Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0

被引:66
|
作者
Wang, Chenyu [1 ,2 ]
Wang, Ding [2 ,3 ,4 ]
Xu, Guoai [1 ]
He, Debiao [5 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyber Secur, Beijing 100876, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Nankai Univ, Coll Cyber Sci, Tianjin 300350, Peoples R China
[4] Nankai Univ, Tianjin Key Lab Network & Data Secur Technol, Tianjin 300350, Peoples R China
[5] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
基金
中国国家自然科学基金;
关键词
industry; 4; 0; wireless sensor networks; password authentication; forward secrecy; offline dictionary attack; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; WIRELESS; SECURE; LIGHTWEIGHT; NETWORKS; PROTOCOL; INTERNET;
D O I
10.1007/s11432-020-2975-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industry 4.0, which combines information technology, network and industrial production, is expected to have a tremendous impact on our daily lives. In such a complex and security-critical system with resource-constrained sensor nodes, the design of a secure user authentication scheme for preventing real-time data from unauthorized access is full of challenges, and the main crux lies in how to realize the important property of forward secrecy. Existing schemes either fail to achieve forward secrecy or achieve forward secrecy with high computation cost on sensor nodes. Besides, they often fail to conform to the development trend of industry 4.0 systems where a cloud center is necessary to help intelligent decision-making and alleviate computation and storage pressure. Therefore, in this paper, we propose an efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0, and formally prove its security in the random oracle model. Compared with previous schemes, it has three advantages: (1) all eleven state-of-the-art criteria are achieved; (2) its computation cost on sensor nodes is comparable to those insecure schemes that employ only symmetric cryptographic algorithms, and is superior to those that also use asymmetric cryptographic algorithms; (3) it takes the advantage of the computation and storage capabilities of the cloud center to achieve user anonymity and the resistance to offline dictionary attack without performing any asymmetric cryptographic algorithms on gateways. Our computation cost on gateways is the smallest among all state-of-the-art relevant schemes for comparison.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] Hybrid conditional privacy-preserving authentication scheme for VANETs
    Shibin Wang
    Kele Mao
    Furui Zhan
    Dong Liu
    [J]. Peer-to-Peer Networking and Applications, 2020, 13 : 1600 - 1615
  • [42] A Privacy-Preserving Identity Authentication Scheme Based on the Blockchain
    Gao, Sheng
    Su, Qianqian
    Zhang, Rui
    Zhu, Jianming
    Sui, Zhiyuan
    Wang, Junsheng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [43] A Privacy-Preserving Roaming Authentication Scheme for Ubiquitous Networks
    Zhou, You-sheng
    Zhou, Jun-feng
    Wang, Feng
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 463 - 471
  • [44] Privacy-preserving and dynamic authentication scheme for smart metering
    Tian, Xiuxia
    Tian, Fuliang
    Zhang, Anqin
    Chen, Xi
    [J]. International Journal of Network Security, 2019, 21 (01) : 62 - 70
  • [45] A Secure, Privacy-Preserving, and Lightweight Authentication Scheme for VANETs
    Nandy, Tarak
    Idris, Mohd Yamani Idna
    Noor, Rafidah Md
    Wahab, Ainuddin Wahid Abdul
    Bhattacharyya, Sananda
    Kolandaisamy, Raenu
    Yahuza, Muktar
    [J]. IEEE SENSORS JOURNAL, 2021, 21 (18) : 20998 - 21011
  • [46] A Privacy-Preserving Authentication and Pseudonym Revocation Scheme for VANETs
    Qi, Jiayu
    Gao, Tianhan
    [J]. IEEE ACCESS, 2020, 8 : 177693 - 177707
  • [47] Privacy-preserving authentication scheme with full aggregation in VANET
    Zhong, Hong
    Han, Shunshun
    Cui, Jie
    Zhang, Jing
    Xu, Yan
    [J]. INFORMATION SCIENCES, 2019, 476 : 211 - 221
  • [48] Decentralized and Scalable Privacy-Preserving Authentication Scheme in VANETs
    Tangade, Shrikant
    Manvi, Sunilkumar S.
    Lorenz, Pascal
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (09) : 8647 - 8655
  • [49] Hybrid conditional privacy-preserving authentication scheme for VANETs
    Wang, Shibin
    Mao, Kele
    Zhan, Furui
    Liu, Dong
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (05) : 1600 - 1615
  • [50] A Cancellable and Privacy-Preserving Facial Biometric Authentication Scheme
    Phillips, Tyler
    Zou, Xukai
    Li, Feng
    [J]. 2017 IEEE 14TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2017, : 545 - 549