Device-Side Lightweight Mutual Authentication and Key Agreement Scheme Based on Chameleon Hashing for Industrial Internet of Things

被引:1
作者
Zhang, Qingyang [1 ,2 ]
Zhou, Xiaolong [1 ,2 ]
Zhong, Hong [1 ,2 ]
Cui, Jie [1 ,2 ]
Li, Jiaxin [1 ,3 ]
He, Debiao [4 ,5 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Minist Educ, Key Lab Intelligent Comp & Signal Proc, Hefei 230039, Peoples R China
[2] Anhui Univ, Anhui Engn Lab IoT Secur Technol, Hefei 230039, Peoples R China
[3] New H3C Grp, Secur Res Inst, Hefei 230088, Peoples R China
[4] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[5] MatrixElements Technol, Shanghai Key Lab Privacy Preserving Computat, Shanghai 201204, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Security; Hash functions; Physical unclonable function; Logic gates; Performance evaluation; Industrial Internet of Things (IIoT); mutual authentication; key agreement; physical unclonable function; chameleon hash function; USER AUTHENTICATION; SECURE; PROTOCOL;
D O I
10.1109/TIFS.2024.3451357
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Several authentication and key agreement (AKA) schemes have been proposed to ensure secure communication in the Industrial Internet of Things (IIoT). However, most of these schemes face two primary problems. First, they cannot resist various attacks, such as impersonation and device capture attacks. Second, these schemes overlook the resource-constrained IIoT devices, failing to guarantee lightweight overhead for device operations. Therefore, we propose a novel and efficient AKA scheme. Utilizing the chameleon hash function and physical unclonable function, the proposed scheme implements a lightweight overhead for both authentication parties while maintaining the overhead of the gateway within a reasonable range. Furthermore, we implement device anonymity based on lightweight operations such as hash and XOR. In addition, we perform a rigorous security analysis using the widely accepted Real-Or-Random model, BAN logic, and Proverif tool. Finally, through heuristic analysis and experiments, we substantiate that our scheme surpasses the compared schemes in terms of both security attributes and system overhead.
引用
收藏
页码:7895 / 7907
页数:13
相关论文
共 37 条
  • [1] Allamigeon X., 2010, ProVerif: Cryptographic Protocol Verifier in the Formal Model
  • [2] Boyd C., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P240
  • [3] Logic of authentication
    Burrows, Michael
    Abadi, Martin
    Needham, Roger
    [J]. Operating Systems Review (ACM), 1989, 23 (05): : 1 - 13
  • [4] A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
    Chang, Chin-Chen
    Le, Hai-Duong
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) : 357 - 366
  • [5] Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database
    Chatterjee, Urbi
    Govindan, Vidya
    Sadhukhan, Rajat
    Mukhopadhyay, Debdeep
    Chakraborty, Rajat Subhra
    Mahata, Debashis
    Prabhu, Mukesh M.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (03) : 424 - 437
  • [6] Che W., 2017, CRYPTOGR, V1, P3, DOI DOI 10.3390/CRYPTOGRAPHY1010003
  • [7] Efficient Batch Authentication Scheme Based on Edge Computing in IIoT
    Cui, Jie
    Wang, Fengqun
    Zhang, Qingyang
    Gu, Chengjie
    Zhong, Hong
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (01): : 357 - 368
  • [8] Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment
    Das, Ashok Kumar
    Wazid, Mohammad
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    Rodrigues, Joel J. P. C.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (06): : 4900 - 4913
  • [9] Privacy-Aware Authenticated Key Agreement Scheme for Secure Smart Grid Communication
    Gope, Prosanta
    Sikdar, Biplab
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (04) : 3953 - 3962
  • [10] Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions
    Gope, Prosanta
    Lee, Jemin
    Quek, Tony Q. S.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (11) : 2831 - 2843