Context-Aware Authentication: State-of-the-Art Evaluation and Adaption to the IIoT

被引:0
作者
Loske, Moritz [1 ]
Rothe, Lukas [1 ]
Gertler, Dominik G. [2 ]
机构
[1] Fraunhofer IIS, Nurnberg, Germany
[2] Ostbayer Tech Hsch Amberg Weiden, Weiden, Germany
来源
2019 IEEE 5TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT) | 2019年
关键词
context-awareness; authentication; security; M2M communication; industrial IoT; Industry; 4.0; Smart Logistics; SECURITY;
D O I
10.1109/wf-iot.2019.8767327
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Authentication is an important and non-trivial topic for the security of the tremendously growing industrial Internet of Things. Classical authentication methods often do not meet the requirements of IoT networks, where computing power and bandwidth are usually constrained. This overview paper therefore turns its attention to context-aware authentication, a method that uses features of a shared or otherwise known context to mutually authenticate devices. First the idea of context-aware authentication and the state of the art in research is introduced. The work done so far is then evaluated, with a focus on the examined context features and authentication mechanisms. Afterwards it is discussed how context-awareness can be transferred from user-centric towards machine-to-machine authentication in the industrial IoT. The specific requirements are discussed together with use-cases for Smart Logistics and Industry 4.0.
引用
收藏
页码:64 / 69
页数:6
相关论文
共 37 条
[1]  
[Anonymous], 2007 IEEE WORKSH AUT
[2]  
[Anonymous], 2011, Em: Proceedings of the 9th international conference on Mobile systems, applications, and services - MobiSys, DOI [DOI 10.1145/1999995.2000010, 10.1145/1999995.2000010]
[3]  
[Anonymous], 2011, P 9 INT C MOB SYST A, DOI DOI 10.1145/1999995.2000016
[4]  
[Anonymous], SECURITY COMMUNICATI
[5]  
[Anonymous], 2013, P 2013 ACM SIGSAC C, DOI DOI 10.1145/2508859.2516658
[6]  
Burr W.E., 2011, ELECT AUTHENTICATION
[7]  
Conti M., 2018, SURVEY CONTEXT BASED
[8]  
Fomichev M., PERILS ZERO INTERACT
[9]   Survey and Systematization of Secure Device Pairing [J].
Fomichev, Mikhail ;
Alvarez, Flor ;
Steinmetzer, Daniel ;
Gardner-Stephen, Paul ;
Hollick, Matthias .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (01) :517-550
[10]   A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks [J].
Gope, Prosanta ;
Hwang, Tzonelih .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2016, 63 (11) :7124-7132