A secure and efficient authentication key agreement scheme for industrial internet of things based on edge computing

被引:4
|
作者
Zhu, Wenlong [1 ]
Chen, Xuexiao [2 ]
Jiang, Linmei [1 ]
机构
[1] Huaqiao Univ, Coll Comp Sci & Technol, Xiamen 361021, Peoples R China
[2] Xiamen Inst Technol, Sch Mech Elect & Informat Engn, Xiamen 361021, Peoples R China
关键词
Industrial Internet of Things security; Elliptic curve cryptography; Edge computing;
D O I
10.1016/j.aej.2024.05.036
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Industrial Internet of Things (IIoT) is a pivotal driving force behind the intelligent transformation of the global industrial system, bringing about a gradual shift in production methods. However, due to users completing remote access and data transmission through open channels, ensuring user legitimacy and data security has become an important factor in IIoT. In addition, resource limited users or devices need to collect and publish corresponding messages while also timely processing instant messages obtained from the network. Leveraging edge computing technology effectively mitigates the transmission time of messages, addressing the challenges of high computing pressure and prolonged response time associated with cloud server computing. Therefore, investigating authentication key agreement based on edge computing in the IIoT environment holds substantial theoretical significance and practical importance. This article introduces an IIoT authentication that ensures both security and efficiency by integrating elliptic curve cryptography and three-factor authentication. Within this scheme, the user and the edge server accomplish security authentication. Through security analysis, the proposed scheme is proven to meet the essential security requirements. Performance analysis shows that it achieves higher security, supports more functions, and achieves lower computational and communication costs compared to related schemes.
引用
收藏
页码:52 / 61
页数:10
相关论文
共 50 条
  • [21] Sensor anomaly detection in the industrial internet of things based on edge computing
    Kong, Dequan
    Liu, Desheng
    Zhang, Lei
    He, Lili
    Shi, Qingwu
    Ma, Xiaojun
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2020, 28 (01) : 331 - 346
  • [22] Electromagnetic radiation based continuous authentication in edge computing enabled internet of things
    Wang, Jun
    Ni, Mingtao
    Wu, Fusheng
    Liu, Shubo
    Qin, Jun
    Zhu, Rongbo
    JOURNAL OF SYSTEMS ARCHITECTURE, 2019, 96 : 53 - 61
  • [23] A secure and efficient data deduplication framework for the internet of things via edge computing and blockchain
    Wu, Zeng
    Huang, Hui
    Zhou, Yuping
    Wu, Chenhuang
    CONNECTION SCIENCE, 2022, 34 (01) : 1999 - 2025
  • [24] Authentication of Control Devices in the Internet of Things with the Architecture of Edge Computing
    Aleksandrova, E. B.
    Oblogina, A. Yu
    Shkorkina, E. N.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2021, 55 (08) : 1087 - 1091
  • [25] Authentication of Control Devices in the Internet of Things with the Architecture of Edge Computing
    E. B. Aleksandrova
    A. Yu. Oblogina
    E. N. Shkorkina
    Automatic Control and Computer Sciences, 2021, 55 : 1087 - 1091
  • [26] Green AI for IIoT: Energy Efficient Intelligent Edge Computing for Industrial Internet of Things
    Zhu, Sha
    Ota, Kaoru
    Dong, Mianxiong
    IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2022, 6 (01): : 79 - 88
  • [27] Key Advances in Pervasive Edge Computing for Industrial Internet of Things in 5G and Beyond
    Narayanan, Arun
    De Sena, Arthur Sousa
    Gutierrez-Rojas, Daniel
    Melgarejo, Dick Carrillo
    Hussain, Hafiz Majid
    Ullah, Mehar
    Bayhan, Suzan
    Nardelli, Pedro H. J.
    IEEE ACCESS, 2020, 8 : 206734 - 206754
  • [28] SECBlock-IIoT: A Secure Blockchain-enabled Edge Computing Framework for Industrial Internet of Things
    Hosen, A. S. M. Sanwar
    Sharma, Pradip Kumar
    Puthal, Deepak
    Ra, In-Ho
    Cho, Gi Hwan
    THIRD INTERNATIONAL WORKSHOP ON ADVANCED SECURITY ON SOFTWARE AND SYSTEMS, ASSS 2023, 2023,
  • [29] An Internet of Things Access Control Scheme Based on Permissioned Blockchain and Edge Computing
    Zhang, Lihua
    Li, Boping
    Fang, Haodong
    Zhang, Ganzhe
    Liu, Chunhui
    APPLIED SCIENCES-BASEL, 2023, 13 (07):
  • [30] Resilient Authentication and Authorization for the Internet of Things (IoT) Using Edge Computing
    Kim, Hokeun
    Kang, Eunsuk
    Broman, David
    Lee, Edward A.
    ACM TRANSACTIONS ON INTERNET OF THINGS, 2020, 1 (01):