Device-Side Lightweight Mutual Authentication and Key Agreement Scheme Based on Chameleon Hashing for Industrial Internet of Things

被引:1
|
作者
Zhang, Qingyang [1 ,2 ]
Zhou, Xiaolong [1 ,2 ]
Zhong, Hong [1 ,2 ]
Cui, Jie [1 ,2 ]
Li, Jiaxin [1 ,3 ]
He, Debiao [4 ,5 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Minist Educ, Key Lab Intelligent Comp & Signal Proc, Hefei 230039, Peoples R China
[2] Anhui Univ, Anhui Engn Lab IoT Secur Technol, Hefei 230039, Peoples R China
[3] New H3C Grp, Secur Res Inst, Hefei 230088, Peoples R China
[4] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[5] MatrixElements Technol, Shanghai Key Lab Privacy Preserving Computat, Shanghai 201204, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Security; Hash functions; Physical unclonable function; Logic gates; Performance evaluation; Industrial Internet of Things (IIoT); mutual authentication; key agreement; physical unclonable function; chameleon hash function; USER AUTHENTICATION; SECURE; PROTOCOL;
D O I
10.1109/TIFS.2024.3451357
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Several authentication and key agreement (AKA) schemes have been proposed to ensure secure communication in the Industrial Internet of Things (IIoT). However, most of these schemes face two primary problems. First, they cannot resist various attacks, such as impersonation and device capture attacks. Second, these schemes overlook the resource-constrained IIoT devices, failing to guarantee lightweight overhead for device operations. Therefore, we propose a novel and efficient AKA scheme. Utilizing the chameleon hash function and physical unclonable function, the proposed scheme implements a lightweight overhead for both authentication parties while maintaining the overhead of the gateway within a reasonable range. Furthermore, we implement device anonymity based on lightweight operations such as hash and XOR. In addition, we perform a rigorous security analysis using the widely accepted Real-Or-Random model, BAN logic, and Proverif tool. Finally, through heuristic analysis and experiments, we substantiate that our scheme surpasses the compared schemes in terms of both security attributes and system overhead.
引用
收藏
页码:7895 / 7907
页数:13
相关论文
共 50 条
  • [1] A Lightweight Mutual Authentication and Key Agreement Scheme for Medical Internet of Things
    Xu, Zisang
    Xu, Cheng
    Liang, Wei
    Xu, Jianbo
    Chen, Haixian
    IEEE ACCESS, 2019, 7 : 53922 - 53931
  • [2] SLAK: secure lightweight scheme for authentication and key-agreement in internet of things
    Nahnah, Oussama
    Cherbal, Sarra
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (02)
  • [3] Lightweight Mutual Authentication Scheme Based on Blockchain for Internet of Medical Things
    Qiu, Shi
    Li, Jinqing
    Di, Xiaoqiang
    Li, Xusheng
    Wu, Yunlong
    Ibrahim, Makram
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (07): : 8848 - 8861
  • [4] A lightweight authentication and key agreement scheme for Internet of Drones
    Zhang, Yunru
    He, Debiao
    Li, Li
    Chen, Biwen
    COMPUTER COMMUNICATIONS, 2020, 154 : 455 - 464
  • [5] A secure and efficient authentication key agreement scheme for industrial internet of things based on edge computing
    Zhu, Wenlong
    Chen, Xuexiao
    Jiang, Linmei
    ALEXANDRIA ENGINEERING JOURNAL, 2024, 101 : 52 - 61
  • [6] MAKE-IT-A Lightweight Mutual Authentication and Key Exchange Protocol for Industrial Internet of Things
    Choudhary, Karanjeet
    Gaba, Gurjot Singh
    Butun, Ismail
    Kumar, Pardeep
    SENSORS, 2020, 20 (18) : 1 - 21
  • [7] A lightweight anonymous mutual authentication and key agreement scheme for WBAN
    Xu, Zisang
    Xu, Cheng
    Chen, Haixian
    Yang, Fang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (14):
  • [8] A lightweight and anonymous mutual authentication and key agreement scheme for WBAN
    Marandi, Saba
    Moazami, Farokhlagha
    Malekinezhad, Amir
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (04) : 2555 - 2571
  • [9] A New Lightweight Authentication and Key agreement Protocol For Internet of Things
    Arasteh, Sima
    Aghili, Seyed Farhad
    Mala, Hamid
    2016 13TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2016, : 52 - 59
  • [10] Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things
    Gong, Xiang
    Feng, Tao
    SENSORS, 2022, 22 (19)