Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1968613.1968642acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

A mutual authentication scheme with key agreement for industrial wireless network

Published: 21 February 2011 Publication History

Abstract

Due to the increasing flexibility and the mobility, wireless security communication in the industrial control field is a challenging. In this paper, we propose one approach of security mutual authentication scheme with key agreement for WIA-PA networks, which is significant to security provisioning in industry wireless network with resource limitations. Then we implements the new node security join the network and communication to enhance the capacity of preventing the attacks. Based upon the provision concept, the proposed scheme does not require public keys for users such that the additional computations for certificates can be reduced. Finally, our test results show these security methods may be used in the field environment to realize the security reliability of the wireless industrial network communication.

References

[1]
IEC/PAS 62601: Industrial communication networks-Fieldbus specification-WIA-PA communication network and communication profile
[2]
ISA_100_11a_Draft_D2-2008-09-12. Page(s):164--215
[3]
HCF, WirelessHART Device Specification, HCF_SPEC-290, Revision 1.1. HART Communication Foundation, May 2009
[4]
IEEE Std 802.15.4-2006 Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs). http://www.zigbee.org
[5]
Hongbo, J. and Shudong, J. 2008. LEAP: Localized Energy-Aware Prediction for data collection in wireless sensor networks. Mobile Ad Hoc and Sensor Systems. MASS 2008. 5th IEEE International Conference. 491--496
[6]
Wang, P., Wang, H. and Wang, Q., et al. 2008. The Technology of Wireless Communication for measuring and controlling {M}.Beijing: Publishing house of electronics industry. 2008, 3.19--19 Oct. 2008, 33--38
[7]
Jing, D., Reza, C. and Ruben S., et al. 2008. Secure Network Coding in Wireless Networks: Threats and Challenges. Secure Network Protocols, 2008. NPSec 2008. 4th Workshop on
[8]
ISA_SP100_Security_Draft-Standard_2008-3-29_pub, 31--38
[9]
Dimitrios, M. and Ioannis, P. 2009. On the Power Consumption of security algorithms employed in wireless networks. Consumer Communications and Networking Conference, 2009. CCNC 2009. 6th IEEE. 10--13 Jan. 2009, 1--5
[10]
Yanjiang, Y. and Robert, H. 2008. Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks{C}. Trusted Infrastructure Technologies Conference, 2008. APTC '08. Third Asia-Pacific. 14--17 Oct. 2008, 43--52
[11]
Taeshik, S., Bonhyun, K. and Hyohyun C. 2009. Security Architecture for IEEE 802.15.4-based Wireless Sensor Network. Wireless Pervasive Computing, 2009. ISWPC 2009. 4th International Symposium on. 11--13 Feb. 2009, 1--5
[12]
Junqi Z. and Vijay V. 2008. A New Security Scheme for Wireless Sensor Networks.Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. Nov. 30 2008-Dec. 4, 1--5
[13]
Bellare,M. and Palacio,A.2002. GQ and schnorr identification schemes: proofs of security against impersonation under active and concurrent attacksIC}//YUNGM. Crypto'2002. Berlin: Springer-Verlag, 2002, LNCS 2442, 167--177.
[14]
Akerberg, J., Gidlund, M., Lennvall, T. and Neander, J.; Bjorkman, M. 2010; Integration of WirelessHART networks in Distributed Control Systems using PROFINET IO. Industrial Informatics (INDIN), 2010 8th IEEE International Conference on. 154--159
[15]
Tang Z., Cheng M., Zeng P. and Wang H., Real-time communication in WIA-PA industrial wireless networks. Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on. 9--11 July 2010. 600--605
[16]
Min W., Wang P., et al. 2009. Research and implementation of the Security Strategy for the wireless industry control Network{J}. Chinese Journal of Scientific Instrument. 2009, 30(4):679--681

Cited By

View all
  • (2018)Designing Mutual Authentication Protocols in Industrial Wireless Network2018 1st International Conference on Data Intelligence and Security (ICDIS)10.1109/ICDIS.2018.00033(153-158)Online publication date: Apr-2018
  • (2016)A lightweight authentication mechanism in MIP networksSecurity and Communication Networks10.1002/sec.16059:17(4272-4284)Online publication date: 25-Nov-2016

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ICUIMC '11: Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
February 2011
959 pages
ISBN:9781450305716
DOI:10.1145/1968613
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 February 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. WIA-PA network
  2. authentication
  3. industry wireless
  4. key
  5. security

Qualifiers

  • Research-article

Conference

ICUIMC '11
Sponsor:

Acceptance Rates

ICUIMC '11 Paper Acceptance Rate 135 of 534 submissions, 25%;
Overall Acceptance Rate 251 of 941 submissions, 27%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2018)Designing Mutual Authentication Protocols in Industrial Wireless Network2018 1st International Conference on Data Intelligence and Security (ICDIS)10.1109/ICDIS.2018.00033(153-158)Online publication date: Apr-2018
  • (2016)A lightweight authentication mechanism in MIP networksSecurity and Communication Networks10.1002/sec.16059:17(4272-4284)Online publication date: 25-Nov-2016

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media