In the emerging Industrial Internet of Things(IIoT),authentication problems have become an urgent issue for massive resource-constrained devices because traditional costly security mechanisms are not suitable for them...In the emerging Industrial Internet of Things(IIoT),authentication problems have become an urgent issue for massive resource-constrained devices because traditional costly security mechanisms are not suitable for them.The security protocol designed for resource-constrained systems should not only be secure but also efficient in terms of usage of energy,storage,and processing.Although recently many lightweight schemes have been proposed,to the best of our knowledge,they are unable to address the problem of privacy preservation with the resistance of Denial of Service(DoS)attacks in a practical way.In this paper,we propose a lightweight authentication protocol based on the Physically Unclonable Function(PUF)to overcome the limitations of existing schemes.The protocol provides an ingenious authentication and synchronization mechanism to solve the contradictions amount forward secrecy,DoS attacks,and resource-constrained.The performance analysis and comparison show that the proposed scheme can better improve the authentication security and efficiency for resource-constrained systems in IIoT.展开更多
The Mimic Defense(MD)is an endogenous security technology with the core technique of Dynamic Heterogeneous Redundancy(DHR)architecture.It can effectively resist unknown vulnerabilities,backdoors,and other security thr...The Mimic Defense(MD)is an endogenous security technology with the core technique of Dynamic Heterogeneous Redundancy(DHR)architecture.It can effectively resist unknown vulnerabilities,backdoors,and other security threats by schedule strategy,negative feedback control,and other mechanisms.To solve the problem that Cyber Mimic Defense devices difficulty of supporting the TCP protocol.This paper proposes a TCP protocol normalization scheme for DHR architecture.Theoretical analysis and experimental results show that this scheme can realize the support of DHR-based network devices to TCP protocol without affecting the security of mimicry defense architecture.展开更多
基金This work was supported by China Postdoctoral Science Foundation under Grant Nos.2020M681959 and 2020TQ0291in part by the national key R&D project under Grant No.2018YFB2100401in part by the National Key Research and Development Project No.2018YFB2100400.
文摘In the emerging Industrial Internet of Things(IIoT),authentication problems have become an urgent issue for massive resource-constrained devices because traditional costly security mechanisms are not suitable for them.The security protocol designed for resource-constrained systems should not only be secure but also efficient in terms of usage of energy,storage,and processing.Although recently many lightweight schemes have been proposed,to the best of our knowledge,they are unable to address the problem of privacy preservation with the resistance of Denial of Service(DoS)attacks in a practical way.In this paper,we propose a lightweight authentication protocol based on the Physically Unclonable Function(PUF)to overcome the limitations of existing schemes.The protocol provides an ingenious authentication and synchronization mechanism to solve the contradictions amount forward secrecy,DoS attacks,and resource-constrained.The performance analysis and comparison show that the proposed scheme can better improve the authentication security and efficiency for resource-constrained systems in IIoT.
基金supported by the National Key Research and Development Project of China(Grant No.2020YFB1804600)the Major Scientific Project of Zhejiang Lab(2018FD0ZX01).
文摘The Mimic Defense(MD)is an endogenous security technology with the core technique of Dynamic Heterogeneous Redundancy(DHR)architecture.It can effectively resist unknown vulnerabilities,backdoors,and other security threats by schedule strategy,negative feedback control,and other mechanisms.To solve the problem that Cyber Mimic Defense devices difficulty of supporting the TCP protocol.This paper proposes a TCP protocol normalization scheme for DHR architecture.Theoretical analysis and experimental results show that this scheme can realize the support of DHR-based network devices to TCP protocol without affecting the security of mimicry defense architecture.