CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things

被引:22
|
作者
Tanveer, Muhammad [1 ]
Badshah, Akhtar [2 ]
Khan, Abd Ullah [3 ]
Alasmary, Hisham [4 ]
Chaudhry, Shehzad Ashraf [5 ,6 ]
机构
[1] Univ Management & Technol, Dept Comp Sci, Lahore 54770, Pakistan
[2] Univ Malakand, Dept Software Engn, Dir Lower 18800, Pakistan
[3] Natl Univ Sci & Technol, Dept Comp Sci, Islamabad, Pakistan
[4] King Khalid Univ, Coll Comp Sci, Dept Comp Sci, Abha 61421, Saudi Arabia
[5] Abu Dhabi Univ, Coll Engn, Dept Comp Sci & Informat Technol, Abu Dhabi, U Arab Emirates
[6] Nisantasi Univ, Fac Engn & Architecture, Dept Software Engn, Istanbul, Turkiye
关键词
Privacy; Scyther; ASCON; Internet of Things; Encryption; Session key; Authentication; HEALTH-CARE-SYSTEM; PROTOCOL; SCHEME; MANAGEMENT; LIGHTWEIGHT; NETWORK;
D O I
10.1016/j.iot.2023.100902
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Industrial Internet of Things (IIoT) revolutionizes industrial production using smart devices (SMDs) deployed in IIoT environments. These SMDs collect and transmit information from target fields for analysis and can be controlled remotely. In emergency situations, real-time access to specific SMD information is crucial for prompt actions. However, ensuring secure and reliable communication between users and SMDs in untrusted channels is a significant challenge. Privacy concerns and the limitations of existing authentication frameworks further exacerbate this challenge, necessitating a lightweight cryptography-based authentication framework. This framework is essential to enable secure and reliable communication in the diverse IIoT environ-ment while addressing privacy leakage threats and the computational constraints of IoT devices. Recently, various lightweight cryptography-based authenticated encryption (AE) schemes have been proposed to enable encryption and decryption services for resource-constrained IIoT devices. ASCON, an efficient AE scheme, offers confidentiality, integrity, and authenticity in a single encryption and decryption operation, reducing the number of cryptographic operations required for authentication framework design. This paper presents CMAF-IIoT, a chaotic map and resource-efficient AE scheme (ASCON)-based authentication framework for IIoT, addressing the aforementioned challenges. CMAF-IIoT ensures reliable communication between SMDs and users. The framework begins with user-performed local authentication on their smart devices, followed by the establishment of a session key with the SMD after mutual authentication with the gateway. Using the session key, users securely access real-time information from SMDs deployed in the IIoT environment. The security of CMAF-IIoT is validated through formal and informal security analyses. Additionally, the efficiency of CMAF-IIoT is evaluated in terms of communication, computational, and storage costs. The results indicate that CMAF-IIoT requires [6.67% to 53.33%] low storage cost, [45.13% to 65.87%] low computational cost, and [16.46% to 83.29%] low communication cost compared to contrasted authentication frameworks. These findings highlight the viability of CMAF-IIoT for the IIoT environment, as it provides resource efficiency and enhanced security features.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] REAP-IIoT: Resource-Efficient Authentication Protocol for the Industrial Internet of Things
    Tanveer, Muhammad
    Alkhayyat, Ahmed
    Khan, Abd Ullah
    Kumar, Neeraj
    Alharbi, Abdullah G.
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (23) : 24453 - 24465
  • [22] A Secure Industrial Internet of Things (IIoT) Framework for Resource Management in Smart Manufacturing
    Abuhasel, Khaled Ali
    Khan, Mohammad Ayoub
    IEEE ACCESS, 2020, 8 : 117354 - 117364
  • [23] Industry 4.0: Industrial Internet of Things (IIOT)
    Munirathinam, Sathyan
    DIGITAL TWIN PARADIGM FOR SMARTER SYSTEMS AND ENVIRONMENTS: THE INDUSTRY USE CASES, 2020, 117 : 129 - 164
  • [24] Network Optimization for Industrial Internet of Things (IIoT)
    Khalil, Ruhul Amin
    Saeed, Nasir
    IEEE SENSORS LETTERS, 2020, 4 (07)
  • [25] A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Hao, Xinhong
    Wang, Jiantao
    Yang, Qinghai
    Yan, Xiaopeng
    Li, Ping
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)
  • [26] Security Attacks and Enhancements to Chaotic Map-Based RFID Authentication Protocols
    Kardas, Suleyman
    Genc, Ziya Alper
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (01) : 1135 - 1154
  • [27] A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Xinhong Hao
    Jiantao Wang
    Qinghai Yang
    Xiaopeng Yan
    Ping Li
    Journal of Medical Systems, 2013, 37
  • [28] Security Attacks and Enhancements to Chaotic Map-Based RFID Authentication Protocols
    Süleyman Kardaş
    Ziya Alper Genç
    Wireless Personal Communications, 2018, 98 : 1135 - 1154
  • [29] PUF and Chaotic Map-Based Authentication Protocol for Underwater Acoustic Networks
    Xie, Qi
    Yao, Ye
    APPLIED SCIENCES-BASEL, 2024, 14 (13):
  • [30] Efficient Extended Chaotic Map-Based IBE for Industrial Environment
    Lee, Tian-Fu
    Huang, Yi-Chien
    IEEE ACCESS, 2022, 10 : 71278 - 71283