Device-Side Lightweight Mutual Authentication and Key Agreement Scheme Based on Chameleon Hashing for Industrial Internet of Things

被引:1
|
作者
Zhang, Qingyang [1 ,2 ]
Zhou, Xiaolong [1 ,2 ]
Zhong, Hong [1 ,2 ]
Cui, Jie [1 ,2 ]
Li, Jiaxin [1 ,3 ]
He, Debiao [4 ,5 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Minist Educ, Key Lab Intelligent Comp & Signal Proc, Hefei 230039, Peoples R China
[2] Anhui Univ, Anhui Engn Lab IoT Secur Technol, Hefei 230039, Peoples R China
[3] New H3C Grp, Secur Res Inst, Hefei 230088, Peoples R China
[4] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[5] MatrixElements Technol, Shanghai Key Lab Privacy Preserving Computat, Shanghai 201204, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Security; Hash functions; Physical unclonable function; Logic gates; Performance evaluation; Industrial Internet of Things (IIoT); mutual authentication; key agreement; physical unclonable function; chameleon hash function; USER AUTHENTICATION; SECURE; PROTOCOL;
D O I
10.1109/TIFS.2024.3451357
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Several authentication and key agreement (AKA) schemes have been proposed to ensure secure communication in the Industrial Internet of Things (IIoT). However, most of these schemes face two primary problems. First, they cannot resist various attacks, such as impersonation and device capture attacks. Second, these schemes overlook the resource-constrained IIoT devices, failing to guarantee lightweight overhead for device operations. Therefore, we propose a novel and efficient AKA scheme. Utilizing the chameleon hash function and physical unclonable function, the proposed scheme implements a lightweight overhead for both authentication parties while maintaining the overhead of the gateway within a reasonable range. Furthermore, we implement device anonymity based on lightweight operations such as hash and XOR. In addition, we perform a rigorous security analysis using the widely accepted Real-Or-Random model, BAN logic, and Proverif tool. Finally, through heuristic analysis and experiments, we substantiate that our scheme surpasses the compared schemes in terms of both security attributes and system overhead.
引用
收藏
页码:7895 / 7907
页数:13
相关论文
共 50 条
  • [21] A secure and lightweight authentication scheme for digital forensics in industrial internet of things
    Xiao, Nan
    Wang, Zhaoshun
    Sun, Xiaoxue
    ALEXANDRIA ENGINEERING JOURNAL, 2025, 121 : 117 - 127
  • [22] Continuous lightweight authentication according group priority and key agreement for Internet of Things
    Miyanaji, Reza Sarabi
    Jabbehdari, Sam
    Modiri, Nasser
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (07):
  • [23] MARAS: Mutual Authentication and Role-Based Authorization Scheme for Lightweight Internet of Things Applications
    Seker, Oezlem
    Dalkilic, Goekhan
    cabuk, Umut Can
    SENSORS, 2023, 23 (12)
  • [24] Secure Lightweight User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for the Internet of Things Environment
    Jangirala, Srinivas
    Mishra, Dheerendra
    Mukhopadhyay, Sourav
    INFORMATION SYSTEMS SECURITY, 2016, 10063 : 45 - 65
  • [25] SAPFS: An Efficient Symmetric-Key Authentication Key Agreement Scheme With Perfect Forward Secrecy for Industrial Internet of Things
    Zhang, Yunru
    He, Debiao
    Vijayakumar, Pandi
    Luo, Min
    Huang, Xinyi
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (11) : 9716 - 9726
  • [26] A payload-based mutual authentication scheme for Internet of Things
    Jan, Mian Ahmad
    Khan, Fazlullah
    Alam, Muhammad
    Usman, Muhammad
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 92 : 1028 - 1039
  • [27] ECC Based Self-Certified Key Management Scheme for Mutual Authentication in Internet of Things
    Haripriya, A. P.
    Kulothungan, K.
    IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGICAL TRENDS IN COMPUTING, COMMUNICATIONS AND ELECTRICAL ENGINEERING (ICETT), 2016,
  • [28] Provably Secure Lightweight Mutual Authentication and Key Agreement Scheme for Cloud-Based IoT Environments
    Ju, Sieun
    Park, Yohan
    SENSORS, 2023, 23 (24)
  • [29] LAKA: Lightweight Authentication and Key Agreement Protocol for Internet of Things Based Wireless Body Area Network
    Soni, Mukesh
    Singh, Dileep Kumar
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (02) : 1067 - 1084
  • [30] An Efficient Authentication and Key Agreement Scheme for the Internet of Underwater Things (IoUT) Environment
    Almuhaideb, Abdullah M.
    Al-Khulaifi, Dania M.
    IEEE ACCESS, 2024, 12 : 175773 - 175789