Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (1)

Search Parameters:
Keywords = fiber channel certificate authentication protocol (FCAP)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
16 pages, 407 KiB  
Article
A Secure Protocol Authentication Method Based on the Strand Space Model for Blockchain-Based Industrial Internet of Things
by Huanhuan Gu, Jing Shang, Pengchuan Wang, Jingfeng Mi and Aniruddha Bhattacharjya
Symmetry 2024, 16(7), 851; https://doi.org/10.3390/sym16070851 - 5 Jul 2024
Cited by 2 | Viewed by 1062
Abstract
The rapid development of the Industrial Internet of Things (IIoT) and its application across various sectors has led to increased interconnectivity and data sharing between devices and sensors. While this has brought convenience to users, it has also raised concerns about information security, [...] Read more.
The rapid development of the Industrial Internet of Things (IIoT) and its application across various sectors has led to increased interconnectivity and data sharing between devices and sensors. While this has brought convenience to users, it has also raised concerns about information security, including data security and identity authentication. IIoT devices are particularly vulnerable to attacks due to their lack of robust key management systems, efficient authentication processes, high fault tolerance, and other issues. To address these challenges, technologies such as blockchain and the formal analysis of security protocols can be utilized. And blockchain-based Industrial Internet of Things (BIIoT) is the new direction. These technologies leverage the strengths of cryptography and logical reasoning to provide secure data communication and ensure reliable identity authentication and verification, thereby becoming a crucial support for maintaining the security of the Industrial Internet. In this paper, based on the theory of the strand space attack model, we improved the Fiber Channel Password Authentication Protocol (FACP) security protocol in the network environment based on symmetric cryptography and asymmetric cryptography. Specifically, in view of the problem that the challenge value cannot reach a consensus under the symmetric cryptography system, and the subject identity cannot reach a consensus under the asymmetric cryptography system, an improved protocol is designed and implemented to meet the authentication requirements, and the corresponding attack examples are shown. Finally, the effectiveness and security of the protocol were verified by simulating different networking environments. The improved protocol has shown an increase in efficiency compared with the original protocol across three different network configurations. There was a 6.43% increase in efficiency when centralized devices were connected to centralized devices, a 5.81% increase in efficiency when centralized devices were connected to distributed devices, and a 6.32% increase in efficiency when distributed devices were connected to distributed devices. Experimental results show that this protocol can enhance the security and efficiency of communication between devices and between devices and nodes (servers, disks) in commonly used Ethernet passive optical network (EPON) environments without affecting the identity authentication function. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

Figure 1
<p>Certification flow chart of FCAP protocol.</p>
Full article ">Figure 2
<p>Test method of the out-test.</p>
Full article ">Figure 3
<p>Test method of the in-test.</p>
Full article ">Figure 4
<p>Advanced strand space model under a symmetric cryptosystem.</p>
Full article ">Figure 5
<p>Advanced FCAP strand space model under asymmetric cryptosystems.</p>
Full article ">Figure 6
<p>The virtual network diagram on a PC (centralized to centralized).</p>
Full article ">Figure 7
<p>The virtual network diagram on a PC (centralized to distributed).</p>
Full article ">Figure 8
<p>The virtual network diagram on a PC (distributed to distributed).</p>
Full article ">
Back to TopTop