Citation: | Shan Gao, Junjie Chen, Bingsheng Zhang, et al., “A General Authentication and Key Agreement Framework for Industrial Control System,” Chinese Journal of Electronics, vol. x, no. x, pp. 1–18, xxxx doi: 10.23919/cje.2023.00.192 |
[1] |
R. Langner, “Stuxnet: Dissecting a cyberwarfare weapon,” IEEE Security & Privacy Magazine, vol. 9, no. 3, pp. 49–51, 2011. doi: 10.1109/MSP.2011.67
|
[2] |
T. Tsvetanov and S. Slaria, “The effect of the colonial pipeline shutdown on gasoline prices,” Economics Letters, vol. 209 article no. 110122, 2021. doi: 10.1016/j.econlet.2021.110122
|
[3] |
K. Stouffer, J. Falco, and K. Scarfone, “Guide to industrial control systems (ICS) security,” NIST Special Publication, SP 800-82, 2011.
|
[4] |
A. Esfahani, G. Mantas, R. Matischek, et al., “A lightweight authentication mechanism for M2M communications in industrial IoT environment,” IEEE Internet of Things Journal, vol. 6, no. 1, pp. 288–296, 2019. doi: 10.1109/JIOT.2017.2737630
|
[5] |
E. Lara, L. Aguilar, M. A. Sanchez, et al., “Lightweight authentication protocol for M2M communications of resource-constrained devices in industrial internet of things,” Sensors, vol. 20, no. 2, article no. 501, 2020. doi: 10.3390/s20020501
|
[6] |
M. Nakkar, R. AlTawy, and A. Youssef, “Lightweight authentication and key agreement protocol for edge computing applications,” in Proceedings of the IEEE 7th World Forum on Internet of Things (WF-IoT), New Orleans, LA, USA, pp. 415–420, 2021.
|
[7] |
R. Sarabi Miyanaji, S. Jabbehdari, and N. Modiri, “Continuous lightweight authentication according group priority and key agreement for internet of things,” Transactions on Emerging Telecommunications Technologies, vol. 33, no. 7, article no. e4479, 2022. doi: 10.1002/ett.4479
|
[8] |
S. Panda, S. Mondal, and N. Kumar, “Slap: A secure and lightweight authentication protocol for machine-to-machine communication in industry 4.0,” Computers & Electrical Engineering, vol. 98 article no. 107669, 2022. doi: 10.1016/j.compeleceng.2021.107669
|
[9] |
K. Shahzad, M. Alam, N. Javaid, et al., “SF-LAP: Secure M2M communication in IIoT with a single-factor lightweight authentication protocol,” Journal of Sensors, vol. 2022 article no. 1309402, 2022. doi: 10.1155/2022/1309402
|
[10] |
K. H. M. Wong, Y. Zheng, J. N. Cao, et al., “A dynamic user authentication scheme for wireless sensor networks,” in Proceedings of IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC’06), Taichung, China, pp. 1–8, 2006.
|
[11] |
H. R. Tseng, R. H. Jan, and W. Yang, “An improved dynamic user authentication scheme for wireless sensor networks,” in Proceedings of IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, Washington, DC, USA, pp. 986–990, 2007.
|
[12] |
M. L. Das, “Two-factor user authentication in wireless sensor networks,” IEEE transactions on wireless communications, vol. 8, no. 3, pp. 1086–1090, 2009. doi: 10.1109/TWC.2008.080128
|
[13] |
M. K. Khan and K. Alghathbar, “Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks,” Sensors, vol. 10, no. 3, pp. 2450–2459, 2010. doi: 10.3390/s100302450
|
[14] |
B. Vaidya, D. Makrakis, and H. T. Mouftah, “Improved two-factor user authentication in wireless sensor networks,” in Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, Niagara Falls, ON, Canada, pp. 600–606, 2010.
|
[15] |
T. H. Chen and W. K. Shih, “A robust mutual authentication protocol for wireless sensor networks,” ETRI Journal, vol. 32, no. 5, pp. 704–712, 2010. doi: 10.4218/etrij.10.1510.0134
|
[16] |
H. L. Yeh, T. H. Chen, P. C. Liu, et al., “A secured authentication protocol for wireless sensor networks using elliptic curves cryptography,” Sensors, vol. 11, no. 5, pp. 4767–4779, 2011. doi: 10.3390/s110504767
|
[17] |
M. Turkanović, B. Brumen, and M. Hölbl, “A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion,” Ad Hoc Networks, vol. 20 pp. 96–112, 2014. doi: 10.1016/j.adhoc.2014.03.009
|
[18] |
C. C. Chang and H. D. Le, “A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 15, no. 1, pp. 357–366, 2016. doi: 10.1109/TWC.2015.2473165
|
[19] |
R. Amin, S. K. H. Islam, N. Kumar, et al., “An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks,” Journal of Network and Computer Applications, vol. 104 pp. 133–144, 2018. doi: 10.1016/j.jnca.2017.12.012
|
[20] |
C. YWang, D. Wang, Y. Tu, et al., “Understanding node capture attacks in user authentication schemes for wireless sensor networks,” IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 1, pp. 507–523, 2022. doi: 10.1109/TDSC.2020.2974220
|
[21] |
J. Pirayesh, A. Giaretta, M. Conti, et al., “A PLS-HECC-based device authentication and key agreement scheme for smart home networks,” Computer Networks, vol. 216 article no. 109077, 2022. doi: 10.1016/j.comnet.2022.109077
|
[22] |
M. C. Chuang and J. F. Lee, “TEAM: Trust-extended authentication mechanism for vehicular ad hoc networks,” IEEE systems journal, vol. 8, no. 3, pp. 749–758, 2014. doi: 10.1109/JSYST.2012.2231792
|
[23] |
S. Kumari, M. Karuppiah, X. Li, et al., “An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks,” Security and Communication Networks, vol. 9, no. 17, pp. 4255–4271, 2016. doi: 10.1002/sec.1602
|
[24] |
Standard No. GM/T 0003.2-2012:2012, Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves-Part 2: Digital Signature Algorithm, Available at: http://www.gmbz.org.cn/main/viewfile/20180108023346264349.html, 2012-03-21.
|
[25] |
Standard No. GM/T 0003.3-2012:2012, Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves-Part 3: Key Exchange Protocol, Available at: http://www.gmbz.org.cn/main/viewfile/20180108023456003485.html, 2012-03-21.
|
[26] |
M. Abdalla, P. A. Fouque, and D. Pointcheval, “Password-based authenticated key exchange in the three-party setting,” in Proceedings of the 8th International Workshop on Public Key Cryptography, pp. 65–84, 2005. (查阅网上资料,未找到本条文献出版地信息,请确认) .
M. Abdalla, P. A. Fouque, and D. Pointcheval, “Password-based authenticated key exchange in the three-party setting,” in Proceedings of the 8th International Workshop on Public Key Cryptography, pp. 65–84, 2005. (查阅网上资料,未找到本条文献出版地信息,请确认).
|
[27] |
S. Chai, H. T. Yin, B. Xing, et al., “Provably secure and lightweight authentication key agreement scheme for smart meters,” IEEE Transactions on Smart Grid, vol. 14, no. 5, pp. 3816–3827, 2023. doi: 10.1109/TSG.2023.3234000
|
[28] |
L. Gong, R. Needham, and R. Yahalom, “Reasoning about belief in cryptographic protocols,” in Proceedings of 1990 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, pp. 234–248, 1990.
|
[29] |
A. Armando, D. Basin, Y. Boichut, et al., “The AVISPA tool for the automated validation of internet security protocols and applications,” in Proceedings of the 17th International Conference on Computer Aided Verification, Edinburgh, Scotland, UK, pp. 281–285, 2005.
|
[30] |
L. Viganò, “Automated security protocol analysis with the AVISPA tool,” Electronic Notes in Theoretical Computer Science, vol. 155 pp. 61–86, 2006. doi: 10.1016/j.entcs.2005.11.052
|