SAKE*: A Symmetric Authenticated Key Exchange Protocol With Perfect Forward Secrecy for Industrial Internet of Things

被引:15
|
作者
Fan, Qing [1 ,2 ]
Chen, Jianhua [1 ,2 ]
Shojafar, Mohammad [3 ]
Kumari, Saru [4 ]
He, Debiao [5 ,6 ,7 ]
机构
[1] Wuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin 541004, Peoples R China
[3] Univ Surrey, Inst Commun Syst ICS, 5GIC & 6GIC, Guildford GU27XH, Surrey, England
[4] Chaudhary Charan Singh Univ, Dept Math, Meerut 250001, Uttar Pradesh, India
[5] Qilu Univ Technol, Shandong Prov Key Lab Comp Networks, Shandong Acad Sci, Jinan 250316, Peoples R China
[6] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[7] Shanghai Key Lab Privacy Preserving Comp Matrix E, Shanghai 430072, Peoples R China
基金
中国国家自然科学基金;
关键词
Protocols; Security; Authentication; Industrial Internet of Things; Informatics; Synchronization; Computational modeling; Authentication and key exchange (AKE); Industry; 4; 0; perfect forward secrecy (PFS); symmetric key; MUTUAL AUTHENTICATION; SECURE;
D O I
10.1109/TII.2022.3145584
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security in the Industrial Internet of Things (IIoT) is vital as there are some cases where IIoT devices collect sensory information for crucial social production and life. Thus, designing secure and efficient communication channels is always a research hotspot. However, end devices have memory, computation, and power-supplying capacities limitations. Moreover, perfect forward secrecy (PFS), which means that long-term key exposure still discloses previous session keys, is a critical security property for authentication and key exchange (AKE). This article proposes an AKE protocol named SAKE* for the IIoT environment, where two types of keys (i.e., a master key and an evolution key) guarantee PFS. In addition, the SAKE* protocol merely uses concatenation, XOR, and hash-function operations to achieve lightweight authentication, key exchange, and message integrity. We also compare the SAKE* protocol with seven current and IoT-related authentication protocols regarding security properties and performance. Comparison results indicate that the SAKE* protocol consumes the least computation resource and third-least communication cost among eight AKE protocols while equipping 12 security properties.
引用
收藏
页码:6424 / 6434
页数:11
相关论文
共 50 条
  • [1] Symmetric-Key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy
    Avoine, Gildas
    Canard, Sebastien
    Ferreira, Loic
    [J]. TOPICS IN CRYPTOLOGY, CT-RSA 2020, 2020, 12006 : 199 - 224
  • [2] Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things
    Yang, Zheng
    He, Jun
    Tian, Yangguang
    Zhou, Jianying
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (10) : 6584 - 6596
  • [3] SAPFS: An Efficient Symmetric-Key Authentication Key Agreement Scheme With Perfect Forward Secrecy for Industrial Internet of Things
    Zhang, Yunru
    He, Debiao
    Vijayakumar, Pandi
    Luo, Min
    Huang, Xinyi
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (11) : 9716 - 9726
  • [4] An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication
    Sui, AF
    Hui, LCK
    Yiu, SM
    Chow, KP
    Tsang, WW
    Chong, CF
    Pun, KH
    Chan, HW
    [J]. 2005 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF., 2005, : 2088 - 2093
  • [5] Authenticated encryption protocol with perfect forward secrecy for mobile communication
    Lu, Rongxing
    Cao, Zhenfu
    Dong, Xiaolei
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2006, 6 (03): : 273 - 280
  • [6] TAKE-IoT: Tiny Authenticated Key Exchange Protocol for the Internet of Things
    Khelf, Roumaissa
    Ghoualmi-Zine, Nacira
    Ahmim, Marwa
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED AND REAL-TIME COMMUNICATION SYSTEMS (IJERTCS), 2020, 11 (03): : 1 - 21
  • [7] Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security
    Huang, Hai
    [J]. PROVABLE SECURITY, 2011, 6980 : 389 - 397
  • [8] Building Low-Interactivity Multifactor Authenticated Key Exchange for Industrial Internet of Things
    Li, Zengpeng
    Yang, Zheng
    Szalachowski, Pawel
    Zhou, Jianying
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (02): : 844 - 859
  • [9] Authenticated Diffie-Hellman Key Agreement Protocol with Forward Secrecy
    ZHANG Chuanrong1
    2. State Key Laboratory of Information Security/Graduate University of Chinese Academy of Science
    [J]. Wuhan University Journal of Natural Sciences, 2008, (06) : 641 - 644
  • [10] A Certificateless Authenticated Group Key Agreement Protocol providing Forward Secrecy
    Lee, Eun-Jung
    Lee, Sang-Eon
    Yoo, Kee-Young
    [J]. INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 124 - +