Secure and efficient authenticated group key agreement protocol for AI-based automation systems

被引:2
|
作者
Zhou, Tianqi [1 ]
Wang, Chen [1 ]
Zheng, Wenying [1 ]
Tan, Haowen [1 ]
机构
[1] Zhejiang Sci Tech Univ, Hangzhou, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
AI-based automation systems; Authenticated group key agreement; Secure data transmission; DDoS; Dynamic batch verification; CYBERSECURITY; VULNERABILITY;
D O I
10.1016/j.isatra.2023.04.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Automation systems are soaring due to the innovation of artificial intelligence (AI) technologies. In this paper, we mainly concentrate on the security and efficiency of data transmission in AI-based automation systems, especially, for data sharing in a group manner in distributed networks. To this end, an authenticated group key agreement protocol is proposed for secure data transmission in AI-based automation systems. In order to release the computational overhead of distributed nodes, a semi -trusted authority (STA) is introduced to enable precomputation operations. Moreover, to overcome the predominantly distributed denial of service (DDoS) attack, a dynamic batch verification mechanism is devised. The presented dynamic batch verification mechanism guarantees that the proposed protocol can be run properly among legitimate nodes regardless of the existence of nodes who suffered from the DDoS attack. Finally, the session key security of the proposed protocol is proved and the performance is evaluated.(c) 2023 ISA. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:1 / 9
页数:9
相关论文
共 50 条
  • [11] Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol
    Wei, Guiyi
    Yang, Xianbo
    Shao, Jun
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (12): : 3352 - 3365
  • [12] Identity based authenticated group key agreement protocol
    Reddy, KC
    Nalla, D
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS, 2002, 2551 : 215 - 233
  • [13] An efficient protocol for authenticated key agreement
    Law, L
    Menezes, A
    Qu, MH
    Solinas, J
    Vanstone, S
    DESIGNS CODES AND CRYPTOGRAPHY, 2003, 28 (02) : 119 - 134
  • [14] An Efficient Protocol for Authenticated Key Agreement
    Laurie Law
    Alfred Menezes
    Minghua Qu
    Jerry Solinas
    Scott Vanstone
    Designs, Codes and Cryptography, 2003, 28 : 119 - 134
  • [15] Provably secure authenticated tree based group key agreement
    Dutta, R
    Barua, R
    Sarkar, P
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 92 - 104
  • [16] Efficient and secure group key agreement protocol in MANET
    Wang, Gang
    Wen, Tao
    Guo, Quan
    Ma, Xue-Bin
    Tongxin Xuebao/Journal on Communications, 2009, 30 (12): : 68 - 78
  • [17] A secure and efficient three-pass authenticated key agreement protocol based on elliptic curves
    Lim, Meng-Hui
    Yeoh, Chee-Min
    Lee, Sanggon
    Lim, Hyotaek
    Lee, Hoonjae
    NETWORKING 2008: AD HOC AND SENSOR NETWORKS, WIRELESS NETWORKS, NEXT GENERATION INTERNET, PROCEEDINGS, 2008, 4982 : 170 - +
  • [18] AN EFFICIENT AND SECURE THREE-PASS AUTHENTICATED KEY AGREEMENT ELLIPTIC CURVE BASED PROTOCOL
    Mohammad, Zeyad
    Hsu, Chien-Lung
    Chen, Yaw-Chung
    Lo, Chi-Chun
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (03): : 1273 - 1284
  • [19] An efficient and secure design of multi-server authenticated key agreement protocol
    Azeem Irshad
    Husnain Naqvi
    Shehzad Ashraf Chaudhry
    Shouket Raheem
    Saru Kumari
    Ambrina Kanwal
    Muhammad Usman
    The Journal of Supercomputing, 2018, 74 : 4771 - 4797
  • [20] An efficient and secure design of multi-server authenticated key agreement protocol
    Irshad, Azeem
    Naqvi, Husnain
    Chaudhry, Shehzad Ashraf
    Raheem, Shouket
    Kumari, Saru
    Kanwal, Ambrina
    Usman, Muhammad
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (09): : 4771 - 4797