2022
DOI: 10.1109/jiot.2022.3188711
|View full text |Cite
|
Sign up to set email alerts
|

REAP-IIoT: Resource-Efficient Authentication Protocol for the Industrial Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(31 citation statements)
references
References 42 publications
0
31
0
Order By: Relevance
“…The security of this framework is demonstrated through Scyther and ROM. Similarly, an authenticated encryption and hash function-based AKA scheme is proposed in [2,13] for smart home and IIoT environments, with its security verified using ROM and Scyther. Lastly, an AKA scheme based on hyper-ECC is proposed in [14] for the Internet of drones environment.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The security of this framework is demonstrated through Scyther and ROM. Similarly, an authenticated encryption and hash function-based AKA scheme is proposed in [2,13] for smart home and IIoT environments, with its security verified using ROM and Scyther. Lastly, an AKA scheme based on hyper-ECC is proposed in [14] for the Internet of drones environment.…”
Section: Related Workmentioning
confidence: 99%
“…By following the encryption process outlined in Equation ( 11), the credentials, namely Ct l 1 , Ct l 2 , and Ct l 3, can be obtained using P l 1 = ID U x , P l 2 = PW U x , and P l 3 = γ l 1 as the input parameters. To authenticate the user's secret credentials locally, the verification parameter is computed in Equation ( 12) and validated in Equation (13). If the condition in Equation ( 13) is satisfied, SMDU x /U x derives the parameters from TID x , TID GW y , TID SN z , and Ct 3 as indicated in Equations ( 14) and (15).…”
Section: 31mentioning
confidence: 99%
“…RSA and hashing are also used by researchers to provide a secure framework for Industrial IoT (IIoT). Authors [9] proposed resource efficient authentication protocol for IIoT. Lightweight Cryptography (LWC) along with hashing is used to authenticate IIoT devices and secure communication to mitigate man-in-the-middle & replay attacks.…”
Section: Security In Internet Of Things: Related Workmentioning
confidence: 99%
“…72 Thus, Scyther tool has been incorporated to identify unreported weaknesses in IKEv1 and IKEv2, 74 unfold incorrect claims in ISO/IEC 11770-2:2008 and ISO/IEC 11770-3:2008, 75 and illustrate security attacks in ISO/IEC 9798 family. 76 Recently, Scyther tool has been utilized to analyze the security of authentication protocols designed for the Internet of Things, [77][78][79][80][81] 5th generation, [82][83][84][85][86] and wireless sensor network [87][88][89][90][91] architecture.…”
Section: Security Verification Using Scyther Toolmentioning
confidence: 99%