smart Citations