By Topic

A secure user authentication method in networked intelligent manufacturing systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Yuseung Sohn ; Dept. of Inf. Assurance, Inst. for Graphic Interfaces, Seoul ; Misung Cho ; Giwon On ; Kijoon Chae

In this paper, we propose a secure user authentication method for a networked manufacturing system, which is a system framework of computer-aided solutions to support the manufacturing industry, in particular the automobile and shipbuilding sector. The proposed authentication method called as CRI-TMT is based on a challenge-response identification scheme using a time-variant mapping table. The proposed CRI-TMT can prevent a user's secret from key-log or over-the-shoulder attack. Also a user's secret data is not stored on the verifier's side. Thus, a user's secret data is not disclosed even though attackers break into the authentication server. Through an analytical study, we show that the gain of the attackers who have users secret-related data by observing the verification step is not bigger than that of the blind attackers without any user's secret data. We also show the feasibility and practicality of the CRI-TMT system by a fast implementation

Published in:

Cyberworlds, 2005. International Conference on

Date of Conference:

23-25 Nov. 2005