An efficient lightweight authentication scheme for human-centered industrial Internet of Things

被引:49
作者
Singh, Jaya [1 ]
Gimekar, Ashish [2 ]
Venkatesan, Subramanian [1 ]
机构
[1] Indian Inst Informat Technol, Dept Informat Technol, Prayagraj 211012, Uttar Pradesh, India
[2] Walmart Labs, Bangalore, Karnataka, India
关键词
authentication; human-centered; industrial Internet of Things; Internet of Things; security; PASSWORD AUTHENTICATION; SMART; IOT; SECURITY; PROTOCOL; SYSTEM; CRYPTOSYSTEM; INFORMATION;
D O I
10.1002/dac.4189
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Internet of Things (IoT) specifies a transparent and coherent integration of assorted and composite nodes. Unification of these nodes with large resources and servers has brought advancement in technology for industrial and government services. The industrial IoT (IIoT), with smart nodes, enhance the development and manufacturing of industrial process, which is on demand now. However, the security concern is substantial, and it is required to control to perform prosperous assimilation of IIoT. Authentication of these smart nodes and establishing mutual trust among them is essential to keep vulnerabilities and potential risks out. Hence, this paper presents an efficient lightweight secure authentication protocol from the perspective of human-centered IIoT. This proposed scheme assumes a registration center which simply generates public and secret information for a node when it initially joins the network. Once registration is done, the registration center is not needed anymore, and advanced processes like mutual authentication, secure key exchange, and communications are independently done by nodes involved. Furthermore, we show that this scheme can reduce exponential computations and computational overhead and resolves various possible attacks.
引用
收藏
页数:13
相关论文
共 65 条
[1]   Anonymous authentication for privacy-preserving IoT target-driven applications [J].
Alcaide, Almudena ;
Palomar, Esther ;
Montero-Castillo, Jose ;
Ribagorda, Arturo .
COMPUTERS & SECURITY, 2013, 37 :111-123
[2]   Mutual Authentication in IoT Systems Using Physical Unclonable Functions [J].
Aman, Muhammad Naveed ;
Chua, Kee Chaing ;
Sikdar, Biplab .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05) :1327-1340
[3]  
[Anonymous], 2011, INT J NETW SECUR, DOI DOI 10.1007/S00607-013-0308-2
[4]  
[Anonymous], 2015, Decentralized PublicKey Infrastructure
[5]  
[Anonymous], 1985, P WORKSH THEOR APPL
[6]  
Au MH, 2006, LECT NOTES COMPUT SC, V4116, P111
[7]   Internet of Things: Applications and Challenges in Technology and Standardization [J].
Bandyopadhyay, Debasis ;
Sen, Jaydip .
WIRELESS PERSONAL COMMUNICATIONS, 2011, 58 (01) :49-69
[8]   Short group signatures [J].
Boneh, D ;
Boyen, X ;
Shacham, H .
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 :41-55
[9]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
[10]  
Camenisch J, 2003, LECT NOTES COMPUT SC, V2576, P268