A continuous authentication scheme for zero-trust architecture in industrial internet of things

被引:0
|
作者
Wan, Tao [1 ]
Shi, Buhai [1 ]
Wang, Huan [2 ]
机构
[1] School of Automation Science and Engineering, South China University of Technology, Guangzhou,510641, China
[2] Industrial Technology Research Center, Guangdong Institute of Scientific & Technical Information, Guangzhou,510000, China
关键词
D O I
10.1016/j.aej.2025.03.012
中图分类号
学科分类号
摘要
Industrial Internet of Things (IIoT) allows users to access industrial devices and their data, but it also poses certain challenges to industrial data security. Authentication protocols are highly effective security techniques for protecting industrial data. This paper establishes a zero-trust architecture in the IIoT and proposes an authentication protocol suitable for zero-trust IIoT. The proposed scheme utilizes physical unclonable functions (PUF) for device authentication. Initial device authentication employs PUF to verify identity and establish session keys before session initiation, while continuous authentication verifies device location during the session to ensure that authenticated devices remain unaltered. Meanwhile, the scheme integrates three-factor authentication for user verification, ensuring secure user access. The proposed scheme establishes secure session key for users, gateways and IIoT devices, effectively guaranteeing the security of subsequent communications. Formal security analysis proves the security. Additionally, detailed informal security discussions demonstrate that the scheme can withstand known attacks and meet design objectives. Furthermore, performance evaluation reveals that the proposed scheme incurs low costs while providing enhanced security. © 2025 The Authors
引用
收藏
页码:555 / 563
相关论文
共 50 条
  • [31] Blending Shared Responsibility and Zero Trust to Secure the Industrial Internet of Things
    Crowther, Kenneth G.
    IEEE SECURITY & PRIVACY, 2024, 22 (05) : 96 - 102
  • [32] Joint Design of Multi-Dimensional Multiple Access and Lightweight Continuous Authentication in Zero-Trust Environments
    Fang, He
    Wang, Xianbin
    Al-Dhahir, Naofal
    Schober, Robert
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 3366 - 3371
  • [33] Lightweight Authentication Scheme for Internet of Things
    Haenel, Arie
    Haddad, Yoram
    Zhang, Zonghua
    2020 IEEE 17TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC 2020), 2020,
  • [34] A secure authentication scheme for Internet of Things
    Wang, King-Hang
    Chen, Chien-Ming
    Fang, Weicheng
    Wu, Tsu-Yang
    PERVASIVE AND MOBILE COMPUTING, 2017, 42 : 15 - 26
  • [35] Decentralized Edge Collaboration for Seamless Handover Authentication in Zero-Trust IoV
    Fang, He
    Zhu, Yongxu
    Zhang, Yan
    Wang, Xianbin
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2024, 23 (08) : 8760 - 8772
  • [36] ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology
    Gutmann, Andreas
    Renaud, Karen
    Maguire, Joseph
    Mayer, Peter
    Volkamer, Melanie
    Matsuura, Kanta
    Mueller-Quade, Jorn
    1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, : 357 - 371
  • [37] An Authentication Mechanism Based on Zero Trust With Radio Frequency Fingerprint for Internet of Things Networks
    Jing, Wentao
    Peng, Linning
    Fu, Hua
    Hu, Aiqun
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (13): : 23683 - 23698
  • [38] Continuous Authentication and Authorization for the Internet of Things
    Shahzad, Muhammad
    Singh, Munindar P.
    IEEE INTERNET COMPUTING, 2017, 21 (02) : 86 - 90
  • [39] Decentralized Web of Trust and Authentication for the Internet of Things
    Durand, Arnaud
    Gremaud, Pascal
    Pasquier, Jacques
    IOT'17: PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS, 2017, : 175 - 176
  • [40] Trust and Voice Biometrics Authentication for Internet of Things
    Wells, Alec
    Usman, Aminu Bello
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2023, 17 (01)