A secure and efficient authentication key agreement scheme for industrial internet of things based on edge computing

被引:4
|
作者
Zhu, Wenlong [1 ]
Chen, Xuexiao [2 ]
Jiang, Linmei [1 ]
机构
[1] Huaqiao Univ, Coll Comp Sci & Technol, Xiamen 361021, Peoples R China
[2] Xiamen Inst Technol, Sch Mech Elect & Informat Engn, Xiamen 361021, Peoples R China
关键词
Industrial Internet of Things security; Elliptic curve cryptography; Edge computing;
D O I
10.1016/j.aej.2024.05.036
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Industrial Internet of Things (IIoT) is a pivotal driving force behind the intelligent transformation of the global industrial system, bringing about a gradual shift in production methods. However, due to users completing remote access and data transmission through open channels, ensuring user legitimacy and data security has become an important factor in IIoT. In addition, resource limited users or devices need to collect and publish corresponding messages while also timely processing instant messages obtained from the network. Leveraging edge computing technology effectively mitigates the transmission time of messages, addressing the challenges of high computing pressure and prolonged response time associated with cloud server computing. Therefore, investigating authentication key agreement based on edge computing in the IIoT environment holds substantial theoretical significance and practical importance. This article introduces an IIoT authentication that ensures both security and efficiency by integrating elliptic curve cryptography and three-factor authentication. Within this scheme, the user and the edge server accomplish security authentication. Through security analysis, the proposed scheme is proven to meet the essential security requirements. Performance analysis shows that it achieves higher security, supports more functions, and achieves lower computational and communication costs compared to related schemes.
引用
收藏
页码:52 / 61
页数:10
相关论文
共 50 条
  • [41] GASE: A Lightweight Group Authentication Scheme With Key Agreement for Edge Computing Applications
    Nakkar, Mouna
    AlTawy, Riham
    Youssef, Amr
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (01) : 840 - 854
  • [42] A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems
    Xin Xu
    Ping Zhu
    Qiaoyan Wen
    Zhengping Jin
    Hua Zhang
    Lian He
    Journal of Medical Systems, 2014, 38
  • [43] A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems
    Xu, Xin
    Zhu, Ping
    Wen, Qiaoyan
    Jin, Zhengping
    Zhang, Hua
    He, Lian
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (01)
  • [44] An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
    Farash, Mohammad Sabzinejad
    Turkanovic, Muhamed
    Kumari, Saru
    Hoelbi, Marko
    AD HOC NETWORKS, 2016, 36 : 152 - 176
  • [45] A Novel Symmetric Key Based Authentication Scheme that Saves Energy for Edge Devices of the Internet of Things
    Kuppuswamy, Prakash
    Al-Maliki, Sayeed Q. Al-Khalidi
    John, Rajan
    Mani, Mohan
    COMPUTING SCIENCE, COMMUNICATION AND SECURITY, COMS2 2024, 2025, 2174 : 308 - 319
  • [46] An efficient key agreement protocol for secure authentication
    Kim, YS
    Huh, EN
    Hwang, J
    Lee, BW
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 746 - 754
  • [47] Authentication scheme for industrial Internet of things based on DAG blockchain
    Fei T.
    Kun D.
    Zhangtao Y.
    Guowei L.
    Fei, Tang (tangfei@cqupt.edu.cn), 1600, Beijing University of Posts and Telecommunications (28): : 1 - 12
  • [48] An efficient authentication and key agreement scheme for secure smart grid communication services
    Hammami, Hamza
    Obaidat, Mohammad S.
    Ben Yahia, Sadok
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (15)
  • [49] Authentication scheme for industrial Internet of things based on DAG blockchain
    Tang Fei
    Dong Kun
    Ye Zhangtao
    Ling Guowei
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2021, 28 (06) : 1 - 12
  • [50] An efficient key agreement and authentication protocol for secure communication in industrial IoT applications
    Vinoth, R.
    Deborah, Lazarus Jegatha
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 14 (3) : 1431 - 1443