MSAUPL: A multi-server authentication and key agreement protocol for industrial IoT based on user privacy level

被引:0
作者
Wu, Yi [1 ]
Feng, Tao [1 ]
Su, Chunhua [2 ]
Liu, Chunyan [3 ]
机构
[1] Lanzhou Univ Technol, Sch Comp & Commun, Lanzhou 730050, Gansu, Peoples R China
[2] Univ Aizu, Div Comp Sci, Aizu Wakamatsu, Fukushima 9658580, Japan
[3] Lanzhou Univ Technol, Sch Econ & Management, Lanzhou 730050, Gansu, Peoples R China
基金
中国国家自然科学基金;
关键词
Industrial internet of things; Authentication and key agreement protocol; Directed graph; Merkle tree; User privacy level; SCHEME;
D O I
10.1016/j.jisa.2025.103991
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of the Industrial Internet of Things (IIoT), industrial control systems are characterized by increasing complexity of access users and diversity of data sources, making it crucial to implement hierarchical data transmission protocols for industrial servers based on user privacy level. However, traditional industrial systems often lack the flexibility to provide hierarchical services to access users according to their privacy level, leading to frequent incidents of data or privacy disclosure. This study addresses the need for hierarchical data services for various access users in an IIoT environment by proposing a multi-server authentication and key agreement protocol based on user privacy level (MSAUPL). To enhance the security and integrity of message transmission, a multi-factor authentication mechanism is adopted. Considering the computational and storage limitations of IIoT devices, the MSAUPL protocol primarily relies on hash functions for authentication and key agreement. Moreover, to allow access users to derive keys with lower privilege level after completing a single authentication for their privacy level, a key derivation scheme based on a directed graph is introduced. Additionally, to alleviate the storage burden on servers, a multi-level user privilege scheme based on a Merkle tree structure is proposed, enabling servers to efficiently compute different user access level. Finally, security analysis and comprehensive performance evaluation demonstrate that the MSAUPL protocol not only enhances functionality but also significantly reduces resource consumption, making it well-suited for multi-server IIoT environments.
引用
收藏
页数:19
相关论文
共 43 条
[1]   An Efficient Approximation Algorithm for Service Function Chaining Placement in Edge-Cloud Computing Industrial Internet of Things [J].
Asgarian, Mina ;
Jamshidi, Kamal ;
Bohlooli, Ali .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) :12815-12822
[2]   Industrial Internet of Things: A Review of Improvements Over Traditional SCADA Systems for Industrial Automation [J].
Babayigit, Bilal ;
Abubaker, Mohammed .
IEEE SYSTEMS JOURNAL, 2024, 18 (01) :120-133
[3]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[4]  
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
[5]   A provably secure multi-server authentication scheme based on Chebyshev chaotic map [J].
Chen, Rui ;
Mou, Yongcong ;
Li, Wei .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 83
[6]  
Cui J, 2024, IEEE Internet Things J
[7]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[8]  
Fan Wu, 2018, Frontier Computing. Theory, Technologies and Applications (FC 2017). LNEE 464, P335, DOI 10.1007/978-981-10-7398-4_35
[9]   SDACS: Blockchain-Based Secure and Dynamic Access Control Scheme for Internet of Things [J].
Gong, Qinghua ;
Zhang, Jinnan ;
Wei, Zheng ;
Wang, Xinmin ;
Zhang, Xia ;
Yan, Xin ;
Liu, Yang ;
Dong, Liming .
SENSORS, 2024, 24 (07)
[10]   An Attribute-Based Access Control for Cloud Enabled Industrial Smart Vehicles [J].
Gupta, Maanak ;
Awaysheh, Feras M. ;
Benson, James ;
Alazab, Mamoun ;
Patwa, Farhan ;
Sandhu, Ravi .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (06) :4288-4297