A continuous authentication scheme for zero-trust architecture in industrial internet of things

被引:0
|
作者
Wan, Tao [1 ]
Shi, Buhai [1 ]
Wang, Huan [2 ]
机构
[1] School of Automation Science and Engineering, South China University of Technology, Guangzhou,510641, China
[2] Industrial Technology Research Center, Guangdong Institute of Scientific & Technical Information, Guangzhou,510000, China
关键词
D O I
10.1016/j.aej.2025.03.012
中图分类号
学科分类号
摘要
Industrial Internet of Things (IIoT) allows users to access industrial devices and their data, but it also poses certain challenges to industrial data security. Authentication protocols are highly effective security techniques for protecting industrial data. This paper establishes a zero-trust architecture in the IIoT and proposes an authentication protocol suitable for zero-trust IIoT. The proposed scheme utilizes physical unclonable functions (PUF) for device authentication. Initial device authentication employs PUF to verify identity and establish session keys before session initiation, while continuous authentication verifies device location during the session to ensure that authenticated devices remain unaltered. Meanwhile, the scheme integrates three-factor authentication for user verification, ensuring secure user access. The proposed scheme establishes secure session key for users, gateways and IIoT devices, effectively guaranteeing the security of subsequent communications. Formal security analysis proves the security. Additionally, detailed informal security discussions demonstrate that the scheme can withstand known attacks and meet design objectives. Furthermore, performance evaluation reveals that the proposed scheme incurs low costs while providing enhanced security. © 2025 The Authors
引用
收藏
页码:555 / 563
相关论文
共 50 条
  • [41] Efficient Implementation of Entity On-Boarding and Authentication in Zero-Trust Systems
    Rana, Jayashree
    Meher, Pramod Kumar
    Priyadarshini, Rojalina
    Rao, K. Pratyush
    2024 IEEE INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS, PKIA 2024, 2024,
  • [42] Secure Access Method of Power Internet of Things Based on Zero Trust Architecture
    Wang, Zhi-hua
    Jin, Ming-hui
    Jiang, Lin
    Feng, Chen-jia
    Cao, Jing-yi
    Yun, Zhang
    ADVANCES IN SWARM INTELLIGENCE, ICSI 2023, PT II, 2023, 13969 : 386 - 399
  • [43] An efficient lightweight authentication scheme for human-centered industrial Internet of Things
    Singh, Jaya
    Gimekar, Ashish
    Venkatesan, Subramanian
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2023, 36 (12)
  • [44] A Lightweight Combined Physical Layer Encryption and Authentication Scheme for Industrial Internet of Things
    Wang, Junjie
    Han, Gangtao
    Li, Shuangzhi
    Zhou, Fasheng
    Wang, Ning
    IEEE ACCESS, 2024, 12 : 6961 - 6970
  • [45] An authentication and key agreement mechanism for OPC Unified Architecture in industrial Internet of Things
    Wei, Min
    Zhang, Shuaidong
    Wang, Ping
    Kim, Keecheon
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (01):
  • [46] CAB-IoT: Continuous authentication architecture based on Blockchain for internet of things
    Al-Naji, Fatimah Hussain
    Zagrouba, Rachid
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (06) : 2497 - 2514
  • [47] Trust Management in Industrial Internet of Things
    Boudagdigue, Chaimaa
    Benslimane, Abderrahim
    Kobbane, Abdellatif
    Liu, Jiajia
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 3667 - 3682
  • [48] Trust No One? A Framework for Assisting Healthcare Organisations in Transitioning to a Zero-Trust Network Architecture
    Tyler, Dan
    Viana, Thiago
    APPLIED SCIENCES-BASEL, 2021, 11 (16):
  • [49] An Efficient Mutual Authentication Scheme for Internet of Things
    Mbarek, Bacem
    Ge, Mouzhi
    Pitner, Tomas
    INTERNET OF THINGS, 2020, 9
  • [50] A lightweight hierarchical authentication scheme for internet of things
    Aida Akbarzadeh
    Majid Bayat
    Behnam Zahednejad
    Ali Payandeh
    Mohammad Reza Aref
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 2607 - 2619