AP-CDE: Cost-Efficient Authentication Protocol for Cross-Domain Data Exchange in IIoT

被引:2
作者
Wang, Kai [1 ]
Sun, Kaisheng [1 ]
Dong, Jiankuo [1 ]
Sha, Letian [1 ]
Xiao, Fu [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210023, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2023年 / 17卷 / 03期
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Chebyshev chaotic maps; data exchange; formal security; Industrial Internet of Things (IIoT); lightweight protocol; ACCESS-CONTROL; INDUSTRIAL INTERNET; SECURE; SCHEME; THINGS;
D O I
10.1109/JSYST.2023.3269046
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Industrial Internet of Things (IIoT) is a new network paradigm emerging from the Internet of Things (IoT). It is primarily used in smart factories to promote smart manufacturing and increase productivity. Smart industrial devices collect real-time data from other domains (i.e., intelligent factories) that collaborate on the same transaction and transmit crucial data via a public internet channel. When applied to resource-constrained smart industrial communication devices, this process causes issues in communication security and privacy. Consequently, this study develops a cost-effective authentication protocol for cross-domain data exchange (AP-CDE) in IIoT. Anticollision hash functions, bitwise Exclusive-or operations, and Chebyshev polynomial operations are used in this protocol. AP-CDE security is achieved by using precise formal and nonmathematical (informal) analysis methods. The analysis results show that the developed protocol can withstand various well-known threatening attacks. Finally, a detailed comparative analysis between the AP-CDE and other interrelated protocols is used to verify that the AP-CDE outperforms other protocols in terms of security and functional characteristics, communication overheads, and computational costs.
引用
收藏
页码:3882 / 3893
页数:12
相关论文
共 39 条
  • [1] Provably Secure Escrow-Less Chebyshev Chaotic Map-Based Key Agreement Protocol for Vehicle to Grid Connections With Privacy Protection
    Abbasinezhad-Mood, Dariush
    Ostad-Sharif, Arezou
    Mazinani, Sayyed Majid
    Nikooghadam, Morteza
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (12) : 7287 - 7294
  • [2] Password-based authenticated key exchange in the three-party setting
    Abdalla, M.
    Fouque, P.-A.
    Pointcheval, D.
    [J]. IEE Proceedings: Information Security, 2006, 153 (01): : 27 - 39
  • [3] Comments on "Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0"
    Akram, Muhammad Arslan
    Mahmood, Khalid
    Kumari, Saru
    Xiong, Hu
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05) : 4676 - 4681
  • [4] Barker E., 2006, NAT I STANDARDS TECH
  • [5] Perfectly secure key distribution for dynamic conferences
    Blundo, C
    De Santis, A
    [J]. INFORMATION AND COMPUTATION, 1998, 146 (01) : 1 - 23
  • [6] Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337
  • [7] A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
    Chang, Chin-Chen
    Le, Hai-Duong
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) : 357 - 366
  • [8] Taxonomy and analysis of security protocols for Internet of Things
    Das, Ashok Kumar
    Zeadally, Sherali
    He, Debiao
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 : 110 - 125
  • [9] Towards Verifying SHA256 in OpenSSL with the Software Analysis Workbench
    Decker, Brett
    Winters, Benjamin
    Mercer, Eric
    [J]. NASA FORMAL METHODS (NFM 2021), 2021, 12673 : 72 - 78
  • [10] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208