2020
DOI: 10.3390/app10061962
|View full text |Cite
|
Sign up to set email alerts
|

Towards Secure and Usable Certificate-Based Authentication System Using a Secondary Device for an Industrial Internet of Things

Abstract: As the number of controllers and devices increases in Industrial Internet of Things (IIoT) applications, it is essential to provide a secure and usable user authentication system for human operators who have to manage tens or hundreds of controllers and devices with his/her password. In this paper, we propose a formally verified certificate-based authentication system using a secondary network device for such IIoT applications. In the proposed system, a user’s sign key is encrypted with a secret key that can b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…The performance results of the proposed architecture during the simulation are then compared with other authentication mechanisms that do not use distributed networks or blockchain technology. These authentication mechanisms use a third-party, cloud-based authentication discussed in [49,50] and use centralized authentication servers as presented in [51,52] that apply a certificate-based solution to establish authentication between user devices with restricted resources.…”
Section: Performance and Security Evaluationmentioning
confidence: 99%
“…The performance results of the proposed architecture during the simulation are then compared with other authentication mechanisms that do not use distributed networks or blockchain technology. These authentication mechanisms use a third-party, cloud-based authentication discussed in [49,50] and use centralized authentication servers as presented in [51,52] that apply a certificate-based solution to establish authentication between user devices with restricted resources.…”
Section: Performance and Security Evaluationmentioning
confidence: 99%
“…SSL encrypts data as it is sent between a web browser and a server. SSL [ 47 ] encrypts the connection between a web server and a browser using the asymmetric key mechanism, ensuring that all data transmitted between parties remain private and secure. The user details and their monitored data are stored using NoSQL MongoDB.…”
Section: Iomt Integration In Aatmentioning
confidence: 99%
“…For example, in order to verify user's identity in banking application, Hiltgen et al [120] proposed a new certificate-based authentication scheme. is approach has been also used in IoT environment [120][121][122][123][124]. Although certificate-based authentication provides more security, device certificate processing and used algorithms necessitate a high processing resource, which is not always available in IoT devices.…”
Section: Certificate-based Authenticationmentioning
confidence: 99%