A secure user authentication method in networked intelligent manufacturing systems

Yuseung Sohn, Misung Cho, Giwon On, Kijoon Chae

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

In this paper, we propose a secure user authentication method for a networked manufacturing system, which is a system framework of computer-aided solutions to support the manufacturing industry, in particular the automobile and shipbuilding sector. The proposed authentication method called as CRI-TMT is based on a Challenge-Response Identification scheme using a Time-variant Mapping Table. The proposed CRI-TMT can prevent a user's secret from key-log or over-the-shoulder attack. Also a user's secret data is not stored on the verifier's side. Thus, a user's secret data is not disclosed even though attackers break into the authentication server. Through an analytical study, we show that the gain of the attackers who have users secret-related data by observing the verification step is not bigger than that of the blind attackers without any user's secret data. We also show the feasibility and practicality of the CRI-TMT system by a fast implementation.

Original languageEnglish
Title of host publicationProceedings - 2005 International Conference on Cyberworlds, CW 2005
Pages123-129
Number of pages7
StatePublished - 2005
Event2005 International Conference on Cyberworlds, CW 2005 - Singapore, Singapore
Duration: 23 Nov 200525 Nov 2005

Publication series

NameProceedings - 2005 International Conference on Cyberworlds, CW 2005
Volume2005

Conference

Conference2005 International Conference on Cyberworlds, CW 2005
Country/TerritorySingapore
CitySingapore
Period23/11/0525/11/05

Fingerprint

Dive into the research topics of 'A secure user authentication method in networked intelligent manufacturing systems'. Together they form a unique fingerprint.

Cite this