Efficient Anonymous Authentication Based on Physically Unclonable Function in Industrial Internet of Things

被引:26
作者
Zhang, Qingyang [1 ,2 ]
Wu, Jing [1 ,2 ]
Zhong, Hong [1 ,2 ]
He, Debiao [3 ,4 ]
Cui, Jie [1 ,2 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Hefei 230039, Peoples R China
[2] Anhui Univ, Anhui Engn Lab IoT Secur Technol, Hefei 230039, Peoples R China
[3] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[4] Matrix Elements Technol, Shanghai Key Lab Privacy Preserving Computat, Shanghai 201204, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Industrial Internet of Things; Servers; Production facilities; Protocols; Physical unclonable function; Costs; Anonymity; authentication; Industrial Internet of Things (IIoT); physically unclonable function (PUF); Merkle hash tree (MHT); GROUP SIGNATURE; MERKLE-TREE; PROTOCOL; SCHEME;
D O I
10.1109/TIFS.2022.3218432
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Owing to the open Industrial Internet of Things (IIoT) environment, information interacting between devices and servers is transmitted over the public channel, which may lead to privacy breach of the device identity. Furthermore, communication entities are not fully trusted, and they may maliciously disclose the device identity information. Therefore, the anonymity of devices must be guaranteed. In addition, IIoT is resource-constrained, and complex algorithms are unsuitable for the IIoT system. Several researchers have attempted to design anonymous authentication schemes. The one-authentication-multiple-access approach allows devices to access server resources multiple times after a single authentication, and its authentication overhead is independent of the number of accesses. This can reduce the computational burden for devices that need to access the server frequently. However, existing anonymous authentication schemes do not support multiple accesses after one authentication, and still suffer from privacy issues and low efficiency for devices that need frequent access to the server. To address these issues, we propose a new anonymous authentication scheme that uses group signature technology to ensure device anonymity and uses Merkle hash tree technology to achieve multiple accesses after one authentication, thereby greatly reducing the authentication overhead of IIoT devices. Then, we validate the security of the scheme using the random oracle model and the BAN logic. Finally, compared with other related schemes, the experimental results show that our proposed scheme is more efficient and practical for resource-constrained IIoTs than other schemes.
引用
收藏
页码:233 / 247
页数:15
相关论文
共 40 条
[11]   Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks [J].
Gope, Prosanta ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Cheng, Yongqiang .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (09) :4957-4968
[12]   Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks [J].
He, Daojing ;
Bu, Jiajun ;
Chan, Sammy ;
Chen, Chun .
IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (03) :616-622
[13]   Privacy-Preserving Universal Authentication Protocol for Wireless Communications [J].
He, Daojing ;
Bu, Jiajun ;
Chan, Sammy ;
Chen, Chun ;
Yin, Mingjian .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (02) :431-436
[14]   An Anonymous Authentication System for Pay-As-You-Go Cloud Computing [J].
Huang, Jianye ;
Susilo, Willy ;
Guo, Fuchun ;
Wu, Ge ;
Zhao, Zhen ;
Huang, Qiong .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) :1280-1291
[15]   Short Dynamic Group Signature Scheme Supporting Controllable Linkability [J].
Hwang, Jung Yeon ;
Chen, Liqun ;
Cho, Hyun Sook ;
Nyang, DaeHun .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (06) :1109-1124
[16]   AAAS: An Anonymous Authentication Scheme Based on Group Signature in VANETs [J].
Jiang, Yanji ;
Ge, Shaocheng ;
Shen, Xueli .
IEEE ACCESS, 2020, 8 :98986-98998
[17]   IoT security: Review, blockchain solutions, and open challenges [J].
Khan, Minhaj Ahmad ;
Salah, Khaled .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 :395-411
[18]   An Online Data-Oriented Authentication based on Merkle Tree with Improved Reliability [J].
Koo, Dongyoung ;
Shin, Youngjoo ;
Yun, Joobeom ;
Hur, Junbeom .
2017 IEEE 24TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2017), 2017, :840-843
[19]   A Novel Authentication Scheme Supporting Multiple User Access for 5G and Beyond [J].
Lai, Chengzhe ;
Ma, Yixiao ;
Lu, Rongxing ;
Zhang, Yinghui ;
Zheng, Dong .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) :2970-2987
[20]   An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid [J].
Li, Hongwei ;
Lu, Rongxing ;
Zhou, Liang ;
Yang, Bo ;
Shen, Xuemin .
IEEE SYSTEMS JOURNAL, 2014, 8 (02) :655-663