A secure and efficient authentication key agreement scheme for industrial internet of things based on edge computing

被引:4
|
作者
Zhu, Wenlong [1 ]
Chen, Xuexiao [2 ]
Jiang, Linmei [1 ]
机构
[1] Huaqiao Univ, Coll Comp Sci & Technol, Xiamen 361021, Peoples R China
[2] Xiamen Inst Technol, Sch Mech Elect & Informat Engn, Xiamen 361021, Peoples R China
关键词
Industrial Internet of Things security; Elliptic curve cryptography; Edge computing;
D O I
10.1016/j.aej.2024.05.036
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Industrial Internet of Things (IIoT) is a pivotal driving force behind the intelligent transformation of the global industrial system, bringing about a gradual shift in production methods. However, due to users completing remote access and data transmission through open channels, ensuring user legitimacy and data security has become an important factor in IIoT. In addition, resource limited users or devices need to collect and publish corresponding messages while also timely processing instant messages obtained from the network. Leveraging edge computing technology effectively mitigates the transmission time of messages, addressing the challenges of high computing pressure and prolonged response time associated with cloud server computing. Therefore, investigating authentication key agreement based on edge computing in the IIoT environment holds substantial theoretical significance and practical importance. This article introduces an IIoT authentication that ensures both security and efficiency by integrating elliptic curve cryptography and three-factor authentication. Within this scheme, the user and the edge server accomplish security authentication. Through security analysis, the proposed scheme is proven to meet the essential security requirements. Performance analysis shows that it achieves higher security, supports more functions, and achieves lower computational and communication costs compared to related schemes.
引用
收藏
页码:52 / 61
页数:10
相关论文
共 50 条
  • [31] Secure and efficient ECC based SIP authentication scheme for VoIP communications in internet of things
    Parwinder Kaur Dhillon
    Sheetal Kalra
    Multimedia Tools and Applications, 2019, 78 : 22199 - 22222
  • [32] Secure and Efficient Anonymous Authentication Key Agreement Scheme for Smart Industry
    Su, Xing
    Xie, Yong
    Wang, Hui
    Liu, Wei
    Shui, Dingyi
    2022 IEEE 28TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, ICPADS, 2022, : 250 - 257
  • [33] A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things
    Chi, Jiancheng
    Li, Yu
    Huang, Jing
    Liu, Jing
    Jin, Yingwei
    Chen, Chen
    Qiu, Tie
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 167 (167)
  • [34] Lightweight authentication scheme for edge control systems in Industrial Internet of Things
    Shang, Wenli
    Wen, Xudong
    Chen, Zhuo
    Xiong, Wenze
    Chang, Zhiwei
    Cao, Zhong
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2024, 25 (11) : 1466 - 1478
  • [35] Provably secure biometric-based user authentication and key agreement scheme in cloud computing
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumari, Saru
    Li, Xiong
    Wu, Fan
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4103 - 4119
  • [36] A Secure Low-Cost Edge Device Authentication Scheme for the Internet of Things
    Guin, Ujjwal
    Singh, Adit
    Alam, Mahabubul
    Canedo, Janice
    Skjellum, Anthony
    2018 31ST INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2018 17TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID & ES), 2018, : 85 - 90
  • [37] An authentication and key agreement mechanism for OPC Unified Architecture in industrial Internet of Things
    Wei, Min
    Zhang, Shuaidong
    Wang, Ping
    Kim, Keecheon
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (01):
  • [38] A Secure Key Exchange and Authentication Scheme for Securing Communications in the Internet of Things Environment
    Peivandizadeh, Ali
    Adarbah, Haitham Y.
    Molavi, Behzad
    Mohajerzadeh, Amirhossein
    Al-Badi, Ali H.
    FUTURE INTERNET, 2024, 16 (10)
  • [39] A Secure One-to-Many Authentication and Key Agreement Scheme for Industrial IoT
    Ming, Yang
    Yang, Pengfei
    Mahdikhani, Hassan
    Lu, Rongxing
    IEEE SYSTEMS JOURNAL, 2023, 17 (02): : 2225 - 2236
  • [40] Attribute-based searchable encrypted scheme with edge computing for Industrial Internet of Things
    Niu, Shufen
    Hu, Ying
    Su, Yun
    Yan, Sen
    Zhou, Siwei
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 139