Client-Server Based Authentication Against MITM Attack via Fast Communication for IIoT

Client-Server Based Authentication Against MITM Attack via Fast Communication for IIoT

Security is an important issue that should be taken care of by every system. In recent years, however, attackers are constantly developing themselves with new techniques to obtain personal information on the network. As systems evolve, the data that needs to be protected is increasingly appreciated and carries a higher risk of attack. As with many attacks such as MITM, there are solutions against this attacks. Nevertheless, these safety measures must be developed continuously. For this reason, we have developed a new system architecture with user-defined authentication against the intruders for the systems having large amount of data transmission rate. To maintain integrity of data, over a reliable system is that all incoming data are authenticated when data send to the server, on the other hand, in this system, the user-defined authentication can provide fast communication and it can decrease authentication time. The proposed system introduced in the present study checks for any changes in our instantaneous data. Moreover, we control the data integrity on simple devices such as sensors and motors or other industrial devices. Instead of using encryption, basically client-server based authentication system is used to avoid complex operations and protect the big data.

___

  • K. Hewage, S. Raza, and T. Voigt, “An experimental study of attacks on the availability of glossy”. Computers & Electrical Engineering, V.41, 2015, pp. 115-125.
  • B. Daya, “Network security: History importance and future”, http://web.mit.edu/~bdaya/www/Network%20Security.pdf
  • S. Parveen and C. Sharma. “A Survey: Intelligent Intrusion Detection System in Computer Security”, International Journal of Computer Applications, Vol.151, No.3, 2016, pp.18-22.
  • K. Nesreen, N. Hamdy and S. H. Ahmed, “A Proposed Intrusion Detection System for Encrypted Computer Networks”, Third International Conference on Informatics and Systems, Giza, Egypt, 2005.
  • K. A. Varunkumar, M. Prabakaran, A. Kaurav, S. S. Chakkaravarthy, S. Thiyagarajan, P. Venkatesh. “Various Database Attacks and its Prevention Techniques”, International Journal of Engineering Trends and Technology, Vol. 9, No. 11, 2014, pp. 532-536.
  • C. Shire. “Advanced mobile security in silicon”. Secure Mobile Communications Forum: Exploring the Technical Challenges in Secure GSM and WLAN. The 2nd IEE, London, UK , 2004.
  • H. Jadidoleslamy. “Weaknesses, Vulnerabilities and Elusion Strategies Against Intrusion Detection Systems”, International Journal of Computer Science and Engineering Survey, Vol. 3, No. 4, 2012, pp. 15-25.
  • R. Robbins. “Distributed intrusion detection systems: An introduction and review”, SANS Reading Room, GSEC Practical Assignment, 2002.
  • N. Einwechter. “An Introduction to Distributed Intrusion Detection Systems”, 2002, https://www.symantec.com/connect/articles/introduction-distributed-intrusion-detection-systems
  • K. T. Nguyen, M. Laurent, and N. Oualha. “Survey on secure communication protocols for the Internet of Things”, Ad Hoc Networks Vol. 32, 2015, pp. 17-31.
  • D. Wang, Y. Jiang, H. Song, F. He, M. Gu and J. Sun. “Verification of implementations of cryptographic hash functions”, IEEE Access, V. 5, 2017, pp. 7816 - 7825.
  • Advantages and Disadvantages of Asymmetric and Symmetric Cryptosystems, www.uobabylon.edu.iq/eprints/paper_1_2264_649.pdf
  • M. Vigil, J. Buchmann, D. Cabarcas, C. Weinert and A. Wiesmaier. “Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey”. Computers & Security, Vol. 50, 2015, pp. 16-32.
  • J. Jang-Jaccard and S. Nepal. “A survey of emerging threats in cybersecurity”. Journal of Computer and System Sciences, Vol. 80, Issue. 5, 2014, pp. 973-993.
  • K. Zetter. “Inside the cunning, unprecedented hack of Ukraine’s power grid”, 2016, https://www.wired.com/2016/03/inside-cunning-unprecedented-hack -ukraines-power-grid.
  • Thuc, N. D., Phu N.C., Bao T.N., Hai V.T. “A Sofware Solution for Defending Against Man-in-the-Middle Attacks on Wlan”. Department of Electronic Engineering and Information Sciences, RuhrUniversity Bochum, Germany, 2015.
  • A. Mittal, A. K. Shrivastava and M. Manoria. “A review of DDoS attack and its countermeasures in TCP based networks”, International Journal of Computer Science & Engineering Survey (IJCSES), Vol. 2, No. 4, 2011, pp. 177-187.
  • TAN, Shuaishuai; LI, Xiaoping; DONG, Qingkuan. TrustR. “An integrated router security framework for protecting computer networks”. IEEE Communications Letters, 2016, 20.2: 376-379, 2016.
  • S. R. Borhade and S. A. Kahate. “Intrusion Detection System based on Hashing Technique”. Global Journal of Engineering Science and Researches, Vol. 3, No. 6, 2016, pp. 31-34.