2018
DOI: 10.22619/ijcsa.2018.100122
|View full text |Cite
|
Sign up to set email alerts
|

Putting Things in Context: Securing Industrial Authentication with Context Information

Abstract: The development in the area of wireless communication, mobile and embedded computing leads to significant changes in the application of devices. Over the last years, embedded devices were brought into the consumer area creating the Internet of Things. Furthermore, industrial applications increasingly rely on communication through trust boundaries. Networking is cheap and easily applicable while providing the possibility to make everyday life more easy and comfortable and industry more efficient and less time-c… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 29 publications
0
5
0
Order By: Relevance
“…Deployability. Prior work on context sensitivity for cryptographic operations [6,14,43,[60][61][62]66] has not been deployed in practice due to its reliance on specific hardware to provide security properties or non-standard adversarial models. Therefore, we aim to use existing devices to build the context: namely, the IoT devices of the user's smart home.…”
Section: Design Goalsmentioning
confidence: 99%
See 2 more Smart Citations
“…Deployability. Prior work on context sensitivity for cryptographic operations [6,14,43,[60][61][62]66] has not been deployed in practice due to its reliance on specific hardware to provide security properties or non-standard adversarial models. Therefore, we aim to use existing devices to build the context: namely, the IoT devices of the user's smart home.…”
Section: Design Goalsmentioning
confidence: 99%
“…Certain works employ IoT-specific characteristics for user authentication; in particular, [16,21,59] use wearable IoT devices as a second-factor for authentication. Anton et al [6] propose context authentication for industrial IoT systems. Location-sensitive cryptography.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The group of Anton et al addresses with several publications the security of industrial IoT and SCADA environments [151]- [153]. In [151], the authors focus on including context information in the authentication mechanism RADIUS.…”
Section: ) ''Putting Things In Context: Securing Industrial Authentication With Context Information'' [151]mentioning
confidence: 99%
“…The group of Anton et al addresses with several publications the security of industrial IoT and SCADA environments [151]- [153]. In [151], the authors focus on including context information in the authentication mechanism RADIUS. They use a simple scheme of location, access time, and the criticality of the action that shall be authorized (i.e.…”
Section: ) ''Putting Things In Context: Securing Industrial Authentication With Context Information'' [151]mentioning
confidence: 99%