Abstract
In recently years, intelligent manufacturing system is getting grown up. There are many manufacturing vendors that investigate to develop their intelligent manufacturing systems in their product line. Our government also promotes some cities of mid Taiwan to become intelligent cities in the future. However, we discover that there are no such stand cryptography modules or security modules in these systems and there are a lot of papers that indicated security problems in intelligent manufacturing system. When a legimate user attempts to login an intelligent manufacturing system, an attacker may pretend as a legal server to perform mutual authentication with this user. On one hand, the server also faced the same problem. That is called the men-in-the-middle problem. On the other hand, an attacker may lunch software to capture some users’ login passwords. If a user’s login password does not to be protected by security mechanisms of the intelligent manufacturing system, the attacker may login this system with captured passwords successfully and fetch secret data in advance. Besides, there are no such provable user authentication schemes for the intelligent manufacturing system in random oracle model. Due to above problems, we proposed a secure user authentication scheme for intelligent manufacturing system. Not only this scheme does not store each user’s password in its database table, but also each user can change his/her own password after logging in successfully. Finally, we also give formal security proof in the random oracle model of the full version of this paper.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.