Device-Side Lightweight Mutual Authentication and Key Agreement Scheme Based on Chameleon Hashing for Industrial Internet of Things

被引:1
|
作者
Zhang, Qingyang [1 ,2 ]
Zhou, Xiaolong [1 ,2 ]
Zhong, Hong [1 ,2 ]
Cui, Jie [1 ,2 ]
Li, Jiaxin [1 ,3 ]
He, Debiao [4 ,5 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Minist Educ, Key Lab Intelligent Comp & Signal Proc, Hefei 230039, Peoples R China
[2] Anhui Univ, Anhui Engn Lab IoT Secur Technol, Hefei 230039, Peoples R China
[3] New H3C Grp, Secur Res Inst, Hefei 230088, Peoples R China
[4] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[5] MatrixElements Technol, Shanghai Key Lab Privacy Preserving Computat, Shanghai 201204, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Security; Hash functions; Physical unclonable function; Logic gates; Performance evaluation; Industrial Internet of Things (IIoT); mutual authentication; key agreement; physical unclonable function; chameleon hash function; USER AUTHENTICATION; SECURE; PROTOCOL;
D O I
10.1109/TIFS.2024.3451357
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Several authentication and key agreement (AKA) schemes have been proposed to ensure secure communication in the Industrial Internet of Things (IIoT). However, most of these schemes face two primary problems. First, they cannot resist various attacks, such as impersonation and device capture attacks. Second, these schemes overlook the resource-constrained IIoT devices, failing to guarantee lightweight overhead for device operations. Therefore, we propose a novel and efficient AKA scheme. Utilizing the chameleon hash function and physical unclonable function, the proposed scheme implements a lightweight overhead for both authentication parties while maintaining the overhead of the gateway within a reasonable range. Furthermore, we implement device anonymity based on lightweight operations such as hash and XOR. In addition, we perform a rigorous security analysis using the widely accepted Real-Or-Random model, BAN logic, and Proverif tool. Finally, through heuristic analysis and experiments, we substantiate that our scheme surpasses the compared schemes in terms of both security attributes and system overhead.
引用
收藏
页码:7895 / 7907
页数:13
相关论文
共 50 条
  • [31] LAKA: Lightweight Authentication and Key Agreement Protocol for Internet of Things Based Wireless Body Area Network
    Mukesh Soni
    Dileep Kumar Singh
    Wireless Personal Communications, 2022, 127 : 1067 - 1084
  • [32] Mutual Authentication Scheme for the Device-to-Server Communication in the Internet of Medical Things
    Sun, Jiangfeng
    Khan, Fazlullah
    Li, Junxia
    Alshehri, Mohammad Dahman
    Alturki, Ryan
    Wedyan, Mohammad
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (21) : 15663 - 15671
  • [33] An efficient lightweight authentication scheme for human-centered industrial Internet of Things
    Singh, Jaya
    Gimekar, Ashish
    Venkatesan, Subramanian
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2023, 36 (12)
  • [34] A Lightweight Combined Physical Layer Encryption and Authentication Scheme for Industrial Internet of Things
    Wang, Junjie
    Han, Gangtao
    Li, Shuangzhi
    Zhou, Fasheng
    Wang, Ning
    IEEE ACCESS, 2024, 12 : 6961 - 6970
  • [35] An authentication and key agreement mechanism for OPC Unified Architecture in industrial Internet of Things
    Wei, Min
    Zhang, Shuaidong
    Wang, Ping
    Kim, Keecheon
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (01):
  • [36] LCDMA: Lightweight Cross-Domain Mutual Identity Authentication Scheme for Internet of Things
    Gong, Bei
    Zheng, Guiping
    Waqas, Muhammad
    Tu, Shanshan
    Chen, Sheng
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (14) : 12590 - 12602
  • [37] A secure and lightweight anonymous mutual authentication scheme for wearable devices in Medical Internet of Things
    Gupta, Ankur
    Tripathi, Meenakshi
    Muhuri, Samya
    Singal, Gaurav
    Kumar, Neeraj
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 68
  • [38] Authentication scheme for industrial Internet of things based on DAG blockchain
    Fei T.
    Kun D.
    Zhangtao Y.
    Guowei L.
    Fei, Tang (tangfei@cqupt.edu.cn), 1600, Beijing University of Posts and Telecommunications (28): : 1 - 12
  • [39] A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT)
    Hammi, Badis
    Fayad, Achraf
    Khatoun, Rida
    Zeadally, Sherali
    Begriche, Youcef
    IEEE SYSTEMS JOURNAL, 2020, 14 (03): : 3440 - 3450
  • [40] Authentication scheme for industrial Internet of things based on DAG blockchain
    Tang Fei
    Dong Kun
    Ye Zhangtao
    Ling Guowei
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2021, 28 (06) : 1 - 12