Efficient Batch Authentication Scheme Based on Edge Computing in IIoT

被引:14
|
作者
Cui, Jie [1 ,2 ]
Wang, Fengqun [1 ,2 ]
Zhang, Qingyang [1 ,2 ]
Gu, Chengjie [3 ]
Zhong, Hong [1 ,2 ]
机构
[1] Anhui Univ, Inst Phys Sci & Informat Technol, Sch Comp Sci & Technol, Key Lab Intelligent Comp & Signal Proc,Minist Educ, Hefei 230039, Peoples R China
[2] Anhui Univ, Anhui Engn Lab IoT Secur Technol, Hefei 230039, Peoples R China
[3] New Grp H3C, Secur Res Inst, Hefei 230088, Peoples R China
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2023年 / 20卷 / 01期
基金
中国国家自然科学基金;
关键词
Industrial Internet of Things; Authentication; Smart devices; Security; Servers; Production; Real-time systems; Industrial Internet of Things (IIoT); batch authentication; edge computing; elliptic curve cryptography (ECC); hash chain; INTERNET; THINGS;
D O I
10.1109/TNSM.2022.3206378
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the industrial Internet of Things (IIoT) environment (e.g., a smart factory), smart devices with limited computing power can bring large amounts of privacy-sensitive data into insecure networks when they interact. If a network attacker intercepts and tampers with this data, it may cause chaos in production and even paralyze the entire IIoT system. Therefore, to ensure the regular operation of intelligent production, data receivers must authenticate the data before using them. However, existing message authentication schemes in the IIoT environment authenticate each message individually, which creates many redundant operations. Hence, to ensure data security among smart devices and reduce the computational overhead of data processing, we propose a batch authentication scheme based on edge computing in IIoT. Specifically, we design a lightweight batch authentication algorithm and use edge servers to assist smart devices in authenticating data, thus reducing the computational burden on smart devices and improving the efficiency of message authentication. The security analysis shows that the proposed scheme is secure in the random oracle model and meets the series of security requirements of the IIoT. In addition, we illustrate the efficiency of the scheme through experiments.
引用
收藏
页码:357 / 368
页数:12
相关论文
共 50 条
  • [21] BCAE: A Blockchain-Based Cross Domain Authentication Scheme for Edge Computing
    Zhang, Shiwen
    Yan, Ziwei
    Liang, Wei
    Li, Kuan-Ching
    Di Martino, Beniamino
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (13): : 24035 - 24048
  • [22] Efficient and Privacy-Preserving Authentication Protocol for Heterogeneous Systems in IIoT
    Xiong, Hu
    Wu, Yan
    Jin, Chuanjie
    Kumari, Saru
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (12): : 11713 - 11724
  • [23] A Secure Pairing-Free Certificateless Online/Offline Signcryption Scheme With Batch Verification for Edge Computing-Based VANETs
    Yang, Wenjie
    Cao, Peiwei
    Zhang, Futai
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2025, 74 (01) : 1570 - 1583
  • [24] An Efficient Signature Scheme Based on Mobile Edge Computing in the NDN-IoT Environment
    Huang, Haiping
    Wu, Yuhan
    Xiao, Fu
    Malekian, Reza
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2021, 8 (05) : 1108 - 1120
  • [25] TRUTH: Trust and Authentication Scheme in 5G-IIoT
    Soleymani, Seyed Ahmad
    Goudarzi, Shidrokh
    Anisi, Mohammad Hossein
    Cruickshank, Haitham
    Jindal, Anish
    Kama, Nazri
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) : 880 - 889
  • [26] A Redesigned Identity-Based Anonymous Authentication Scheme for Mobile-Edge Computing
    Jia, Xiaoying
    Luo, Min
    Choo, Kim-Kwang Raymond
    Li, Li
    He, Debiao
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12): : 10108 - 10120
  • [27] A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services
    Weng, Chi-Yao
    Li, Chun-Ta
    Chen, Chin-Ling
    Lee, Cheng-Chi
    Deng, Yong-Yuan
    IEEE ACCESS, 2021, 9 : 145522 - 145537
  • [28] IIoT Gateway for Edge Computing Applications
    Craciunescu, Mihai
    Chenaru, Oana
    Dobrescu, Radu
    Florea, Gheorghe
    Mocanu, Stefan
    SERVICE ORIENTED, HOLONIC AND MULTI-AGENT MANUFACTURING SYSTEMS FOR INDUSTRY OF THE FUTURE, 2020, 853 : 220 - 231
  • [29] A Novel Anonymous Authentication Scheme Based on Edge Computing in Internet of Vehicles
    Wang, Xiaoliang
    She, Xinhui
    Bai, Liang
    Qing, Yang
    Jiang, Frank
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 67 (03): : 3349 - 3361
  • [30] An efficient Key Agreement and Authentication Scheme (KAAS) with enhanced security control for IIoT systems
    Srikanth G.U.
    Geetha R.
    Prabhu S.
    International Journal of Information Technology, 2023, 15 (3) : 1221 - 1230