CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things

被引:22
|
作者
Tanveer, Muhammad [1 ]
Badshah, Akhtar [2 ]
Khan, Abd Ullah [3 ]
Alasmary, Hisham [4 ]
Chaudhry, Shehzad Ashraf [5 ,6 ]
机构
[1] Univ Management & Technol, Dept Comp Sci, Lahore 54770, Pakistan
[2] Univ Malakand, Dept Software Engn, Dir Lower 18800, Pakistan
[3] Natl Univ Sci & Technol, Dept Comp Sci, Islamabad, Pakistan
[4] King Khalid Univ, Coll Comp Sci, Dept Comp Sci, Abha 61421, Saudi Arabia
[5] Abu Dhabi Univ, Coll Engn, Dept Comp Sci & Informat Technol, Abu Dhabi, U Arab Emirates
[6] Nisantasi Univ, Fac Engn & Architecture, Dept Software Engn, Istanbul, Turkiye
关键词
Privacy; Scyther; ASCON; Internet of Things; Encryption; Session key; Authentication; HEALTH-CARE-SYSTEM; PROTOCOL; SCHEME; MANAGEMENT; LIGHTWEIGHT; NETWORK;
D O I
10.1016/j.iot.2023.100902
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Industrial Internet of Things (IIoT) revolutionizes industrial production using smart devices (SMDs) deployed in IIoT environments. These SMDs collect and transmit information from target fields for analysis and can be controlled remotely. In emergency situations, real-time access to specific SMD information is crucial for prompt actions. However, ensuring secure and reliable communication between users and SMDs in untrusted channels is a significant challenge. Privacy concerns and the limitations of existing authentication frameworks further exacerbate this challenge, necessitating a lightweight cryptography-based authentication framework. This framework is essential to enable secure and reliable communication in the diverse IIoT environ-ment while addressing privacy leakage threats and the computational constraints of IoT devices. Recently, various lightweight cryptography-based authenticated encryption (AE) schemes have been proposed to enable encryption and decryption services for resource-constrained IIoT devices. ASCON, an efficient AE scheme, offers confidentiality, integrity, and authenticity in a single encryption and decryption operation, reducing the number of cryptographic operations required for authentication framework design. This paper presents CMAF-IIoT, a chaotic map and resource-efficient AE scheme (ASCON)-based authentication framework for IIoT, addressing the aforementioned challenges. CMAF-IIoT ensures reliable communication between SMDs and users. The framework begins with user-performed local authentication on their smart devices, followed by the establishment of a session key with the SMD after mutual authentication with the gateway. Using the session key, users securely access real-time information from SMDs deployed in the IIoT environment. The security of CMAF-IIoT is validated through formal and informal security analyses. Additionally, the efficiency of CMAF-IIoT is evaluated in terms of communication, computational, and storage costs. The results indicate that CMAF-IIoT requires [6.67% to 53.33%] low storage cost, [45.13% to 65.87%] low computational cost, and [16.46% to 83.29%] low communication cost compared to contrasted authentication frameworks. These findings highlight the viability of CMAF-IIoT for the IIoT environment, as it provides resource efficiency and enhanced security features.
引用
收藏
页数:18
相关论文
共 50 条
  • [31] Cloud-assisted Industrial Internet of Things (IIoT) - Enabled framework for health monitoring
    Hossain, M. Shamim
    Muhammad, Ghulam
    COMPUTER NETWORKS, 2016, 101 : 192 - 202
  • [32] DC-IIoT: A Secure and Efficient Authentication Protocol for Industrial Internet-of-Things Based on Distributed Control Plane
    Salam, Rakesh
    Roy, Prasanta Kumar
    Bhattacharya, Ansuman
    INTERNET OF THINGS, 2023, 22
  • [34] Towards a Distributed Digital Twin Framework for Predictive Maintenance in Industrial Internet of Things (IIoT)
    Abdullahi, Ibrahim
    Longo, Stefano
    Samie, Mohammad
    SENSORS, 2024, 24 (08)
  • [35] Mobility-aware hierarchical fog computing framework for Industrial Internet of Things (IIoT)
    Qayyum, Tariq
    Trabelsi, Zouheir
    Malik, Asad Waqar
    Hayawi, Kadhim
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):
  • [36] Mobility-aware hierarchical fog computing framework for Industrial Internet of Things (IIoT)
    Tariq Qayyum
    Zouheir Trabelsi
    Asad Waqar Malik
    Kadhim Hayawi
    Journal of Cloud Computing, 11
  • [37] Improved Secure and Efficient Chebyshev Chaotic Map-Based User Authentication Scheme
    Ryu, Jihyeon
    Kang, Dongwoo
    Won, Dongho
    IEEE ACCESS, 2022, 10 : 15891 - 15910
  • [38] An Overview of Privacy Dimensions on the Industrial Internet of Things (IIoT)
    Demertzi, Vasiliki
    Demertzis, Stavros
    Demertzis, Konstantinos
    ALGORITHMS, 2023, 16 (08)
  • [39] Customer expectation from Industrial Internet of Things (IIOT)
    Seetharaman, A.
    Patwa, Nitin
    Saravanan, A. S.
    Sharma, Abhishek
    JOURNAL OF MANUFACTURING TECHNOLOGY MANAGEMENT, 2019, 30 (08) : 1161 - 1178
  • [40] Lightweight Cryptography in IIoT the Internet of Things in the Industrial Field
    Eterovic, Jorge
    Cipriano, Marcelo
    Garcia, Edith
    Torres, Luis
    COMPUTER SCIENCE - CACIC 2019, 2020, 1184 : 335 - 353