A mutual authentication scheme with key agreement for industrial wireless network

Due to the increasing flexibility and the mobility, wireless security communication in the industrial control field is a challenging. In this paper, we propose one approach of security mutual authentication scheme with key agreement for WIA-PA networks, which is significant to security provisioning in industry wireless network with resource limitations. Then we implements the new node security join the network and communication to enhance the capacity of preventing the attacks. Based upon the provision concept, the proposed scheme does not require public keys for users such that the additional computations for certificates can be reduced. Finally, our test results show these security methods may be used in the field environment to realize the security reliability of the wireless industrial network communication.

[1]  Mihir Bellare,et al.  GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks , 2002, CRYPTO.

[2]  Wang Hong,et al.  Real-time communication in WIA-PA industrial wireless networks , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[3]  Yanjiang Yang,et al.  Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks , 2008, 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference.

[4]  Jing Dong,et al.  Toward secure network coding in wireless networks: Threats and challenges , 2008, 2008 4th Workshop on Secure Network Protocols.

[5]  Mikael Gidlund,et al.  Integration of WirelessHART networks in Distributed Control Systems using PROFINET IO , 2010, 2010 8th IEEE International Conference on Industrial Informatics.

[6]  Shudong Jin,et al.  LEAP: Localized Energy-Aware Prediction for data collection in wireless sensor networks , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[7]  Yu Liu,et al.  A New Security Scheme for Wireless Sensor Networks , 2011 .

[8]  Vijay Varadharajan,et al.  A New Security Scheme for Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[9]  Yongsuk Park,et al.  Security Architecture for IEEE 802.15.4-based Wireless Sensor Network , 2009, 2009 4th International Symposium on Wireless Pervasive Computing.

[10]  D. Meintanis,et al.  On the Power Consumption of Security Algorithms Employed in Wireless Networks , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.