A Domain Isolated Tripartite Authenticated Key Agreement Protocol With Dynamic Revocation and Online Public Identity Updating for IIoT

被引:3
作者
Zhang, Zhishuo [1 ]
Huang, Wen [2 ]
Huang, Ying [2 ]
Liao, Yongjian [1 ]
Zhang, Zhun [1 ]
Zhou, Shijie [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Peoples R China
[2] Sichuan Univ, Chengdu 610065, Peoples R China
关键词
Dynamic identity revocation; Industrial Internet of Things (IIoT); online public identity update; three-factors authentication; tripartite authenticated key agreement (TAKA) protocol; MUTUAL AUTHENTICATION; USER AUTHENTICATION; PROVABLY SECURE; SCHEME; INTERNET; EXCHANGE;
D O I
10.1109/JIOT.2023.3349005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated Key agreement (AKA) protocol is one of the essential components for reliable secure communication in Industrial Internet of Things (IIoT) communication model. Recently, Srinivas et al. proposed a three-factor elliptic curve cryptosystem (ECC)-based AKA protocol called UAP-BCIoT for wireless sensor network-based intelligent transportation system(ITS). In this article, we first find out that their protocol has a security weak point inherently called master secret disclose and key forgery defect which makes their protocol susceptible to variant impersonation attacks. To overcome the deficiency of their protocol, we construct an improved ECC-based three-factors(credential, password and biometric) tripartite AKA (TAKA)protocol among managers U-i, domain gateway DG and IIoT nodes INj with identity dynamic revocation and online updating(IDR-OU-TAKA) for secure communication in IIoT. Unlike the vast majority of previous GWN-assisted MAKA protocols that only negotiate the session key between Ui and INj, our IDR-OU-TAKA protocol can selectively achieve U-i <-> DG <-> INj tripartite key negotiation according to U-i's IPv6 addresses, meaning that any two parties can use the session key to establish a secure channel which can achieve isolation security within the IIoT domain. Besides, in our proposed IDR-OU-TAKA, the overdue or corrupted manager can be immediately revoked by dynamically maintaining the revocation list and the identity of manager can be securely updated online through an open channel. We give rigorous security proof based on real-or-random (ROR)model and the nonmathematical (informal) security analysis to our proposed IDR-OU-TAKA protocol. Finally, we conduct a comprehensive comparison and evaluation to our proposed IDR-OU-TAKA protocol with other state-of-art MAKA protocols in terms of security and functionality features, communication, and computation costs which clearly indicate that our protocol is more practical and suitable for IIoT.
引用
收藏
页码:15616 / 15632
页数:17
相关论文
共 37 条
[21]   An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration [J].
Pan, Wuqiong ;
Zheng, Fangyu ;
Zhao, Yuan ;
Zhu, Wen-Tao ;
Jing, Jiwu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (01) :111-122
[22]   Challenges and Opportunities in Securing the Industrial Internet of Things [J].
Serror, Martin ;
Hack, Sacha ;
Henze, Martin ;
Schuba, Marko ;
Wehrle, Klaus .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (05) :2985-2996
[23]   Industrial Internet of Things: Challenges, Opportunities, and Directions [J].
Sisinni, Emiliano ;
Saifullah, Abusayeed ;
Han, Song ;
Jennehag, Ulf ;
Gidlund, Mikael .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (11) :4724-4734
[24]   Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System [J].
Srinivas, Jangirala ;
Das, Ashok Kumar ;
Wazid, Mohammad ;
Vasilakos, Athanasios V. .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (09) :7727-7744
[25]   Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things [J].
Srinivas, Jangirala ;
Das, Ashok Kumar ;
Wazid, Mohammad ;
Kumar, Neeraj .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) :1133-1146
[26]   A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion [J].
Turkanovic, Muhamed ;
Brumen, Bostjan ;
Hoelbl, Marko .
AD HOC NETWORKS, 2014, 20 :96-112
[27]   Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things [J].
Wang, Chenyu ;
Wang, Ding ;
Duan, Yihe ;
Tao, Xiaofeng .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 :2961-2976
[28]   Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound [J].
Wang, Ding ;
Wang, Ping .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) :708-722
[29]   Zipf's Law in Passwords [J].
Wang, Ding ;
Cheng, Haibo ;
Wang, Ping ;
Huang, Xinyi ;
Jian, Gaopeng .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (11) :2776-2791
[30]   Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment [J].
Wazid, Mohammad ;
Das, Ashok Kumar ;
Odelu, Vanga ;
Kumar, Neeraj ;
Susilo, Willy .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (02) :391-406