A Lightweight Cross-Domain Authentication Protocol for Trusted Access to Industrial Internet

A Lightweight Cross-Domain Authentication Protocol for Trusted Access to Industrial Internet

Tiantian Zhang, Zhiyong Zhang, Kejing Zhao, Brij B. Gupta, Varsha Arya
Copyright: © 2023 |Volume: 19 |Issue: 1 |Pages: 25
ISSN: 1552-6283|EISSN: 1552-6291|EISBN13: 9781668479094|DOI: 10.4018/IJSWIS.333481
Cite Article Cite Article

MLA

Zhang, Tiantian, et al. "A Lightweight Cross-Domain Authentication Protocol for Trusted Access to Industrial Internet." IJSWIS vol.19, no.1 2023: pp.1-25. http://doi.org/10.4018/IJSWIS.333481

APA

Zhang, T., Zhang, Z., Zhao, K., Gupta, B. B., & Arya, V. (2023). A Lightweight Cross-Domain Authentication Protocol for Trusted Access to Industrial Internet. International Journal on Semantic Web and Information Systems (IJSWIS), 19(1), 1-25. http://doi.org/10.4018/IJSWIS.333481

Chicago

Zhang, Tiantian, et al. "A Lightweight Cross-Domain Authentication Protocol for Trusted Access to Industrial Internet," International Journal on Semantic Web and Information Systems (IJSWIS) 19, no.1: 1-25. http://doi.org/10.4018/IJSWIS.333481

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This paper proposes a hierarchical framework for industrial Internet device authentication and trusted access as well as a mechanism for industrial security state perception, and designs a cross-domain authentication scheme for devices on this basis. The scheme obtains hardware device platform configuration register (PCR) values and platform integrity measure through periodic perception, completes device identity identification and integrity measure verification when device accessing and data transmission requesting, ensures secure and trustworthy access and interoperation of devices, and designs a cross-domain authentication model for trustworthy access of devices and related security protocols. Through the security analysis, this scheme has good anti-attack abilities, and it can effectively protect against common replay attacks, impersonation attacks, and man-in-the-middle attacks.