A provably secure authenticated key agreement protocol for industrial sensor network system

被引:0
|
作者
Thakur, Garima [1 ]
Obaidat, Mohammad S. [2 ,3 ,4 ,5 ]
Sharma, Piyush [1 ]
Prajapat, Sunil [1 ]
Kumar, Pankaj [1 ]
机构
[1] Cent Univ Himachal Pradesh, Srinivasa Ramanujan Dept Math, Dharamshala 176206, India
[2] Univ Jordan, King Abdullah II Sch Informat Technol, Amman, Jordan
[3] Univ Sci & Technol Beijing, Jordan & Sch Comp & Commun Engn, Beijing, Peoples R China
[4] SRM Univ, Sch Comp, Dept Computat Intelligence, Kattankulathur, Tamil Nadu, India
[5] Amity Univ, Sch Engn, Noida, Uttar Pradesh, India
来源
关键词
authentication; elliptic curve cryptography; industrial internet of things; key agreement; security; 2-FACTOR USER AUTHENTICATION; SCHEME; EXCHANGE;
D O I
10.1002/cpe.8250
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The convergence of reliable and self-organizing characteristics of Wireless Sensor Networks (WSNs) and the IoT has increased the utilization of WSN in different scenarios such as healthcare, industrial units, battlefield monitoring and so forth, yet has also led to significant security risks in their deployment. So, several researchers are developing efficient authentication frameworks with various security and privacy characteristics for WSNs. Subsequently, we review and examine a recently proposed robust key management protocol for an industrial sensor network system. However, their work is incompetent to proffer expedient security and is susceptible to several security attacks. We demonstrate their vulnerabilities against man-in-the-middle attacks, privileged insider attacks, secret key leakage attacks, user, gateway, and sensor node impersonation attacks, and offline password-guessing attacks. We further highlight the design flaw of no session key agreement in Itoo et al. Therefore to alleviate the existing security issues, we devise an improved key agreement and mutual authentication framework. Our protocol outperforms Itoo et al.'s drawbacks, as demonstrated by the comprehensive security proof performed using the real-or-random (ROR) model and the formal verification accomplished using the Automated Validation of Internet Security Protocols (AVISPA) tool.
引用
下载
收藏
页数:24
相关论文
共 50 条
  • [41] Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT
    Vinoth, R.
    Deborah, Lazarus Jegatha
    Vijayakumar, Pandi
    Kumar, Neeraj
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (05) : 3801 - 3811
  • [42] Authenticated key agreement protocol for wireless sensor networks
    Li, Zhang
    Bin, Xie
    Qiang, He Z.
    Quan, Jin Y.
    Open Cybernetics and Systemics Journal, 2014, 8 (01): : 98 - 103
  • [43] Provably secured lightweight authenticated key agreement protocol for modern health industry
    Abdussami, Mohammad
    Amin, Ruhul
    Vollala, Satyanarayana
    AD HOC NETWORKS, 2023, 141
  • [44] Strongly Secure Identity-based Authenticated Key Agreement for Wireless Sensor Network
    Shui, Guohong
    Chen, Ming
    DISASTER ADVANCES, 2012, 5 : 187 - 195
  • [45] ECC-Based Authenticated Key Agreement Protocol for Industrial Control System
    Chen, Yanru
    Yin, Fengming
    Hu, Shunfang
    Sun, Limin
    Li, Yang
    Xing, Bin
    Chen, Liangyin
    Guo, Bing
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (06) : 4688 - 4697
  • [46] Provably secure and password-authenticated hybrid key agreement protocol in two-realm with privacy-protection
    Zhu, Dan
    Zhu, Hong Feng
    Geng, Shuai
    Wang, Rui
    Journal of Information Hiding and Multimedia Signal Processing, 2018, 9 (04): : 775 - 784
  • [47] A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Vijayakumar, Pandi
    Kumar, Neeraj
    Park, YoHan
    IEEE SYSTEMS JOURNAL, 2021, 15 (02): : 1732 - 1741
  • [48] An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks
    Ma, Mimi
    He, Debiao
    Wang, Huaqun
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) : 8065 - 8075
  • [49] A provably-secure password-authenticated group key agreement in the standard model
    Fu, Xiu
    Xu, Qiuliang
    Wang, Hao
    Journal of Networks, 2009, 4 (08) : 763 - 770
  • [50] Provably secure authenticated key agreement scheme for distributed mobile cloud computing services
    Odelu, Vanga
    Das, Ashok Kumar
    Kumari, Saru
    Huang, Xinyi
    Wazid, Mohammad
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 68 : 74 - 88