1. Introduction
The Industrial Internet of Things (IIoT) is an emerging technology rapidly changing manufacturing and industrial terrain. IIoT leads to intermixing sensors, software, and other technologies into industrial processes to optimize and automate them [1,2,3]. With IIoT, devices and equipment are connected to the Internet, enabling them to intercommunicate real-time data and insights. This connectivity facilitates factories to monitor and examine their production processes, determine inefficiencies, and make data-driven decisions to improve their operations. The advantages of IIoT are myriad. IIoT can enable manufacturers to diminish expenses and enhance productivity by enhancing operational efficiency. In addition, IIoT also improves product quality, reducing downtime and enhancing worker safety [4,5,6].
With the integration of various devices, sensors, and systems, the Industrial Internet of Things (IIoT) presents numerous potential attack vectors that malicious actors can exploit. Among the primary concerns is the security of data. The vast amount of data generated by IIoT systems needs to be collected, processed, and stored securely. Unauthorized access to this data can have severe consequences, leading to significant economic and reputational damage. To mitigate these risks, robust security measures, including encryption and authentication, must be implemented in IIoT environments. In this paper, we propose an authentication and key agreement (AKA) scheme called “reliable device-access framework for the Industrial IoT (RDAF-IIoT)” to enable secure access to real-time information from devices deployed in IIoT environments. The proposed RDAF-IIoT scheme prioritizes computational efficiency by leveraging hash functions and symmetric encryption instead of computationally expensive operations.
2. Related Work
Within the existing literature, numerous AKA schemes or frameworks have been suggested to ensure secure access to real-time data for users. In this context, the authors of [7] introduced an AKA security framework for wireless sensor networks (WSNs) utilizing a hash function and XOR operation. Furthermore, they identified vulnerabilities in the scheme proposed by [8], including insider attacks, random parameters leakage (RPL), and perfect forward secrecy attacks. Another AKA framework for WSNs was proposed by the authors of [9], incorporating elliptic curve cryptography (ECC), hash function, and XOR. However, this framework is susceptible to man-in-the-middle (MITM), insider attacks, stolen smart card attacks, and RPL attacks. The authentication framework presented in [10] exhibits weaknesses against RPL, stolen smart cards, and password-guessing attacks. In the realm of IoT-enabled software-defined networks, an authentication framework using the symmetric encryption algorithm AES and ECC is proposed in [3]. The security of this scheme is validated using the random oracle model (ROM) and Scyther. Additionally, a user AKA scheme for WSNs based on symmetric encryption and ECC is devised in [11], with its security verified through ROM and AVISPA. However, the AKA scheme put forth in [11] can be compromised by malicious but valid users of the system. For the Internet of drones, a user authentication framework is provided in [12], designed using ECC and authenticated encryption. The security of this framework is demonstrated through Scyther and ROM. Similarly, an authenticated encryption and hash function-based AKA scheme is proposed in [2,13] for smart home and IIoT environments, with its security verified using ROM and Scyther. Lastly, an AKA scheme based on hyper-ECC is proposed in [14] for the Internet of drones environment.
In [15], a robust authentication scheme for WSNs based on temporal credentials is proposed. However, the AKA scheme presented in [16], which utilizes ECC and a hash function, exhibits weaknesses against denial-of-service (DoS), key compromise, and impersonation attacks. Similarly, ref. [17] introduces a multifactor AKA scheme employing AES and a hash function. Nevertheless, this scheme is vulnerable to DoS, replay, and de-synchronization attacks. In [18], a three-party AKA framework is proposed, but it lacks adequate user anonymity protection and does not offer an efficient method for password change. An anonymous AKA scheme constructed using the chaotic map and hash function is presented in [19], with its security validated using the Burrows–Abadi–Needham (BAN) logic model. However, vulnerabilities exist in an AKA scheme utilizing ECC and a hash function for the cloud-enabled IoT environment, as noted in [20]. The scheme involves four participants during the AKA phase and undergoes security validation using BAN logic and AVISPA. Furthermore, [12] proposes an AKA scheme based on AEAD and a hash function, and its security is demonstrated through ROM and Scyther. Lastly, an AKA scheme utilizing a hash function is presented in [21], which is susceptible to various security attacks, as highlighted in [20].
A secure AKA scheme based on ECC and a secure hash function is introduced in [22] for the IoT environment. The scheme’s security is validated using Scyther. However, the security framework proposed in [23], which utilizes ECC and a secure hash function, is vulnerable to stolen smart card attacks. Additionally, the security framework proposed in [24] fails to prevent DoS attacks, while the scheme presented in [25] is weak against DoS attacks as well. In the context of the IIoT environment, an AKA security framework is proposed in [17], but it is unable to withstand various security attacks. The scheme in [17] is constructed using symmetric encryption and a hash function. Various security frameworks are summarized in Table 1.
2.1. Research Contributions
The main contributions of the paper are listed as follows.
-
In this article, an AKA framework is proposed called RDAF-IIoT, which is constructed using “Advanced Encryption Standard in Cipher Block Chaining mode (AES-CBC)” and hash function. RDAF-IIoT enables users to achieve authentication with a gateway. In addition, RDAF-IIoT enables users and sensing devices to communicate securely after establishing a secure channel (session key) with the assistance of a gateway. RDAF-IIoT is a three-factor AKA security framework, which also enables the users to change the password without involving the gateway.
-
The proposed RDAF-IIoT is corroborated informally to validate its resiliency against various security attacks, such as DoS, MITM, impersonation, and replay attacks. The security of the session key is corroborated using well known random oracle model. In addition, RDAF-IIoT is implemented using Scyther, and the analysis of Scyther shows that the RDAF-IIoT is secure.
-
To evaluate the performance of the proposed RDAF-IIoT, RDAF-IIoT is compared with the state-of-the-art security frameworks, such as Srinivas et al. [35], Challa et al. [25], Wazid et al. [34], and Irshad et al. [3] regarding communication and computational costs. The proposed RDAF-IIoT requires [74.73% to 78.63%] low computational and [30.38% to 51.91%] low communication costs while rendering enhanced security functions than the related security frameworks.
2.2. Paper Organization
The remaining paper is organized as follows. Section 3 explicates the models, such as authentication and attack, used in the construction of the RDAF-IIoT. Section 4 provides the explanation of RDAF-IIoT. In Section 5, the informal, ROM, and Scyther-based security analyses are presented. Performance comparison is presented in Section 6. Concluding remarks are explicated in Section 7.
3. System Models
3.1. Authentication Model
The authentication model comprises the following components. Figure 1 shows the authentication model employed for the proposed RDAF-IIoT.
Gateway: : The registration authority (RA) is liable for registering gateway nodes (), and equips Internet functionality to the IIoT-enabled devices stationed in the IIoT circumstances. In addition, keeps the private credentials associated with the users and sensing devices. The can connect the users through cellular and other internet connectivity.
Smart Sensing Node: (): All are equipped with sensing, storage, and processing modules; however, these resources are constricted. In addition, are the resource-constricted devices employed to sense the surrounding IIoT environment. can communicate with using wireless communication protocols, such as WiFi/6LoWPAN/Zigbee communication protocols. Using these wireless channels, sends the collected information to .
User: : has the smart devices (), fitted with the biometric sensor. can intercommunicate with through and with using cellular communication technology or wired network. mandates obtaining the real-time data from stationed in the IIoT environment. Thus, a secure channel establishment scheme is proposed for the IIoT environment to prevent authorized information access in this paper. Table 2 demonstrates the various symbols employed in this paper.
3.2. Attack Model
The “Dolev–Yao (DY) model” [14,44,45] is repeatedly employed to investigate the security of AKA schemes. According to DY Model, the attacker can effectuate the MITM and impersonation attacks by capturing and modifying all the communication in the AKA schemes. An attacker can obtain a valid user’s identity for the traceability attack. In addition, in the registration procedure, the RA and other participants interact with each other via a secure channel. However, , , and communicate using the insecure channel while executing AKA process. The “Canetti–Krawczyk (CK) model”, which constructs additional noteworthy speculation than the DY model, is also contemplated. A malicious adversary can procure secure data incorporating the master key, session private credentials, and private key, employing the CK model.
4. The Proposed RDAF-IIoT Framework
The RDAF-IIoT comprises the registration of sensing device, user, and AKA phases. All the phases are explicated in detail in the following subsections.
4.1. Registration of Sensing Device
In this phase, the registration of the sensing device is performed. RA is responsible for the registration of the sensing device by executing the following procedure.
4.1.1. Step RDS-1
The RA selects a unique identity and long-term secret key for the gateway.
4.1.2. Step RDS-2
The RA selects the unique identity for the sensor device and computes the secret key for the sensing device as . Finally, RA stores the parameters {, } in the memory of the sensing device.
4.2. Registration User
In this phase, RA registers a user before allowing him/her to access the resource of the IIoT environment. For the registration of the user, RA executes the following steps.
4.2.1. Step RU-1
The user generates as random number , unique identity , and password . In addition, has a smart device capable of sensing the biometric information of . After sensing , computes
(1)
(2)
(3)
(4)
(5)
In Equation (1), the biometric key and helper data is computed by taking as the input parameter. The encryption key is computed in (2). In addition, , , and are computed by taking the , , and as the input parameters. Finally, derives the verification parameter in (5).
4.2.2. Step RU-2
Moreover, selects a unique pseudo identity and sends the credentials {, } to using the secure channel. stores the parameters {, } in its own database. In response, sends the parameters, such as the list of the devices and , to using a secure channel.
In this paper, the fuzzy extractor (FE) is employed to derive the biometric key from the biometric information of the user. FE is the combination of two functions; one is a generator function dented by , and the other is a reproduction function . function takes the and generate the biometric key and helper data. Moreover, the function is used to reproduce the biometric key by taking the helper data and . To reproduce the biometric key the condition , where is the error tolerance and is the hamming distance.
4.2.3. Step RU-3
, on receiving these parameters computes,
(6)
(7)
By performing the XOR operation between and , the variable is obtained. Similarly, is obtained by performing XOR between and . Subsequently, stores the parameters {, , , , , , } in its own database.
4.3. Authenticated Key Agreement Phase
In this phase, the user and sensor node establish a session key during the execution of AKA phase. For this purpose, the following steps are executed in AKA phase.
4.3.1. Step AKA-1
inserts its secret credentials, such as the identity and at the available interface of the smart device of the user . In addition, imprints the biometric impression on the biometric sensor deployed at and computes
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
Equation (8) computes the biometric key using the input parameters and , while Equation (9) calculates the encryption key for achieving encryption. Additionally, the initialization vector is determined in Equation (10). By following the encryption process outlined in Equation (11), the credentials, namely , , and , can be obtained using , , and as the input parameters. To authenticate the user’s secret credentials locally, the verification parameter is computed in Equation (12) and validated in Equation (13). If the condition in Equation (13) is satisfied, / derives the parameters from , , , and as indicated in Equations (14) and (15).
picks randomly and timestamps , and computes
(16)
(17)
(18)
Equation (16) calculates the initialization vector, which plays a role in the encryption process. The encryption process itself is executed in Equation (17), utilizing the symmetric key . Furthermore, Equation (18) computes the verification parameter, which is employed to ensure data integrity. Lastly, constructs the message : and transmits it to through the open communication channel.
4.3.2. Step AKA-2
validates the timeliness of the received message by checking the condition , where represents the delay time, is the generation time, and is the received time of the message. If the message passes the validity check, proceeds to verify and . If there is no match found, terminates the AKA process. Otherwise, it retrieves the parameter and performs further computations.
(19)
(20)
(21)
(22)
The initialization vector is computed in (19), which is used in the decryption process. In addition, from the decryption process, obtains the plaintext and and computes the verification parameter in (21). Finally, to ensure the integrity of the received message, corroborates the condition in (22). If the condition does not hold, stops the AKA process.
4.3.3. Step AKA-3
generates , and pick new and computes
(23)
(24)
(25)
(26)
(27)
Here, in (23), the plaintext is computed, and it will be encrypted using the encryption key derived in (24). In addition, the initialization vector is computed in (25), which is used in the encryption process to enhance the randomness of the ciphertext. Finally, and by performing the encryption, and the verification parameter is computed in (27). Moreover, updates with and with in its own database. Finally, a message : is constructed by and transmitted to using the public communication channel.
4.3.4. Step AKA-4
is received at and its timeliness is validated through the condition . If the message is not replayed, then computes
(28)
(29)
(30)
(31)
If the condition in (31) holds, the message is considered to be a valid message.
4.3.5. Step AKA-5
To response , selects and and computes
(32)
(33)
(34)
(35)
(36)
Finally, constructs the message and transmitted the message to using the open communication channel.
4.3.6. Step AKA-6
validates the timeliness of the received message via the condition . The condition will be false if the message is replayed; otherwise, is considered as a valid message and computes
(37)
(38)
(39)
(40)
(41)
(42)
The received message will be a valid message if the condition in (42) holds. Otherwise, drops the received message and stops the AKA phase. In addition, the validness of the condition (42) indicates both the session keys, which are derived at and , are the same, and mutual authentication successfully accomplished. Finally, computes and updates with . The authentication process is summarized in Figure 2.
4.4. Bio-Metric/Password Change Phase
During this phase, the user has the option to change their password and update their biometric information. The following steps must be followed to successfully complete the bio-metric/password update phase.
4.4.1. Step BCP-1
need to provide the old biometric information and password and compute
(43)
(44)
(45)
(46)
(47)
(48)
(49)
(50)
If the condition (48) holds, a prompt message is generated to intimate to provide the new parameters.
4.4.2. Step BCP-2
after receiving the new parameters, such as and . Moreover, picks computes
(51)
(52)
(53)
(54)
(55)
(56)
(57)
Finally, replaces the credentials {, , , , , , } with {, , , , , , } in the memory of .
5. Security Validation
The security strengths of the proposed RDAF-IIoT are validated through informal and formal security analysis. For the formal security analysis, the well-known mathematical method ROM is employed. In addition, Scyther, a software tool, is also used for the formal analysis.
5.1. Informal Security Analysis
In this section, the resiliency of the proposed RDAF-IIoT is corroborated against various attacks through informal (non-mathematical) analysis.
5.1.1. MITM Attack
There are three messages exchanged during the AKA phase. such as :{, , , , }, :, and :. After capturing any of these communicated messages, tries to modify the contents of messages. As , , and are validated at the receiving node to ensure the integrity of , , and , respectively. However, without knowing short-term and long-term secret credentials associated with , , and , it is hard for to compute , , and for the message , , and , respectively. In this way, the proposed RDAF-IIoT is resistant to MITM attack.
5.1.2. DoS Attack
The proposed RDAF-IIoT, achieves the local authentication by computing
(58)
(59)
(60)
(61)
(62)
(63)
In the event that the condition stated in (63) is satisfied, / transmits the AKA message to . Conversely, if the condition is not met, / terminates the execution process. By employing a local authentication mechanism, the proposed RDAF-IIoT effectively safeguards against potential DoS attacks by thwarting the efforts of malicious yet legitimate / entities attempting to flood with a high volume of AKA messages.
5.1.3. Impersonation Attack
During the AKA phase, sends message, such as : to for further authentication of . However, to impersonate as the valid , needs to generate a bogus using random parameters. Moreover, without knowing the the parameters , , and , cannot fabricate a valid . Similarly, cannot generate a valid message, such as :, and : without having the valid parameters used in the construction of these messages. Thus, the proposed scheme cannot provide protection against impersonation attacks.
5.1.4. Password Guessing Attack
After capturing of , obtains the parameters {, , , , , , } through the power analysis attack. To perform the password-guessing attack, selects the random secret credentials, such as and , and and computes
(64)
(65)
(66)
(67)
(68)
(69)
In order to successfully change the password, the condition in (69) must hold. However, without knowing the valid secret parameters, such as and , and or associated with the valid , it hard for to compute above computation. In this way, the proposed scheme is resistant to the password guessing attack.
5.1.5. Identity Guessing Attack
after capturing the messages, such as :, :, and : cannot obtain the real identity of . In addition, from the parameters {, , , , , , } cannot obtain the real identity of . In this way, the proposed scheme is resistant to the identity guessing attack.
5.1.6. Replay Attack
All the communicated messages, such as , , and during the AKA phase of the scheme are incorporated with the latest timestamps. The conditions , , and are checked at the receiving node for , , and , respectively, to detect the if the particular message is replayed or not. If the received message is not within the allowed time delay, the receiving node drops the messages and considers the received message as the replayed message. Hence, the RDAF-IIoT is resistant to replay attacks.
5.1.7. RPL Attack
In RDAF-IIoT, the session key is generated as , which the combination of both the long term and short term parameters. Without knowing both long-term and short-term parameters, it is hard for to generate a valid session key. Thus, the proposed RDAF-IIoT is resistant to RPL attack.
5.2. ROM Based Validation
The security of RDAF-IIoT is examined formally by employing ROM. The components of the ROM are demonstrated in Table 3. Capabilities of are examined in Section 3.2. In addition, effectuates the queries presented in Table 4 to generate various attacks on RDAF-IIoT.
Let , , , and , denote hash and send queries, password dictionary space, length/space of bio-metric key, hash output length, respectively. denotes the advantage of in breaking the security of AES. The advantage of polynomial time () adversary to compromise the security of the session key generated between and can be determine as follows
(70)
The proof of the Theorem (1) is derived in the same way as performed in [41,46,47,48]. Under ROM, interacts with instances attempts to guess the bit “b”. If guesses the correct bit, then RDAF-IIoT fails to provide the desired security. For proving the security of the proposed RADF-IIoT, the four games are contemplated, where the likelihood of to calculate the correct bit “b” is represented by . All the games under ROM are explained as follows.
: This game corresponds to the real attack under the ROM. By definition, the following can be reached
(71)
: executes the Execute and Send queries to captures , , and . The objective of after capturing these messages is to construct the session key, derived as where. Moreover, performs the Test query to know whether the obtained session key is the real or arbitrary number. It is worth mentioning that the constructed session key is the amalgamation of both the long and short-term parameters, such as , , , , , and . In addition, cannot access the database of , and the biometric key cannot be extracted by . Thus, the eavesdropping attack does not enable to obtain any advantage. Hence, both and are indistinguishable. So, the following can be reached.
(72)
: An active attack is established by and Send queries. As in RDAF-IIoT, the hash function generates SK on and . In addition, the parameter , , and are also computed using the hash function. strives to locate the collision by making queries to compromise the security of SK. However, the likelihood of collision occurrence is nominal. Thus, by the birthday paradox.
(73)
(74)
: is used by to generate an passive attack in this game. The purpose of is to obtain the data, such as {, , , , , , and } stored in the memory of the smart device of the user. The objective of is the update the password and biometric information of the user. However, the biometric key is of length , where the is the length of the biometric key and the probability of guessing the biometric key is , which is nominal. In addition, is allowed to perform only a few wrong passwords tries. Under these conditions, the following can be reached.
: An active attack is effectuated by in this game. The objective of is to retrieve the sensitive and secret parameters from , , and . As all the communicated messages are encrypted using symmetric encryption (AES). AES is secure to use, so to obtain the sensitive credentials from the , , and , it is necessary for to break the security of AES in polynomial time. It is hard for to break the security of AES in polynomial time. Hence, the following can be reached
(75)
As all the games are completed by , in repose receives no significant advantage to obtain correct bit “b”. Thus, following can be reached
(76)
From (71) and (72), following can be achieved
(77)
From (77), following can be achieved
(78)
By using (76) and (78), following can be achieved
(79)
Upon considering the triangular inequality, the following can be reached.
(80)
By using (74), (75), and (80), following can be achieved
(81)
□
5.3. Scyther-Based Security Verification
Scyther serves as a user-friendly tool for verifying, falsifying, and analyzing security protocols. It stands out among other advanced tools by offering several novel components. By employing a pattern refinement algorithm, Scyther efficiently generates concise representations of trace sets, aiding in the examination of attack categories and potential protocol behaviors. Extensively used in research, Scyther is a freely available security protocol verification tool. The proposed implementation of the RDAF-IIoT employs the security protocol description language (SPDL). The SPDL script defines three prominent roles: , , and . Each role is associated with specific claims outlined within the SPDL script. Scyther verifies all the claims, as demonstrated in Table 5 and Figure 3.
6. Performance Comparison
The proposed RDAF-IIoT is compared with Srinivas et al. [35], Challa et al. [25], Wazid et al. [34], and Irshad et al. [3] regarding computational and communication costs. In addition, the security functionality is also considered as a performance measure. To compute the computational time, a system with “Intel(R) Core(TM) i5-2400 CPU @ 3.10 GHz”, operating system “Ubuntu,” and RAM 8 GB is used to simulate as . In addition, a system with “CPU Quad Core 1.2 GHz, BCM2837, operating system Ubuntu, and RAM 1 GB RAM’ (Raspberry Pi-3 (RPI3))’ is used to simulate the smart sensing device and smart device of the user. All the cryptographic primitives are implemented using the cryptographic library called “Pycrypto” and each cryptographic primitive is executed 100 times to estimate the average computational time. Table 6 tabulates the computational complexities of various cryptographic primitives.
6.1. Security Comparison
The proposed RDAF-IIoT is contrasted with Wazid et al. [34], Srinivas et al. [35], and Challa et al. [25] regarding the security features and functions. The scheme of Wazid et al. [34] is not secure against the identity de-synchronization attack. Srinivas et al. [35] yields a security strategy weak against identity guessing, MITM, and user and device impersonation attacks. In addition, the authentication strategy suggested in [35] has a design defect, due to which the authentication procedure cannot be accomplished. The security framework suggested in Challa et al. [25] user anonymity, privilege insider, password guessing, and stolen smart card attack. Nevertheless, the security framework RDAF-IIoT is more secure and reliable than the contrasted security framework, as shown in Table 7.
6.2. Computational Cost
In this subsection, the computational cost of the proposed RDAF-IIoT is estimated. The computational time of ECC, ECC point addition, hash operation, symmetric encryption, and FE-based key generation is denoted by , , , , and , respectively. To derive the computational cost of the proposed RDAF-IIoT, computational complexities listed in Table 6 are employed. Total computational cost of RDAF-IIoT is ms, which is 78.63%, 74.73%, 77.36%, and 75.58% better than Srinivas et al. [35], Challa et al. [25], and Wazid et al. [34]. Figure 4, Figure 5 and Figure 6 and Table 8 show the computational cost comparison at , , and . Moreover, Figure 7 exhibits that with increasing the number, the proposed RDAF-IIoT requires less computational resources than Srinivas et al. [35], Challa et al. [25], and Wazid et al. [34].
6.3. Communication Cost
To calculate the communication, which is required to accomplish the AKA phase, the parameters presented in Table 6 are used. There are three messages, such as : , :, and : {, , , } communicated during the AKA phase of the proposed RDAF-IIoT. The size of , , is {32 + 128 + 128 + 128 + 256} = 672 bits, {32 + 128 + 128 + 256} = 544 bits, and {32 + 128 + 128 + 128+ 256 } = 544 bits, respectively. Cumulative communication of the proposed RDAF-IIoT is {672 + 544 + 544 } = 1760 bits. The security framework of Srinivas et al. [35], Challa et al. [25], Wazid et al. [34], and Irshad et al. [3] require 2656 bits, 2528 bits, 3660 bits, and 3040 bits, respectively. Table 9 and Figure 8 show the communication efficiency of the proposed security framework than the relevant state of the security scheme.
6.4. Discussion
The proposed RADF-IIoT adopts a resource-efficient approach by utilizing XoR operations, hash functions, and symmetric encryption, rather than relying on complex and computationally intensive public key cryptosystems. This design choice enables RADF-IIoT to minimize the computational resources required compared to other related security frameworks. By leveraging these lightweight cryptographic primitives, RADF-IIoT achieves efficient and effective security measures while reducing computational overhead.
Furthermore, in the proposed RADF-IIoT, the AKA process involves the exchange of a small number of parameters with small message sizes. This characteristic contributes to a reduced communication overhead in the RDAF-IIoT while still maintaining robust security features. By minimizing the amount of data transmitted during the authentication and key agreement process, the proposed RADF-IIoT optimizes communication efficiency without compromising the overall security of the system.
7. Conclusions
A security scheme to set up a session key between the user and the IIoT device is proposed in this paper called RDAF-IIoT. Moreover, during the AKA phase of RADF-IIoT, the established session key is used to achieve encrypted communication to avert various security attacks. It is through the informal security analysis proved that RDAF-IIoT is resistant to MITM and impersonation attacks. ROM is employed to corroborate the security of the session key generated in AKA phase of the proposed RDAF-IIoT. In addition, Scyther is utilized to corroborate that RDAF-IIoT is protected. Furthermore, the performance analysis illustrates that the proposed RDAF-IIoT required [74.73% to 78.63%] lower computational and [30.38% to 51.91%] lower communication costs than the related security schemes while providing enhanced security features.
No external datasets were used in this study.
The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through large group Research Project under grant number RGP2/312/44.
The author declares no conflict of interest.
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Figure 4. Comparisons of computational cost at [Forumla omitted. See PDF.] {[3,25,34,35]}.
Figure 5. Comparisons of computational cost at [Forumla omitted. See PDF.] {[3,25,34,35]}.
Figure 6. Comparisons of computational cost at [Forumla omitted. See PDF.] {[3,25,34,35]}.
Figure 7. Total computational cost required to complete the AKA phase {[3,25,34,35]}.
Summary of User Authentication Frameworks.
Reference | Cryptographic Operations | Security Analysis | Environment |
---|---|---|---|
Ref. [ |
Hash + AEAD + XOR | Resource-efficient and secure. | IIoT |
Ref. [ |
Hash + ECC + AEAD + XOR | Resistant to various attacks. | IIoT |
Ref. [ |
Hash + CM + XOR | Weak against stolen smart card attacks. | TMIS |
Ref. [ |
Hash + CM + XOR | Incapacitated against server/user impersonation. | MSE |
Ref. [ |
Hash + AES + XOR | Weak against node capture, DoS, desynchronization, and replay attacks. | IIoT |
Ref. [ |
Hash + AEAD + XOR | Unable to ensure the anonymity feature. | IoD |
Ref. [ |
Hash + XOR | Vulnerable to stolen smart devices and traceability attacks. | IIoT |
Ref. [ |
Hash + Rabin + XOR | Exposed to impersonation attack. | IIoT |
Ref. [ |
Hash + AEAD + XOR | Incapacitated against server/user impersonation and session key disclosure attacks. | TMIS |
Ref. [ |
Hash + AEAD + XOR | Complex and unable to ensure the anonymity feature. | IoT |
Ref. [ |
Hash + ECC + XOR | Weak against desynchronization attack. | IIoT |
Ref. [ |
Hash + ECC + XOR | Weak against desynchronization attack. | IIoT |
Ref. [ |
Hash + AEAD + XOR | Resource-efficient and secure. | IoT |
Ref. [ |
Hash + ECC + XOR | Weak against MITM and impersonation attacks. | IoT |
Ref. [ |
Hash + ECC + XOR | Weak against impersonation and MITM attacks. | IoT |
Ref. [ |
Hash + ECC + XOR | Secure against all well-known attacks. | IoT |
Ref. [ |
Hash + ECC + XOR | Weak against temporary secret leakage and stolen smart card attacks. | VANETs |
Ref. [ |
Hash + ECC + XOR | Secure against all well-known attacks. | ICS |
Ref. [ |
Hash + AEAD + XOR | Resource-efficient and secure. | IoD |
Ref. [ |
Hash + ECC + XOR | Weak against privileged insider, MITM, temporary secret leakage attacks. | TMIS |
Ref. [ |
Hash + AEAD + XOR | Resource-efficient and secure. | IIoT |
Ref. [ |
Hash + AEAD + XOR | Resource-efficient and secure. | IoD |
Ref. [ |
Hash + ECC + XOR | Weak against MITM, impersonation, and stolen smart card attacks. | WSN |
RADF-IIoT | Hash + CM + AEAD + XOR | Protection against various attacks. | IIoT |
Note: CM: Chaotic Map; AEAD: Authenticated encryption with associated data; XOR: Exclusive-OR; IIoT: Industrial Internet of Things; TMIS: Telecare medical information system; MSE: Multi-server environment; VANETs: Vehicular ad hoc networks; ICS: Industrial control system; WSN: Wireless sensor networks.
Notations Used in RDAF-IIoT.
Notation | Description |
---|---|
|
Symbolizes the remote user |
|
Symbolizes IoT enabled smart device |
|
Symbolizes the gateway |
|
Symbolizes identity and password of |
|
Symbolizes password of |
|
Symbolizes current identities |
|
Symbolizes old identities, |
|
Symbolizes gateway identities, |
|
Symbolizes temporary identities, |
Symbolizes timestamps | |
|
Symbolizes allowed time delay |
|
Symbolizes received time |
|
Symbolizes initialization vectors, where |
Symbolizes encryption of string “Pt” and decryption “Ct” employing AES | |
|
Symbolizes random numbers |
|
Symbolizes plaintext |
|
Symbolizes ciphertext |
Symbolizes user biometric and key, respectively | |
Symbolizes key generation, helper data, and reproduction algorithm, respectively | |
⊕ | Symbolizes XOR |
Symbolizes concatenation and hash-function |
ROM Components.
Component | Description |
---|---|
Freshness | |
Partnership | At the acceptance state, the instances |
Participants | There are three primary participants/parties in RDAF-IIoT, such as |
ROM Queries.
Query | Description |
---|---|
Execute |
A passive attack is modeled using this query. Via this query, |
Test |
|
Reveal |
This query facilitates |
Send |
An active attack is launched via this query. In addition, |
CorruptSMD |
To obtain the long-term credentials accumulated in the memory of |
Scyther Claim Verification.
Claims | For |
Attack Status |
---|---|---|
Claim-i |
|
No attack found |
Claim-j |
|
No attack found |
Claim-k |
|
No attack found |
Claim-l |
|
No attack found |
Claim-m |
|
No attack found |
Claims |
For |
Attack Status |
Claim-i | - | No attack found |
Claim-j |
|
No attack found |
Claim-k |
|
No attack found |
Claim-l |
|
No attack found |
Claim-m |
|
No attack found |
Claims |
For |
Attack Status |
Claim-i |
|
No attack found |
Claim-j |
|
No attack found |
Claim-k |
|
No attack found |
Claim-l |
|
No attack found |
Claim-m |
|
No attack found |
Computational Time Cryptographic Functions and Size of Various Parameters.
Cryptographic Function | RPI3 |
|
Size of Parameters |
---|---|---|---|
Computational time of ECC multiplication ( |
3.67 ms | 0.85 ms | ECC = (320 bits) |
Computational time of Symmetric Encryption (private key) ( |
0.454 ms | 0.07 ms | Identity = (128 bits) |
Computational time of ECC Addition ( |
0.212 ms | 0.00221 ms | Random parameters = (128 bits) |
Computational time of hash function (SHA-256) ( |
0.37 ms | 0.051 ms | hash output (256 bits) |
Computational time of |
3.67 ms | 0.85 ms | Timestamp size (32 bits) |
Security Comparison.
Framework/Scheme | SC-I | SC-J | SC-K | SC-L | SC-M | SC-N | SC-O | SC-P |
---|---|---|---|---|---|---|---|---|
Wazid et al. [ |
✓ | ✓ | ✓ | ✓ | ✓ | ✓ | × | ✓ |
Srinivas et al. [ |
✓ | × | ✓ | ✓ | ✓ | × | ✓ | ✓ |
Challa et al. [ |
× | × | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
Irshad et al. [ |
✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
RDAF-IIoT | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
SC-I: Privilege insider Attack, SC-J: Anonymity/Un-traceability, SC-K: Mutual Authentication, SC-L: MITM Attack, SC-M: Drone capture Attack, SC-N: Impersonation Attack, SC-O: De-Synchronization Attack, SC-P: Temporary Secret Leakage Attack, ✓: indicates the availability of feature; ×: represents non-availability of the feature.
Computational Cost.
Scheme | Computational Cost |
Computational Cost |
Computational Cost |
Total Time (ms) |
---|---|---|---|---|
Srinivas et al. [ |
|
|
|
|
Challa et al. [ |
|
|
|
|
Wazid et al. [ |
|
|
|
|
Irshad et al. [ |
|
|
|
|
RDAF-IIoT |
|
|
|
|
Communication Cost.
Framework | No. of Factors | Communication Cost | No. of Exchanged Messages |
---|---|---|---|
Srinivas et al. [ |
3F | 2656 bits | 3 |
Challa et al. [ |
3F | 2528 bits | 3 |
Wazid et al. [ |
3F | 3660 bits | 3 |
Irshad et al. [ |
3F | 3040 bits | 3 |
RDAF-IIoT | 3F | 1760 bits | 3 |
References
1. Kumar, A.; Saha, R.; Conti, M.; Kumar, G.; Buchanan, W.J.; Kim, T.H. A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions. J. Netw. Comput. Appl.; 2022; 204, 103414. [DOI: https://dx.doi.org/10.1016/j.jnca.2022.103414]
2. Tanveer, M.; Abbas, G.; Abbas, Z.H.; Bilal, M.; Mukherjee, A.; Kwak, K.S. LAKE-6SH: Lightweight User Authenticated Key Exchange for 6LoWPAN-Based Smart Homes. IEEE Internet Things J.; 2022; 9, pp. 2578-2591. [DOI: https://dx.doi.org/10.1109/JIOT.2021.3085595]
3. Irshad, A.; Mallah, G.A.; Bilal, M.; Chaudhry, S.A.; Shafiq, M.; Song, H. SUSIC: A Secure User Access Control mechanism for SDN-enabled IIoT and Cyber Physical Systems. IEEE Internet Things J.; 2023; Early Access [DOI: https://dx.doi.org/10.1109/JIOT.2023.3268474]
4. Wang, H.; Meng, J.; Du, X.; Cao, T.; Xie, Y. Lightweight and anonymous mutual authentication protocol for edge IoT nodes with physical unclonable function. Secur. Commun. Netw.; 2022; 2022, 1203691. [DOI: https://dx.doi.org/10.1155/2022/1203691]
5. Sui, T.; Mo, Y.; Marelli, D.; Sun, X.; Fu, M. The Vulnerability of Cyber-Physical System Under Stealthy Attacks. IEEE Trans. Autom. Control; 2021; 66, pp. 637-650. [DOI: https://dx.doi.org/10.1109/TAC.2020.2987307]
6. Sui, T.; Sun, X.M. The vulnerability of distributed state estimator under stealthy attacks. Automatica; 2021; 133, 109869. [DOI: https://dx.doi.org/10.1016/j.automatica.2021.109869]
7. Kwon, D.K.; Yu, S.J.; Lee, J.Y.; Son, S.H.; Park, Y.H. WSN-SLAP: Secure and lightweight mutual authentication protocol for wireless sensor networks. Sensors; 2021; 21, 936. [DOI: https://dx.doi.org/10.3390/s21030936]
8. Moghadam, M.F.; Nikooghadam, M.; Jabban, M.A.B.A.; Alishahi, M.; Mortazavi, L.; Mohajerzadeh, A. An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network. IEEE Access; 2020; 8, pp. 73182-73192. [DOI: https://dx.doi.org/10.1109/ACCESS.2020.2987764]
9. Wu, F.; Xu, L.; Kumari, S.; Li, X. A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security. J. Ambient. Intell. Humaniz. Comput.; 2017; 8, pp. 101-116. [DOI: https://dx.doi.org/10.1007/s12652-016-0345-8]
10. Wu, F.; Xu, L.; Kumari, S.; Li, X. A new and secure authentication scheme for wireless sensor networks with formal proof. Peer-to-Peer Netw. Appl.; 2017; 10, pp. 16-30. [DOI: https://dx.doi.org/10.1007/s12083-015-0404-5]
11. Sahoo, S.S.; Mohanty, S.; Sahoo, K.S.; Daneshmand, M.; Gandomi, A.H. A Three Factor based Authentication Scheme of 5G Wireless Sensor Networks for IoT System. IEEE Internet Things J.; 2023; Early Access [DOI: https://dx.doi.org/10.1109/JIOT.2023.3264565]
12. Tanveer, M.; Kumar, N.; Hassan, M.M. RAMP-IoD: A robust authenticated key management protocol for the Internet of Drones. IEEE Internet Things J.; 2021; 9, pp. 1339-1353. [DOI: https://dx.doi.org/10.1109/JIOT.2021.3084946]
13. Tanveer, M.; Alkhayyat, A.; Kumar, N.; Alharbi, A.G. REAP-IIoT: Resource-Efficient Authentication Protocol for the Industrial Internet of Things. IEEE Internet Things J.; 2022; 9, pp. 24453-24465. [DOI: https://dx.doi.org/10.1109/JIOT.2022.3188711]
14. Eddine Berini, A.D.; Ferrag, M.A.; Farou, B.; Seridi, H. HCALA: Hyperelliptic curve-based anonymous lightweight authentication scheme for Internet of Drones. Pervasive Mob. Comput.; 2023; 92, 101798. [DOI: https://dx.doi.org/10.1016/j.pmcj.2023.101798]
15. Chen, C.T.; Lee, C.C.; Lin, I.C. Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments. PLoS ONE; 2020; 15, e0232277.
16. Kumar, D.; Singh, H.K.; Ahlawat, C. A secure three-factor authentication scheme for wireless sensor networks using ECC. J. Discret. Math. Sci. Cryptogr.; 2020; 23, pp. 879-900. [DOI: https://dx.doi.org/10.1080/09720529.2019.1627072]
17. Vinoth, R.; Deborah, L.J.; Vijayakumar, P.; Kumar, N. Secure multifactor authenticated key agreement scheme for industrial IoT. IEEE Internet Things J.; 2020; 8, pp. 3801-3811. [DOI: https://dx.doi.org/10.1109/JIOT.2020.3024703]
18. Ostad-Sharif, A.; Arshad, H.; Nikooghadam, M.; Abbasinezhad-Mood, D. Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme. Future Gener. Comput. Syst.; 2019; 100, pp. 882-892. [DOI: https://dx.doi.org/10.1016/j.future.2019.04.019]
19. Qiao, H.; Dong, X.; Jiang, Q.; Ma, S.; Liu, C.; Xi, N.; Shen, Y. Anonymous Lightweight Authenticated Key Agreement Protocol for Fog-Assisted Healthcare IoT System. IEEE Internet Things J.; 2023; Early Access [DOI: https://dx.doi.org/10.1109/JIOT.2023.3270300]
20. Wang, C.; Wang, D.; Duan, Y.; Tao, X. Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things. IEEE Trans. Inf. Forensics Secur.; 2023; 18, pp. 2961-2976. [DOI: https://dx.doi.org/10.1109/TIFS.2023.3272772]
21. Wazid, M.; Das, A.K.; Odelu, V.; Kumar, N.; Susilo, W. Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment. IEEE Trans. Dependable Secur. Comput.; 2020; 17, pp. 391-406. [DOI: https://dx.doi.org/10.1109/TDSC.2017.2764083]
22. Vinoth, R.; Deborah, L.J. An efficient key agreement and authentication protocol for secure communication in industrial IoT applications. J. Ambient. Intell. Humaniz. Comput.; 2023; 14, pp. 1431-1443. [DOI: https://dx.doi.org/10.1007/s12652-021-03167-z]
23. Choi, Y.; Lee, D.; Kim, J.; Jung, J.; Nam, J.; Won, D. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors; 2014; 14, pp. 10081-10106. [DOI: https://dx.doi.org/10.3390/s140610081] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/24919012]
24. Wazid, M.; Das, A.K.; Odelu, V.; Kumar, N.; Conti, M.; Jo, M. Design of secure user authenticated key management protocol for generic IoT networks. IEEE Internet Things J.; 2017; 5, pp. 269-282. [DOI: https://dx.doi.org/10.1109/JIOT.2017.2780232]
25. Challa, S.; Wazid, M.; Das, A.K.; Kumar, N.; Reddy, A.G.; Yoon, E.J.; Yoo, K.Y. Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access; 2017; 5, pp. 3028-3043. [DOI: https://dx.doi.org/10.1109/ACCESS.2017.2676119]
26. Li, X.; Wu, F.; Khan, M.K.; Xu, L.; Shen, J.; Jo, M. A secure chaotic map-based remote authentication scheme for telecare medicine information systems. Future Gener. Comput. Syst.; 2018; 84, pp. 149-159. [DOI: https://dx.doi.org/10.1016/j.future.2017.08.029]
27. Chatterjee, S.; Roy, S.; Das, A.K.; Chattopadhyay, S.; Kumar, N.; Vasilakos, A.V. Secure biometric-based authentication scheme using Chebyshev chaotic map for multi-server environment. IEEE Trans. Dependable Secur. Comput.; 2016; 15, pp. 824-839. [DOI: https://dx.doi.org/10.1109/TDSC.2016.2616876]
28. Tanveer, M.; Zahid, A.H.; Ahmad, M.; Baz, A.; Alhakami, H. LAKE-IoD: Lightweight Authenticated Key Exchange Protocol for the Internet of Drone Environment. IEEE Access; 2020; 8, pp. 155645-155659. [DOI: https://dx.doi.org/10.1109/ACCESS.2020.3019367]
29. Das, A.K.; Wazid, M.; Kumar, N.; Vasilakos, A.V.; Rodrigues, J.J. Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial Internet of Things deployment. IEEE Internet Things J.; 2018; 5, pp. 4900-4913. [DOI: https://dx.doi.org/10.1109/JIOT.2018.2877690]
30. Shuai, M.; Xiong, L.; Wang, C.; Yu, N. A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem. Comput. Commun.; 2020; 160, pp. 215-227. [DOI: https://dx.doi.org/10.1016/j.comcom.2020.06.012]
31. Tanveer, M.; Khan, A.U.; Alkhayyat, A.; Chaudhry, S.A.; Zikria, Y.B.; Kim, S.W. REAS-TMIS: Resource-Efficient Authentication Scheme for Telecare Medical Information System. IEEE Access; 2022; 10, pp. 23008-23021. [DOI: https://dx.doi.org/10.1109/ACCESS.2022.3153069]
32. Tanveer, M.; Abbas, G.; Abbas, Z.H.; Waqas, M.; Muhammad, F.; Kim, S. S6AE: Securing 6LoWPAN using authenticated encryption scheme. Sensors; 2020; 20, 2707. [DOI: https://dx.doi.org/10.3390/s20092707]
33. Sutrala, A.K.; Obaidat, M.S.; Saha, S.; Das, A.K.; Alazab, M.; Park, Y. Authenticated key agreement scheme with user anonymity and untraceability for 5G-enabled softwarized industrial cyber-physical systems. IEEE Trans. Intell. Transp. Syst.; 2021; 23, pp. 2316-2330. [DOI: https://dx.doi.org/10.1109/TITS.2021.3056704]
34. Wazid, M.; Das, A.K.; Kumar, N.; Alazab, M. Designing authenticated key management scheme in 6G-enabled network in a box deployed for industrial applications. IEEE Trans. Ind. Inform.; 2020; 17, pp. 7174-7184. [DOI: https://dx.doi.org/10.1109/TII.2020.3020303]
35. Srinivas, J.; Das, A.K.; Wazid, M.; Vasilakos, A.V. Designing secure user authentication protocol for big data collection in IoT-based intelligent transportation system. IEEE Internet Things J.; 2020; 8, pp. 7727-7744. [DOI: https://dx.doi.org/10.1109/JIOT.2020.3040938]
36. Xu, H.; Hsu, C.; Harn, L.; Cui, J.; Zhao, Z.; Zhang, Z. Three-factor anonymous authentication and key agreement based on fuzzy biological extraction for Industrial Internet of Things. IEEE Trans. Serv. Comput.; 2023; [DOI: https://dx.doi.org/10.1109/TSC.2023.3257569]
37. Ma, M.; He, D.; Wang, H.; Kumar, N.; Choo, K.K.R. An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks. IEEE Internet Things J.; 2019; 6, pp. 8065-8075. [DOI: https://dx.doi.org/10.1109/JIOT.2019.2902840]
38. Chen, Y.; Yin, F.; Hu, S.; Sun, L.; Li, Y.; Xing, B.; Chen, L.; Guo, B. ECC-Based Authenticated Key Agreement Protocol for Industrial Control System. IEEE Internet Things J.; 2022; Early Access [DOI: https://dx.doi.org/10.1109/JIOT.2022.3219233]
39. Tanveer, M.; Khan, A.U.; Shah, H.; Chaudhry, S.A.; Naushad, A. PASKE-IoD: Privacy-Protecting Authenticated Key Establishment for Internet of Drones. IEEE Access; 2021; 9, pp. 145683-145698. [DOI: https://dx.doi.org/10.1109/ACCESS.2021.3123142]
40. Sureshkumar, V.; Amin, R.; Vijaykumar, V.; Sekar, S.R. Robust secure communication protocol for smart healthcare system with FPGA implementation. Future Gener. Comput. Syst.; 2019; 100, pp. 938-951. [DOI: https://dx.doi.org/10.1016/j.future.2019.05.058]
41. Tanveer, M.; Ahmad, M.; Khalifa, H.S.; Alkhayyat, A.; Abd El-Latif, A.A. A new anonymous authentication framework for secure smart grids applications. J. Inf. Secur. Appl.; 2022; 71, 103336. [DOI: https://dx.doi.org/10.1016/j.jisa.2022.103336]
42. Tanveer, M.; Khan, A.U.; Ahmad, M.; Nguyen, T.N.; El-Latif, A.A.A. Resource-Efficient Authenticated Data Sharing Mechanism for Smart Wearable Systems. IEEE Trans. Netw. Sci. Eng.; 2022; Early Access [DOI: https://dx.doi.org/10.1109/TNSE.2022.3203927]
43. Yuanbing, W.; Wanrong, L.; Bin, L. An Improved Authentication Protocol for Smart Healthcare System Using Wireless Medical Sensor Network. IEEE Access; 2021; 9, pp. 105101-105117. [DOI: https://dx.doi.org/10.1109/ACCESS.2021.3099299]
44. Tanveer, M.; Bashir, A.K.; Alzahrani, B.A.; Albeshrir, A.; Alsubhi, K.; Chaudhry, S.A. CADF-CSE: Chaotic map-based authenticated data access/sharing framework for IoT-enabled cloud storage environment. Phys. Commun.; 2023; 59, 102087. [DOI: https://dx.doi.org/10.1016/j.phycom.2023.102087]
45. Khalid, H.; Hashim, S.J.; Hashim, F.; Ahamed, S.M.S.; Chaudhary, M.A.; Altarturi, H.H.; Saadoon, M. HOOPOE: High Performance and Efficient Anonymous Handover Authentication Protocol for Flying Out of Zone UAVs. IEEE Trans. Veh. Technol.; 2023; Early Access [DOI: https://dx.doi.org/10.1109/TVT.2023.3262173]
46. Sharma, M.; Narwal, B.; Anand, R.; Mohapatra, A.K.; Yadav, R. PSECAS: A physical unclonable function based secure authentication scheme for Internet of Drones. Comput. Electr. Eng.; 2023; 108, 108662. [DOI: https://dx.doi.org/10.1016/j.compeleceng.2023.108662]
47. Tanveer, M.; Alkhayyat, A.; Naushad, A.; Khan, A.U.; Kumar, N.; Alharbi, A.G. RUAM-IoD: A Robust User Authentication Mechanism for the Internet of Drones. IEEE Access; 2022; 10, pp. 19836-19851. [DOI: https://dx.doi.org/10.1109/ACCESS.2022.3149376]
48. Tanveer, M.; Khan, A.U.; Kumar, N.; Naushad, A.; Chaudhry, S.A. A Robust Access Control Protocol for the Smart Grid Systems. IEEE Internet Things J.; 2022; 9, pp. 6855-6865. [DOI: https://dx.doi.org/10.1109/JIOT.2021.3113469]
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2023 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
The Internet of Things (IoT) has experienced significant growth and is now a fundamental part of the next-generation Internet. Alongside improving daily life, IoT devices generate and collect vast amounts of data that can be leveraged by AI-enabled big data analytics for diverse applications. However, due to the machine-to-machine communication inherent in IoT, ensuring data security and privacy is crucial to mitigate various malicious cyber attacks, including man-in-the-middle, impersonation, and data poisoning attacks. Nevertheless, designing an efficient and adaptable IoT security framework poses challenges due to the limited computational and communication power of IoT devices, as well as their wide-ranging variety. To address these challenges, this paper proposes an Access Key Agreement (AKA) scheme called the “Reliable Device-Access Framework for the Industrial IoT (RDAF-IIoT)”. RDAF-IIoT verifies the user’s authenticity before granting access to real-time information from IIoT devices deployed in an industrial plant. Once authenticated at the gateway node, the user and IIoT device establish a session key for future encrypted communication. The security of the proposed RDAF-IIoT is validated using a random oracle model, while the Scyther tool is employed to assess its resilience against various security attacks. Performance evaluations demonstrate that the proposed scheme requires lower computational and communication costs compared to related security frameworks while providing enhanced security features.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer