Securing Fog Computing-based Industry 4.0 Communication Using Authenticated Key Agreement Scheme

被引:1
|
作者
Mishra, Amit Kumar [1 ]
Wazid, Mohammad [1 ]
Singh, D. P. [1 ]
Das, Ashok Kumar [2 ]
Guizani, Mohsen [3 ]
机构
[1] Graph Era Deemed be Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] Mohamed Bin Zayed Univ Artificial Intelligence, Machine Learning Dept, Abu Dhabi 51133, U Arab Emirates
关键词
Industry; 4.0; Internet of Things (IoT); Fog computing; Authentication and key agreement; Security; DEVICE ACCESS-CONTROL; PROTOCOL;
D O I
10.1109/IWCMC58020.2023.10183021
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Internet of Things (IoT)-based smart factories offer the manufacturing sectors a great opportunity to embrace the fourth industrial revolution (Industry 4.0). The real-time monitoring of manufacturing operations in an Industry 4.0 needs to be ensured by the deployed technologies, like Artificial Intelligence (AI) and Big Data analytics. The overall purpose is to improve the outcomes of the production process. However, Industry 4.0 becomes vulnerable to different potential attacks as the communication takes place via public environments. In this article, an authentication and key agreement method has been suggested to secure the communication that can occur in a Fog-based Industry 4.0 environment. The security proposal provides secure mutual authentication along with key establishment between various smart industrial devices and fog servers, as well as between fog servers and cloud servers. The security analysis and comparative study reveal that the proposed method can mitigate various potential attacks, and it also offers important security and functionality attributes as compared to those for other competing schemes.
引用
收藏
页码:1448 / 1453
页数:6
相关论文
共 50 条
  • [1] Authenticated Key Agreement Scheme for Fog Computing in a Health-Care Environment
    Huang, Yin-Tzu
    Chen, Tzer-Shyong
    Wang, Sheng-De
    [J]. IEEE ACCESS, 2023, 11 : 46871 - 46881
  • [2] A secure authenticated and key exchange scheme for fog computing
    Chen, Chien-Ming
    Huang, Yanyu
    Wang, King-Hang
    Kumari, Saru
    Wu, Mu-En
    [J]. ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (09) : 1200 - 1215
  • [3] Fog Computing Based Efficient IoT Scheme for the Industry 4.0
    Peralta, Goiuri
    Iglesias-Urkia, Markel
    Barcelo, Marc
    Gomez, Raul
    Moran, Adrian
    Bilbao, Josu
    [J]. 2017 IEEE INTERNATIONAL WORKSHOP OF ELECTRONICS, CONTROL, MEASUREMENT, SIGNALS AND THEIR APPLICATION TO MECHATRONICS (ECMSM), 2017,
  • [4] AUTHENTICATED KEY AGREEMENT SCHEME BASED ON BLOCKCHAIN FOR AMI COMMUNICATION SECURITY
    Liu, Zhendong
    Meng, Liang
    Zhao, Qingyuan
    Li, Fei
    Song, Manrui
    Jian, Yuzhi
    Tian, Hongliang
    [J]. REVUE ROUMAINE DES SCIENCES TECHNIQUES-SERIE ELECTROTECHNIQUE ET ENERGETIQUE, 2023, 68 (02): : 218 - 223
  • [5] An efficient and authenticated key establishment scheme based on fog computing for healthcare system
    Li, Xinghua
    Chen, Ting
    Cheng, Qingfeng
    Ma, Jianfeng
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (04)
  • [6] An efficient and authenticated key establishment scheme based on fog computing for healthcare system
    LI Xinghua
    CHEN Ting
    CHENG Qingfeng
    MA Jianfeng
    [J]. Frontiers of Computer Science, 2022, 16 (04)
  • [7] An efficient and authenticated key establishment scheme based on fog computing for healthcare system
    Xinghua Li
    Ting Chen
    Qingfeng Cheng
    Jianfeng Ma
    [J]. Frontiers of Computer Science, 2022, 16
  • [8] ACKS-IA: An Access Control and Key Agreement Scheme for Securing Industry 4.0 Applications
    Mishra, Amit Kumar
    Wazid, Mohammad
    Singh, Devesh Pratap
    Das, Ashok Kumar
    Roy, Sandip
    Shetty, Sachin
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (01): : 254 - 269
  • [9] AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment
    Wazid, Mohammad
    Bagga, Palak
    Das, Ashok Kumar
    Shetty, Sachin
    Rodrigues, Joel J. P. C.
    Park, Youngho
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) : 8804 - 8817
  • [10] Secure hierarchical fog computing-based architecture for industry 5.0 using an attribute-based encryption scheme
    Shruti
    Rani, Shalli
    Srivastava, Gautam
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2024, 235