CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things

被引:22
|
作者
Tanveer, Muhammad [1 ]
Badshah, Akhtar [2 ]
Khan, Abd Ullah [3 ]
Alasmary, Hisham [4 ]
Chaudhry, Shehzad Ashraf [5 ,6 ]
机构
[1] Univ Management & Technol, Dept Comp Sci, Lahore 54770, Pakistan
[2] Univ Malakand, Dept Software Engn, Dir Lower 18800, Pakistan
[3] Natl Univ Sci & Technol, Dept Comp Sci, Islamabad, Pakistan
[4] King Khalid Univ, Coll Comp Sci, Dept Comp Sci, Abha 61421, Saudi Arabia
[5] Abu Dhabi Univ, Coll Engn, Dept Comp Sci & Informat Technol, Abu Dhabi, U Arab Emirates
[6] Nisantasi Univ, Fac Engn & Architecture, Dept Software Engn, Istanbul, Turkiye
关键词
Privacy; Scyther; ASCON; Internet of Things; Encryption; Session key; Authentication; HEALTH-CARE-SYSTEM; PROTOCOL; SCHEME; MANAGEMENT; LIGHTWEIGHT; NETWORK;
D O I
10.1016/j.iot.2023.100902
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Industrial Internet of Things (IIoT) revolutionizes industrial production using smart devices (SMDs) deployed in IIoT environments. These SMDs collect and transmit information from target fields for analysis and can be controlled remotely. In emergency situations, real-time access to specific SMD information is crucial for prompt actions. However, ensuring secure and reliable communication between users and SMDs in untrusted channels is a significant challenge. Privacy concerns and the limitations of existing authentication frameworks further exacerbate this challenge, necessitating a lightweight cryptography-based authentication framework. This framework is essential to enable secure and reliable communication in the diverse IIoT environ-ment while addressing privacy leakage threats and the computational constraints of IoT devices. Recently, various lightweight cryptography-based authenticated encryption (AE) schemes have been proposed to enable encryption and decryption services for resource-constrained IIoT devices. ASCON, an efficient AE scheme, offers confidentiality, integrity, and authenticity in a single encryption and decryption operation, reducing the number of cryptographic operations required for authentication framework design. This paper presents CMAF-IIoT, a chaotic map and resource-efficient AE scheme (ASCON)-based authentication framework for IIoT, addressing the aforementioned challenges. CMAF-IIoT ensures reliable communication between SMDs and users. The framework begins with user-performed local authentication on their smart devices, followed by the establishment of a session key with the SMD after mutual authentication with the gateway. Using the session key, users securely access real-time information from SMDs deployed in the IIoT environment. The security of CMAF-IIoT is validated through formal and informal security analyses. Additionally, the efficiency of CMAF-IIoT is evaluated in terms of communication, computational, and storage costs. The results indicate that CMAF-IIoT requires [6.67% to 53.33%] low storage cost, [45.13% to 65.87%] low computational cost, and [16.46% to 83.29%] low communication cost compared to contrasted authentication frameworks. These findings highlight the viability of CMAF-IIoT for the IIoT environment, as it provides resource efficiency and enhanced security features.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] Architecture and Implementation of Industrial Internet of Things (IIoT) Gateway
    Zhang, Yinfen
    Sun, Wenfeng
    Shi, Yuntao
    PROCEEDINGS OF 2020 IEEE 2ND INTERNATIONAL CONFERENCE ON CIVIL AVIATION SAFETY AND INFORMATION TECHNOLOGY (ICCASIT), 2020, : 114 - 120
  • [42] Industrial Internet of Things (IIoT) integration in power grids
    Andrei, Cornel-Cristian
    Tudor, Gabriel
    Arhip-Calin, Madalina
    PROCEEDINGS OF 9TH INTERNATIONAL CONFERENCE ON MODERN POWER SYSTEMS (MPS 2021), 2021,
  • [43] Traffic Modeling for Industrial Internet of Things (IIoT) Networks
    Glabowski, Mariusz
    Hanczewski, Slawomir
    Stasiak, Maciej
    Weissenberg, Michal
    Zwierzykowski, Piotr
    Bai, Vito
    IMAGE PROCESSING AND COMMUNICATIONS: TECHNIQUES, ALGORITHMS AND APPLICATIONS, 2020, 1062 : 264 - 271
  • [44] A new three-factor authentication scheme using Chebyshev chaotic map for peer-to-peer Industrial Internet of Things
    He, Kaiyan
    Ren, Zhe
    COMPUTER NETWORKS, 2024, 247
  • [45] SFVCC: Chaotic map-based security framework for vehicular cloud computing
    Mishra, Dheerendra
    Kumar, Vinod
    Dharminder, Dharminder
    Rana, Saurabh
    IET INTELLIGENT TRANSPORT SYSTEMS, 2020, 14 (04) : 241 - 249
  • [46] Survey of Proximity Based Authentication Mechanisms for the Industrial Internet of Things
    Qureshi, Umair Muitaba
    Hancke, Gerhard Petrus
    Gebremichael, Teklay
    Jennehag, Ulf
    Forsstrom, Stefan
    Gidlund, Mikael
    IECON 2018 - 44TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2018, : 5246 - 5251
  • [47] Authentication scheme for industrial Internet of things based on DAG blockchain
    Fei T.
    Kun D.
    Zhangtao Y.
    Guowei L.
    Fei, Tang (tangfei@cqupt.edu.cn), 1600, Beijing University of Posts and Telecommunications (28): : 1 - 12
  • [48] Authentication scheme for industrial Internet of things based on DAG blockchain
    Tang Fei
    Dong Kun
    Ye Zhangtao
    Ling Guowei
    The Journal of China Universities of Posts and Telecommunications, 2021, 28 (06) : 1 - 12
  • [49] A secure chaotic map-based remote authentication scheme for telecare medicine information systems
    Li, Xiong
    Wu, Fan
    Khan, Muhammad Khurram
    Xu, Lili
    Shen, Jian
    Jo, Minho
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 : 149 - 159
  • [50] A Chaotic Map-Based Authentication and Key Agreement Scheme with User Anonymity for Cloud Computing
    Wu, Fan
    Xu, Lili
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 189 - 200