Efficient Anonymous Authentication Based on Physically Unclonable Function in Industrial Internet of Things

被引:26
作者
Zhang, Qingyang [1 ,2 ]
Wu, Jing [1 ,2 ]
Zhong, Hong [1 ,2 ]
He, Debiao [3 ,4 ]
Cui, Jie [1 ,2 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Hefei 230039, Peoples R China
[2] Anhui Univ, Anhui Engn Lab IoT Secur Technol, Hefei 230039, Peoples R China
[3] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[4] Matrix Elements Technol, Shanghai Key Lab Privacy Preserving Computat, Shanghai 201204, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Industrial Internet of Things; Servers; Production facilities; Protocols; Physical unclonable function; Costs; Anonymity; authentication; Industrial Internet of Things (IIoT); physically unclonable function (PUF); Merkle hash tree (MHT); GROUP SIGNATURE; MERKLE-TREE; PROTOCOL; SCHEME;
D O I
10.1109/TIFS.2022.3218432
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Owing to the open Industrial Internet of Things (IIoT) environment, information interacting between devices and servers is transmitted over the public channel, which may lead to privacy breach of the device identity. Furthermore, communication entities are not fully trusted, and they may maliciously disclose the device identity information. Therefore, the anonymity of devices must be guaranteed. In addition, IIoT is resource-constrained, and complex algorithms are unsuitable for the IIoT system. Several researchers have attempted to design anonymous authentication schemes. The one-authentication-multiple-access approach allows devices to access server resources multiple times after a single authentication, and its authentication overhead is independent of the number of accesses. This can reduce the computational burden for devices that need to access the server frequently. However, existing anonymous authentication schemes do not support multiple accesses after one authentication, and still suffer from privacy issues and low efficiency for devices that need frequent access to the server. To address these issues, we propose a new anonymous authentication scheme that uses group signature technology to ensure device anonymity and uses Merkle hash tree technology to achieve multiple accesses after one authentication, thereby greatly reducing the authentication overhead of IIoT devices. Then, we validate the security of the scheme using the random oracle model and the BAN logic. Finally, compared with other related schemes, the experimental results show that our proposed scheme is more efficient and practical for resource-constrained IIoTs than other schemes.
引用
收藏
页码:233 / 247
页数:15
相关论文
共 40 条
[1]  
Ateniese G, 2000, LECT NOTES COMPUT SC, V1880, P255
[2]   Short group signatures [J].
Boneh, D ;
Boyen, X ;
Shacham, H .
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 :41-55
[3]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
[4]   Foundations of Fully Dynamic Group Signatures [J].
Bootle, Jonathan ;
Cerulli, Andrea ;
Chaidos, Pyrros ;
Ghadafi, Essam ;
Groth, Jens .
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 :117-136
[5]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[6]  
CHAUM D, 1991, LECT NOTES COMPUT SC, V547, P257
[7]   Parallel Key-Insulated Multiuser Searchable Encryption for Industrial Internet of Things [J].
Cui, Jie ;
Lu, Jie ;
Zhong, Hong ;
Zhang, Qingyang ;
Gu, Chengjie ;
Liu, Lu .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (07) :4875-4883
[8]   Anonymous Message Authentication Scheme for Semitrusted Edge-Enabled IIoT [J].
Cui, Jie ;
Wang, Fengqun ;
Zhang, Qingyang ;
Xu, Yan ;
Zhong, Hong .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2021, 68 (12) :12921-12929
[9]   Integrity for an Event Notification Within the Industrial Internet of Things by Using Group Signatures [J].
Esposito, Christian ;
Castiglione, Aniello ;
Palmieri, Francesco ;
De Santis, Alfredo .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) :3669-3678
[10]   Cloud-based lightweight secure RFID mutual authentication protocol in IoT [J].
Fan, Kai ;
Luo, Qi ;
Zhang, Kuan ;
Yang, Yintang .
INFORMATION SCIENCES, 2020, 527 :329-340