Context-Aware Authentication: State-of-the-Art Evaluation and Adaption to the IIoT

被引:0
作者
Loske, Moritz [1 ]
Rothe, Lukas [1 ]
Gertler, Dominik G. [2 ]
机构
[1] Fraunhofer IIS, Nurnberg, Germany
[2] Ostbayer Tech Hsch Amberg Weiden, Weiden, Germany
来源
2019 IEEE 5TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT) | 2019年
关键词
context-awareness; authentication; security; M2M communication; industrial IoT; Industry; 4.0; Smart Logistics; SECURITY;
D O I
10.1109/wf-iot.2019.8767327
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Authentication is an important and non-trivial topic for the security of the tremendously growing industrial Internet of Things. Classical authentication methods often do not meet the requirements of IoT networks, where computing power and bandwidth are usually constrained. This overview paper therefore turns its attention to context-aware authentication, a method that uses features of a shared or otherwise known context to mutually authenticate devices. First the idea of context-aware authentication and the state of the art in research is introduced. The work done so far is then evaluated, with a focus on the examined context features and authentication mechanisms. Afterwards it is discussed how context-awareness can be transferred from user-centric towards machine-to-machine authentication in the industrial IoT. The specific requirements are discussed together with use-cases for Smart Logistics and Industry 4.0.
引用
收藏
页码:64 / 69
页数:6
相关论文
共 37 条
[11]  
Grassi PA., 2017, NIST Spec Publ, V800, P63
[12]  
Gu Z., 2016, 12 INT C COMP INT SE
[13]  
Habib K., 2015, 11 INT C AUT AUT SYS
[14]  
Halevi Tzipora, 2012, Computer Security - ESORICS 2012. Proceedings 17th European Symposium on Research in Computer Security, P379, DOI 10.1007/978-3-642-33167-1_22
[15]   Context-Aware Defenses to RFID Unauthorized Reading and Relay Attacks [J].
Halevi, Tzipora ;
Li, Haoyu ;
Ma, Di ;
Saxena, Nitesh ;
Voris, Jonathan ;
Xiang, Tuo .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2013, 1 (02) :307-318
[16]  
Han JH, 2017, PALGR STUD TEACH LEA, P73, DOI 10.1057/978-1-137-59840-0_5
[17]   Do You Peel What I Hear? Enabling Autonomous IoT Device Pairing using Different Sensor Types [J].
Han, Jun ;
Chung, Albert Jin ;
Sinha, Manal Kumar ;
Harishankar, Madhumitha ;
Pan, Shijia ;
Noh, Hae Young ;
Zhang, Pei ;
Tague, Patrick .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, :836-852
[18]   Using contextual co-presence to strengthen Zero-Interaction Authentication: Design, integration and usability [J].
Hien Thi Thu Truong ;
Gao, Xiang ;
Shrestha, Babins ;
Saxena, Nitesh ;
Asokan, N. ;
Nurmi, Petteri .
PERVASIVE AND MOBILE COMPUTING, 2015, 16 :187-204
[19]  
IBM Institute for Business Value, 2018, INT THREATS SEC INT
[20]  
Kalamandeen Andre., 2010, Proc. of MobiSys '10, P331, DOI DOI 10.1145/1814433.1814466