AP-CDE: Cost-Efficient Authentication Protocol for Cross-Domain Data Exchange in IIoT

被引:2
作者
Wang, Kai [1 ]
Sun, Kaisheng [1 ]
Dong, Jiankuo [1 ]
Sha, Letian [1 ]
Xiao, Fu [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210023, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2023年 / 17卷 / 03期
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Chebyshev chaotic maps; data exchange; formal security; Industrial Internet of Things (IIoT); lightweight protocol; ACCESS-CONTROL; INDUSTRIAL INTERNET; SECURE; SCHEME; THINGS;
D O I
10.1109/JSYST.2023.3269046
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Industrial Internet of Things (IIoT) is a new network paradigm emerging from the Internet of Things (IoT). It is primarily used in smart factories to promote smart manufacturing and increase productivity. Smart industrial devices collect real-time data from other domains (i.e., intelligent factories) that collaborate on the same transaction and transmit crucial data via a public internet channel. When applied to resource-constrained smart industrial communication devices, this process causes issues in communication security and privacy. Consequently, this study develops a cost-effective authentication protocol for cross-domain data exchange (AP-CDE) in IIoT. Anticollision hash functions, bitwise Exclusive-or operations, and Chebyshev polynomial operations are used in this protocol. AP-CDE security is achieved by using precise formal and nonmathematical (informal) analysis methods. The analysis results show that the developed protocol can withstand various well-known threatening attacks. Finally, a detailed comparative analysis between the AP-CDE and other interrelated protocols is used to verify that the AP-CDE outperforms other protocols in terms of security and functional characteristics, communication overheads, and computational costs.
引用
收藏
页码:3882 / 3893
页数:12
相关论文
共 39 条
  • [21] Practical access control for sensor networks in the context of the Internet of Things
    Li, Fagen
    Han, Yanan
    Jin, Chunhua
    [J]. COMPUTER COMMUNICATIONS, 2016, 89-90 : 154 - 164
  • [22] A secure cross-domain authentication scheme with perfect forward security and complete anonymity in fog computing
    Lin, Yijian
    Wang, Xiaoming
    Gan, Qingqing
    Yao, Mengting
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63
  • [23] Certificate-Based Anonymous Device Access Control Scheme for IoT Environment
    Malani, Saurav
    Srinivas, Jangirala
    Das, Ashok Kumar
    Srinathan, Kannan
    Jo, Minho
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06): : 9762 - 9773
  • [24] Industrial Internet of Things and its Applications in Industry 4.0: State of The Art
    Malik, Praveen Kumar
    Sharma, Rohit
    Singh, Rajesh
    Gehlot, Anita
    Satapathy, Suresh Chandra
    Alnumay, Waleed S.
    Pelusi, Danilo
    Ghosh, Uttam
    Nayak, Janmenjoy
    [J]. COMPUTER COMMUNICATIONS, 2021, 166 : 125 - 139
  • [25] Examining smart-card security under the threat of power analysis attacks
    Messerges, TS
    Dabbish, EA
    Sloan, RH
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2002, 51 (05) : 541 - 552
  • [26] Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT
    Luo, Ming
    Luo, Yi
    Wan, Yuwei
    Wang, Ze
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [27] OpenSSL, Cryptography and SSL/TLS toolkit
  • [28] A Simple and Generic Construction of Authenticated Encryption with Associated Data
    Sarkar, Palash
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (04)
  • [29] Schneier B., 2007, Cryptography: Protocols, Algorithms, Source Code C
  • [30] Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT
    Shen, Meng
    Liu, Huisen
    Zhu, Liehuang
    Xu, Ke
    Yu, Hongbo
    Du, Xiaojiang
    Guizani, Mohsen
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2020, 38 (05) : 942 - 954