Efficient Batch Authentication Scheme Based on Edge Computing in IIoT

被引:14
作者
Cui, Jie [1 ,2 ]
Wang, Fengqun [1 ,2 ]
Zhang, Qingyang [1 ,2 ]
Gu, Chengjie [3 ]
Zhong, Hong [1 ,2 ]
机构
[1] Anhui Univ, Inst Phys Sci & Informat Technol, Sch Comp Sci & Technol, Key Lab Intelligent Comp & Signal Proc,Minist Educ, Hefei 230039, Peoples R China
[2] Anhui Univ, Anhui Engn Lab IoT Secur Technol, Hefei 230039, Peoples R China
[3] New Grp H3C, Secur Res Inst, Hefei 230088, Peoples R China
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2023年 / 20卷 / 01期
基金
中国国家自然科学基金;
关键词
Industrial Internet of Things; Authentication; Smart devices; Security; Servers; Production; Real-time systems; Industrial Internet of Things (IIoT); batch authentication; edge computing; elliptic curve cryptography (ECC); hash chain; INTERNET; THINGS;
D O I
10.1109/TNSM.2022.3206378
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the industrial Internet of Things (IIoT) environment (e.g., a smart factory), smart devices with limited computing power can bring large amounts of privacy-sensitive data into insecure networks when they interact. If a network attacker intercepts and tampers with this data, it may cause chaos in production and even paralyze the entire IIoT system. Therefore, to ensure the regular operation of intelligent production, data receivers must authenticate the data before using them. However, existing message authentication schemes in the IIoT environment authenticate each message individually, which creates many redundant operations. Hence, to ensure data security among smart devices and reduce the computational overhead of data processing, we propose a batch authentication scheme based on edge computing in IIoT. Specifically, we design a lightweight batch authentication algorithm and use edge servers to assist smart devices in authenticating data, thus reducing the computational burden on smart devices and improving the efficiency of message authentication. The security analysis shows that the proposed scheme is secure in the random oracle model and meets the series of security requirements of the IIoT. In addition, we illustrate the efficiency of the scheme through experiments.
引用
收藏
页码:357 / 368
页数:12
相关论文
共 50 条
  • [41] Design of an Efficient and Secure Authentication Scheme for Cloud-Fog-Device Framework Using Key Agreement and Management
    Hegde, Manjunath
    Rao, Rohini R.
    Bhat, Radhakrishna
    IEEE ACCESS, 2024, 12 : 78173 - 78192
  • [42] A Blockchain-Driven IIoT Traffic Classification Service for Edge Computing
    Qi, Heng
    Wang, Junxiao
    Li, Wenxin
    Wang, Yuxin
    Qiu, Tie
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (04) : 2124 - 2134
  • [43] SPTM-EC: A Security and Privacy-Preserving Task Management in Edge Computing for IIoT
    Hosen, A. S. M. Sanwar
    Sharma, Pradip Kumar
    Ra, In-Ho
    Cho, Gi Hwan
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) : 6330 - 6339
  • [44] Lightweight Secure Authentication Scheme to thwart Unauthorized Edge Datacenters in Fog Computing
    Premkumar, N.
    Kumar, B. Santhosh
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 139 (01) : 167 - 181
  • [45] An Efficient Authentication Scheme With Key Leakage-Resistance
    Hu, Yao
    Chen, Jinglong
    Tu, Bibo
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2025,
  • [46] GASE: A Lightweight Group Authentication Scheme With Key Agreement for Edge Computing Applications
    Nakkar, Mouna
    AlTawy, Riham
    Youssef, Amr
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (01) : 840 - 854
  • [47] SKAFS: Symmetric Key Authentication Protocol With Forward Secrecy for Edge Computing
    Seifelnasr, Mohamed
    Altawy, Riham
    Youssef, Amr
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (01) : 510 - 525
  • [48] An Enhanced Lightweight IoT-based Authentication Scheme in Cloud Computing Circumstances
    Martinez-Pelaez, Rafael
    Toral-Cruz, Homero
    Parra-Michel, Jorge R.
    Garcia, Vicente
    Mena, Luis J.
    Felix, Vanessa G.
    Ochoa-Brust, Alberto
    SENSORS, 2019, 19 (09)
  • [49] Efficient Revocable Anonymous Authentication Mechanism for Edge Intelligent Controllers
    Cao, Zhong
    Chen, Zhuo
    Shang, Wenli
    Zhu, Yongdong
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (12) : 10357 - 10367
  • [50] A Lightweight Mutual Authentication Scheme for Power Edge Computing system
    Chen, Yi
    Xu, Ai-dong
    Wen, Hong
    Jiang, Yi-xin
    Zhang, Teng-yue
    2019 INTERNATIONAL CONFERENCE ON ENERGY, POWER, ENVIRONMENT AND COMPUTER APPLICATION (ICEPECA 2019), 2019, 334 : 72 - 76