Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0

被引:66
|
作者
Wang, Chenyu [1 ,2 ]
Wang, Ding [2 ,3 ,4 ]
Xu, Guoai [1 ]
He, Debiao [5 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyber Secur, Beijing 100876, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Nankai Univ, Coll Cyber Sci, Tianjin 300350, Peoples R China
[4] Nankai Univ, Tianjin Key Lab Network & Data Secur Technol, Tianjin 300350, Peoples R China
[5] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
基金
中国国家自然科学基金;
关键词
industry; 4; 0; wireless sensor networks; password authentication; forward secrecy; offline dictionary attack; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; WIRELESS; SECURE; LIGHTWEIGHT; NETWORKS; PROTOCOL; INTERNET;
D O I
10.1007/s11432-020-2975-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industry 4.0, which combines information technology, network and industrial production, is expected to have a tremendous impact on our daily lives. In such a complex and security-critical system with resource-constrained sensor nodes, the design of a secure user authentication scheme for preventing real-time data from unauthorized access is full of challenges, and the main crux lies in how to realize the important property of forward secrecy. Existing schemes either fail to achieve forward secrecy or achieve forward secrecy with high computation cost on sensor nodes. Besides, they often fail to conform to the development trend of industry 4.0 systems where a cloud center is necessary to help intelligent decision-making and alleviate computation and storage pressure. Therefore, in this paper, we propose an efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0, and formally prove its security in the random oracle model. Compared with previous schemes, it has three advantages: (1) all eleven state-of-the-art criteria are achieved; (2) its computation cost on sensor nodes is comparable to those insecure schemes that employ only symmetric cryptographic algorithms, and is superior to those that also use asymmetric cryptographic algorithms; (3) it takes the advantage of the computation and storage capabilities of the cloud center to achieve user anonymity and the resistance to offline dictionary attack without performing any asymmetric cryptographic algorithms on gateways. Our computation cost on gateways is the smallest among all state-of-the-art relevant schemes for comparison.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0
    Chenyu WANG
    Ding WANG
    Guoai XU
    Debiao HE
    [J]. Science China(Information Sciences), 2022, 65 (01) : 192 - 206
  • [2] Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0
    Chenyu Wang
    Ding Wang
    Guoai Xu
    Debiao He
    [J]. Science China Information Sciences, 2022, 65
  • [3] An Improved and Privacy-Preserving Mutual Authentication Scheme with Forward Secrecy in VANETs
    Yao, Mengting
    Wang, Xiaoming
    Gan, Qingqing
    Lin, Yijian
    Huang, Chengpeng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [4] Efficient and privacy-preserving online face authentication scheme
    Li, Ming
    Yang, Xiaopeng
    Zhu, Hui
    Wang, Fengwei
    Li, Qi
    [J]. Tongxin Xuebao/Journal on Communications, 2020, 41 (05): : 205 - 215
  • [5] An efficient privacy-preserving user authentication scheme using image processing and blockchain technologies
    Ara, Anees
    Sharma, Avinash
    Yadav, Dharminder
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (04): : 1137 - 1155
  • [6] An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications
    Ren, Jian
    Harn, Lein
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (03) : 1018 - 1025
  • [7] Efficient Certificateless Conditional Privacy-Preserving Authentication Scheme in VANETs
    Ming, Yang
    Cheng, Hongliang
    [J]. MOBILE INFORMATION SYSTEMS, 2019, 2019
  • [8] Anonymous and Efficient Authentication Scheme for Privacy-Preserving Distributed Learning
    Jiang, Yili
    Zhang, Kuan
    Qian, Yi
    Zhou, Liang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 2227 - 2240
  • [9] Efficient and Secure Authentication Scheme with Conditional Privacy-Preserving for VANETs
    XIE Yong
    WU Libing
    ZHANG Yubo
    SHEN Jian
    [J]. Chinese Journal of Electronics, 2016, 25 (05) : 950 - 956
  • [10] Efficient and Secure Authentication Scheme with Conditional Privacy-Preserving for VANETs
    Xie Yong
    Wu Libing
    Zhang Yubo
    Shen Jian
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2016, 25 (05) : 950 - 956