CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things

被引:22
|
作者
Tanveer, Muhammad [1 ]
Badshah, Akhtar [2 ]
Khan, Abd Ullah [3 ]
Alasmary, Hisham [4 ]
Chaudhry, Shehzad Ashraf [5 ,6 ]
机构
[1] Univ Management & Technol, Dept Comp Sci, Lahore 54770, Pakistan
[2] Univ Malakand, Dept Software Engn, Dir Lower 18800, Pakistan
[3] Natl Univ Sci & Technol, Dept Comp Sci, Islamabad, Pakistan
[4] King Khalid Univ, Coll Comp Sci, Dept Comp Sci, Abha 61421, Saudi Arabia
[5] Abu Dhabi Univ, Coll Engn, Dept Comp Sci & Informat Technol, Abu Dhabi, U Arab Emirates
[6] Nisantasi Univ, Fac Engn & Architecture, Dept Software Engn, Istanbul, Turkiye
关键词
Privacy; Scyther; ASCON; Internet of Things; Encryption; Session key; Authentication; HEALTH-CARE-SYSTEM; PROTOCOL; SCHEME; MANAGEMENT; LIGHTWEIGHT; NETWORK;
D O I
10.1016/j.iot.2023.100902
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Industrial Internet of Things (IIoT) revolutionizes industrial production using smart devices (SMDs) deployed in IIoT environments. These SMDs collect and transmit information from target fields for analysis and can be controlled remotely. In emergency situations, real-time access to specific SMD information is crucial for prompt actions. However, ensuring secure and reliable communication between users and SMDs in untrusted channels is a significant challenge. Privacy concerns and the limitations of existing authentication frameworks further exacerbate this challenge, necessitating a lightweight cryptography-based authentication framework. This framework is essential to enable secure and reliable communication in the diverse IIoT environ-ment while addressing privacy leakage threats and the computational constraints of IoT devices. Recently, various lightweight cryptography-based authenticated encryption (AE) schemes have been proposed to enable encryption and decryption services for resource-constrained IIoT devices. ASCON, an efficient AE scheme, offers confidentiality, integrity, and authenticity in a single encryption and decryption operation, reducing the number of cryptographic operations required for authentication framework design. This paper presents CMAF-IIoT, a chaotic map and resource-efficient AE scheme (ASCON)-based authentication framework for IIoT, addressing the aforementioned challenges. CMAF-IIoT ensures reliable communication between SMDs and users. The framework begins with user-performed local authentication on their smart devices, followed by the establishment of a session key with the SMD after mutual authentication with the gateway. Using the session key, users securely access real-time information from SMDs deployed in the IIoT environment. The security of CMAF-IIoT is validated through formal and informal security analyses. Additionally, the efficiency of CMAF-IIoT is evaluated in terms of communication, computational, and storage costs. The results indicate that CMAF-IIoT requires [6.67% to 53.33%] low storage cost, [45.13% to 65.87%] low computational cost, and [16.46% to 83.29%] low communication cost compared to contrasted authentication frameworks. These findings highlight the viability of CMAF-IIoT for the IIoT environment, as it provides resource efficiency and enhanced security features.
引用
下载
收藏
页数:18
相关论文
共 50 条
  • [1] CMAP-IoT: Chaotic Map-Based Authentication Protocol for Crowdsourcing Internet of Things
    Muhammad Tanveer
    Muhammad Nasir Mumtaz Bhutta
    Bander A. Alzahrani
    Aiiad Albeshri
    Khalid Alsubhi
    Shehzad Ashraf Chaudhry
    Arabian Journal for Science and Engineering, 2024, 49 : 3453 - 3466
  • [2] CMAP-IoT: Chaotic Map-Based Authentication Protocol for Crowdsourcing Internet of Things
    Tanveer, Muhammad
    Bhutta, Muhammad Nasir Mumtaz
    Alzahrani, Bander A.
    Albeshri, Aiiad
    Alsubhi, Khalid
    Chaudhry, Shehzad Ashraf
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, 49 (03) : 3453 - 3466
  • [3] LEAF-IIoT: Lightweight and Efficient Authentication Framework for the Industrial Internet of Things
    Tanveer, Muhammad
    Abd El-Latif, Ahmed A.
    Khan, Abd Ullah
    Ahmad, Musheer
    Ateya, Abdelhamied A.
    IEEE ACCESS, 2024, 12 : 31771 - 31787
  • [4] Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things
    Srinivas, Jangirala
    Das, Ashok Kumar
    Wazid, Mohammad
    Kumar, Neeraj
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1133 - 1146
  • [5] The industrial internet of things (IIoT): An analysis framework
    Boyes, Hugh
    Hallaq, Bit
    Cunningham, Joe
    Watson, Tim
    COMPUTERS IN INDUSTRY, 2018, 101 : 1 - 12
  • [6] Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things
    Roy, Sandip
    Chatterjee, Santanu
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Kumari, Saru
    Jo, Minho
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 2884 - 2895
  • [7] User authentication of industrial internet of things (IIoT) through Blockchain
    Devi, Anju
    Kumar, Amit
    Rathee, Geetanjali
    Saini, Hemraj
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (12) : 19021 - 19039
  • [8] User authentication of industrial internet of things (IIoT) through Blockchain
    Anju Devi
    Amit Kumar
    Geetanjali Rathee
    Hemraj Saini
    Multimedia Tools and Applications, 2023, 82 : 19021 - 19039
  • [9] A Reliable Public Safety Framework for Industrial Internet of Things (IIoT)
    Reegu, Faheem
    Khan, Wazir Zada
    Daud, Salwani Mohd
    Arshad, Quratulain
    Armi, Nasrullah
    2020 INTERNATIONAL CONFERENCE ON RADAR, ANTENNA, MICROWAVE, ELECTRONICS, AND TELECOMMUNICATIONS (ICRAMET): FOSTERING INNOVATION THROUGH ICTS FOR SUSTAINABLE SMART SOCIETY, 2020, : 189 - 193
  • [10] Construction of a Chaotic Map-Based Authentication Protocol for TMIS
    Dharminder Dharminder
    Nibedita Kundu
    Dheerendra Mishra
    Journal of Medical Systems, 2021, 45