• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

ASAP-IIoT:一种用于工业物联网的匿名安全认证协议。

ASAP-IIOT: An Anonymous Secure Authentication Protocol for Industrial Internet of Things.

作者信息

Li Na, Ma Maode, Wang Hui

机构信息

School of Computer Science, Zhejiang Normal University, Jinhua 321000, China.

College of Engineering, Qatar University, Doha P.O. Box 2713, Qatar.

出版信息

Sensors (Basel). 2024 Feb 15;24(4):1243. doi: 10.3390/s24041243.

DOI:10.3390/s24041243
PMID:38400400
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10892329/
Abstract

With the increasing demand for a digital world, the Industrial Internet of Things (IIoT) is growing rapidly across various industries. In manufacturing, particularly in Industry 4.0, the IIoT assumes a vital role. It encompasses many devices such as sensing devices, application servers, users, and authentication servers within workshop settings. The security of the IIoT is a critical issue due to wireless networks' open and dynamic nature. Therefore, designing secure protocols among those devices is an essential aspect of IIoT security functionality and poses a significant challenge to the IIoT systems. In this paper, we propose a lightweight anonymous authentication protocol to preserve privacy for IIoT users, enabling secure IIoT communication. The protocol has been validated to demonstrate its comprehensive ability to overcome various vulnerabilities and prevent malicious attacks. Finally, the performance evaluation confirms that the proposed protocol is more effective and efficient than the existing alternatives.

摘要

随着对数字世界需求的不断增加,工业物联网(IIoT)正在各个行业迅速发展。在制造业中,特别是在工业4.0领域,工业物联网发挥着至关重要的作用。它涵盖了车间环境中的许多设备,如传感设备、应用服务器、用户和认证服务器。由于无线网络的开放性和动态性,工业物联网的安全是一个关键问题。因此,在这些设备之间设计安全协议是工业物联网安全功能的一个重要方面,对工业物联网系统构成了重大挑战。在本文中,我们提出了一种轻量级匿名认证协议,以保护工业物联网用户的隐私,实现安全的工业物联网通信。该协议已经经过验证,以证明其克服各种漏洞和防止恶意攻击的综合能力。最后,性能评估证实,所提出的协议比现有替代方案更有效、更高效。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1764/10892329/5264fa9a5a24/sensors-24-01243-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1764/10892329/9aa0b50580f7/sensors-24-01243-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1764/10892329/fcb860d80237/sensors-24-01243-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1764/10892329/5e44ab6cfaea/sensors-24-01243-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1764/10892329/1569a1c7eca6/sensors-24-01243-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1764/10892329/3e3c3762d442/sensors-24-01243-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1764/10892329/4b1207aba1c2/sensors-24-01243-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1764/10892329/5deaa5b2e1ae/sensors-24-01243-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1764/10892329/98c769ed88e7/sensors-24-01243-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1764/10892329/a50069f174ff/sensors-24-01243-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1764/10892329/5264fa9a5a24/sensors-24-01243-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1764/10892329/9aa0b50580f7/sensors-24-01243-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1764/10892329/fcb860d80237/sensors-24-01243-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1764/10892329/5e44ab6cfaea/sensors-24-01243-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1764/10892329/1569a1c7eca6/sensors-24-01243-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1764/10892329/3e3c3762d442/sensors-24-01243-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1764/10892329/4b1207aba1c2/sensors-24-01243-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1764/10892329/5deaa5b2e1ae/sensors-24-01243-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1764/10892329/98c769ed88e7/sensors-24-01243-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1764/10892329/a50069f174ff/sensors-24-01243-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1764/10892329/5264fa9a5a24/sensors-24-01243-g010.jpg

相似文献

1
ASAP-IIOT: An Anonymous Secure Authentication Protocol for Industrial Internet of Things.ASAP-IIoT:一种用于工业物联网的匿名安全认证协议。
Sensors (Basel). 2024 Feb 15;24(4):1243. doi: 10.3390/s24041243.
2
Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things.基于椭圆曲线密码学的工业物联网实用三因素认证协议
Sensors (Basel). 2022 Oct 3;22(19):7510. doi: 10.3390/s22197510.
3
Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things.面向工业物联网资源受限设备的机器对机器通信的轻量级认证协议。
Sensors (Basel). 2020 Jan 16;20(2):501. doi: 10.3390/s20020501.
4
MAKE-IT-A Lightweight Mutual Authentication and Key Exchange Protocol for Industrial Internet of Things.MAKE-IT:一种用于工业物联网的轻量级相互认证与密钥交换协议
Sensors (Basel). 2020 Sep 10;20(18):5166. doi: 10.3390/s20185166.
5
A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks.面向 5G 网络的工业物联网设备安全在线指纹认证系统。
Sensors (Basel). 2022 Oct 7;22(19):7609. doi: 10.3390/s22197609.
6
Blockchain and PUF-based secure key establishment protocol for cross-domain digital twins in industrial Internet of Things architecture.工业物联网架构中基于区块链和物理不可克隆函数的跨域数字孪生安全密钥建立协议
J Adv Res. 2024 Aug;62:155-163. doi: 10.1016/j.jare.2023.09.017. Epub 2023 Sep 29.
7
WSNEAP: An Efficient Authentication Protocol for IIoT-Oriented Wireless Sensor Networks.WSNEAP:面向工业物联网的无线传感器网络的高效认证协议。
Sensors (Basel). 2022 Sep 29;22(19):7413. doi: 10.3390/s22197413.
8
Lightweight Authentication Mechanism for Industrial IoT Environment Combining Elliptic Curve Cryptography and Trusted Token.结合椭圆曲线密码学和可信令牌的工业物联网环境轻量级认证机制。
Sensors (Basel). 2023 May 22;23(10):4970. doi: 10.3390/s23104970.
9
A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks.一种增强 IIoT 隐私和计算能力的新型 QKD 方法。
Sensors (Basel). 2022 Sep 6;22(18):6741. doi: 10.3390/s22186741.
10
Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications.重新审视物联网通信中公钥密码学的可行性。
Sensors (Basel). 2022 Mar 27;22(7):2561. doi: 10.3390/s22072561.

引用本文的文献

1
Cybersecurity Solutions for Industrial Internet of Things-Edge Computing Integration: Challenges, Threats, and Future Directions.工业物联网与边缘计算集成的网络安全解决方案:挑战、威胁与未来方向
Sensors (Basel). 2025 Jan 2;25(1):213. doi: 10.3390/s25010213.