A Domain Isolated Tripartite Authenticated Key Agreement Protocol With Dynamic Revocation and Online Public Identity Updating for IIoT

被引:3
作者
Zhang, Zhishuo [1 ]
Huang, Wen [2 ]
Huang, Ying [2 ]
Liao, Yongjian [1 ]
Zhang, Zhun [1 ]
Zhou, Shijie [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Peoples R China
[2] Sichuan Univ, Chengdu 610065, Peoples R China
关键词
Dynamic identity revocation; Industrial Internet of Things (IIoT); online public identity update; three-factors authentication; tripartite authenticated key agreement (TAKA) protocol; MUTUAL AUTHENTICATION; USER AUTHENTICATION; PROVABLY SECURE; SCHEME; INTERNET; EXCHANGE;
D O I
10.1109/JIOT.2023.3349005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated Key agreement (AKA) protocol is one of the essential components for reliable secure communication in Industrial Internet of Things (IIoT) communication model. Recently, Srinivas et al. proposed a three-factor elliptic curve cryptosystem (ECC)-based AKA protocol called UAP-BCIoT for wireless sensor network-based intelligent transportation system(ITS). In this article, we first find out that their protocol has a security weak point inherently called master secret disclose and key forgery defect which makes their protocol susceptible to variant impersonation attacks. To overcome the deficiency of their protocol, we construct an improved ECC-based three-factors(credential, password and biometric) tripartite AKA (TAKA)protocol among managers U-i, domain gateway DG and IIoT nodes INj with identity dynamic revocation and online updating(IDR-OU-TAKA) for secure communication in IIoT. Unlike the vast majority of previous GWN-assisted MAKA protocols that only negotiate the session key between Ui and INj, our IDR-OU-TAKA protocol can selectively achieve U-i <-> DG <-> INj tripartite key negotiation according to U-i's IPv6 addresses, meaning that any two parties can use the session key to establish a secure channel which can achieve isolation security within the IIoT domain. Besides, in our proposed IDR-OU-TAKA, the overdue or corrupted manager can be immediately revoked by dynamically maintaining the revocation list and the identity of manager can be securely updated online through an open channel. We give rigorous security proof based on real-or-random (ROR)model and the nonmathematical (informal) security analysis to our proposed IDR-OU-TAKA protocol. Finally, we conduct a comprehensive comparison and evaluation to our proposed IDR-OU-TAKA protocol with other state-of-art MAKA protocols in terms of security and functionality features, communication, and computation costs which clearly indicate that our protocol is more practical and suitable for IIoT.
引用
收藏
页码:15616 / 15632
页数:17
相关论文
共 37 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]   Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Leng, Lu ;
Kumar, Neeraj .
COMPUTER NETWORKS, 2016, 101 :42-62
[3]   A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks [J].
Amin, Ruhul ;
Biswas, G. P. .
AD HOC NETWORKS, 2016, 36 :58-80
[4]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[5]  
Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851
[6]  
Chalkias Konstantinos, 2021, Topics in Cryptology - CT-RSA 2021. Cryptographers Track at the RSA Conference 2021. Proceedings. Lecture Notes in Computer Science (LNCS 12704), P577, DOI 10.1007/978-3-030-75539-3_24
[7]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[8]   EC-ECC: Accelerating Elliptic Curve Cryptography for Edge Computing on Embedded GPU TX2 [J].
Dong, Jiankuo ;
Zheng, Fangyu ;
Lin, Jingqiang ;
Liu, Zhe ;
Xiao, Fu ;
Fan, Guang .
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2022, 21 (02)
[9]   Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics [J].
Fan, Chun-I ;
Lin, Yi-Hui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (04) :933-945
[10]   An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment [J].
Farash, Mohammad Sabzinejad ;
Turkanovic, Muhamed ;
Kumari, Saru ;
Hoelbi, Marko .
AD HOC NETWORKS, 2016, 36 :152-176