Advanced authentication of IoT sensor network for industrial safety

被引:1
作者
Liu, Chia-Hui [1 ]
Wu, Zhen-Yu [2 ]
机构
[1] Natl Formosa Univ, Dept Elect Engn, 64 Wunhua Rd, Huwei Township 632, Yunlin County, Taiwan
[2] Natl Kaohsiung Marine Univ, Dept Maritime Informat & Technol, 482 Jhongjhou 3rd Rd, Kaohsiung 80543, Taiwan
关键词
Industrial Internet of Things; Authentication Scheme; Wireless Sensor Networks; IIoT Privacy Assurance; INTERNET; PASSWORD;
D O I
10.1016/j.iot.2024.101297
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As industries rapidly advance towards automation and intelligence, the Industrial Internet of Things (IIoT) plays a pivotal role in enhancing factory efficiency and production management. However, the advent of quantum computing introduces significant security challenges, particularly for data transmission and privacy protection, as its immense computational power can compromise the current cryptographic theories' safeguards. We introduce a novel lattice-based cryptographic authentication and key management scheme specifically designed for the IIoT within Wireless Sensor Networks (WSNs), focusing on establishing a secure industrial communication system capable of withstanding quantum threats. The proposed scheme utilizes CrystalsKyber technology and is built around the Learning With Errors (LWE) problem, providing a robust foundation for security against both traditional and quantum threats. It features innovative methods to safeguard against password guessing, stolen verifier, and replay attacks, enhancing data confidentiality and system integrity. By integrating advanced cryptographic techniques resistant to quantum decryption, this research ensures the secure management and utilization of critical production data, supporting the ongoing transformation towards more intelligent manufacturing processes and sustaining global competitiveness for industries.
引用
收藏
页数:19
相关论文
共 38 条
[1]   A Novel Strong Password Generator for Improving Cloud Authentication [J].
Abdellaoui, Abderrahim ;
Khamlichi, Younes Idrissi ;
Chaoui, Habiba .
INTERNATIONAL CONFERENCE ON COMPUTATIONAL MODELLING AND SECURITY (CMS 2016), 2016, 85 :293-300
[2]   Out-of-band Authentication Using Image-Based One Time Password in the Cloud Environment [J].
Abdellaoui, Abderrahim ;
Khamlichi, Younes Idrissi ;
Chaoui, Habiba .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (12) :35-45
[3]  
Ajtai M., 1997, P 29 ANN ACM S THEOR, P284
[4]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[5]   Quantumized approach of load scheduling in fog computing environment for IoT applications [J].
Bhatia, Munish ;
Sood, Sandeep K. ;
Kaur, Simranpreet .
COMPUTING, 2020, 102 (05) :1097-1115
[6]   CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM [J].
Bos, Joppe ;
Ducas, Leo ;
Kiltz, Eike ;
Lepoint, Tancrede ;
Lyubashevsky, Vadim ;
Schanck, John M. ;
Schwabe, Peter ;
Seiler, Gregor ;
Stehle, Damien .
2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018), 2018, :353-367
[7]  
Buchanan William, 2016, IET Eng. Technol., P68, DOI [10.1049/et.2016.0103, DOI 10.1049/ET.2016.0103]
[8]  
Butin D, 2017, 2017 TENTH INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND UBIQUITOUS NETWORK (ICMU), P81
[9]  
Casey Matthew, 2020, Emerging Technologies for Authorization and Authentication. Third International Workshop, ETAA 2020. Proceedings. Lecture Notes in Computer Science (LNCS 12515), P16, DOI 10.1007/978-3-030-64455-0_2
[10]   Secure Integration of Asymmetric and Symmetric Encryption Schemes [J].
Fujisaki, Eiichiro ;
Okamoto, Tatsuaki .
JOURNAL OF CRYPTOLOGY, 2013, 26 (01) :80-101