CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things

被引:36
作者
Tanveer, Muhammad [1 ]
Badshah, Akhtar [2 ]
Khan, Abd Ullah [3 ]
Alasmary, Hisham [4 ]
Chaudhry, Shehzad Ashraf [5 ,6 ]
机构
[1] Univ Management & Technol, Dept Comp Sci, Lahore 54770, Pakistan
[2] Univ Malakand, Dept Software Engn, Dir Lower 18800, Pakistan
[3] Natl Univ Sci & Technol, Dept Comp Sci, Islamabad, Pakistan
[4] King Khalid Univ, Coll Comp Sci, Dept Comp Sci, Abha 61421, Saudi Arabia
[5] Abu Dhabi Univ, Coll Engn, Dept Comp Sci & Informat Technol, Abu Dhabi, U Arab Emirates
[6] Nisantasi Univ, Fac Engn & Architecture, Dept Software Engn, Istanbul, Turkiye
关键词
Privacy; Scyther; ASCON; Internet of Things; Encryption; Session key; Authentication; HEALTH-CARE-SYSTEM; PROTOCOL; SCHEME; MANAGEMENT; LIGHTWEIGHT; NETWORK;
D O I
10.1016/j.iot.2023.100902
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Industrial Internet of Things (IIoT) revolutionizes industrial production using smart devices (SMDs) deployed in IIoT environments. These SMDs collect and transmit information from target fields for analysis and can be controlled remotely. In emergency situations, real-time access to specific SMD information is crucial for prompt actions. However, ensuring secure and reliable communication between users and SMDs in untrusted channels is a significant challenge. Privacy concerns and the limitations of existing authentication frameworks further exacerbate this challenge, necessitating a lightweight cryptography-based authentication framework. This framework is essential to enable secure and reliable communication in the diverse IIoT environ-ment while addressing privacy leakage threats and the computational constraints of IoT devices. Recently, various lightweight cryptography-based authenticated encryption (AE) schemes have been proposed to enable encryption and decryption services for resource-constrained IIoT devices. ASCON, an efficient AE scheme, offers confidentiality, integrity, and authenticity in a single encryption and decryption operation, reducing the number of cryptographic operations required for authentication framework design. This paper presents CMAF-IIoT, a chaotic map and resource-efficient AE scheme (ASCON)-based authentication framework for IIoT, addressing the aforementioned challenges. CMAF-IIoT ensures reliable communication between SMDs and users. The framework begins with user-performed local authentication on their smart devices, followed by the establishment of a session key with the SMD after mutual authentication with the gateway. Using the session key, users securely access real-time information from SMDs deployed in the IIoT environment. The security of CMAF-IIoT is validated through formal and informal security analyses. Additionally, the efficiency of CMAF-IIoT is evaluated in terms of communication, computational, and storage costs. The results indicate that CMAF-IIoT requires [6.67% to 53.33%] low storage cost, [45.13% to 65.87%] low computational cost, and [16.46% to 83.29%] low communication cost compared to contrasted authentication frameworks. These findings highlight the viability of CMAF-IIoT for the IIoT environment, as it provides resource efficiency and enhanced security features.
引用
收藏
页数:18
相关论文
共 40 条
[1]   A secure remote user authentication scheme for 6LoWPAN-based Internet of Things [J].
Abbas, Ghulam ;
Tanveer, Muhammad ;
Abbas, Ziaul Haq ;
Waqas, Muhammad ;
Baker, Thar ;
Obe, Dhiya Al-Jumeily .
PLOS ONE, 2021, 16 (11)
[2]   General classification of the authenticated encryption schemes for the CAESAR competition [J].
Abed, Farzaneh ;
Forler, Christian ;
Lucks, Stefan .
COMPUTER SCIENCE REVIEW, 2016, 22 :13-26
[3]   Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles [J].
Ali, Zeeshan ;
Chaudhry, Shehzad Ashraf ;
Ramzan, Muhammad Sher ;
Al-Turjman, Fadi .
IEEE ACCESS, 2020, 8 :43711-43724
[4]   Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications [J].
Challa, Sravani ;
Wazid, Mohammad ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Reddy, Alavalapati Goutham ;
Yoon, Eun-Jun ;
Yoo, Kee-Young .
IEEE ACCESS, 2017, 5 :3028-3043
[5]   Security and Privacy in IoT: A Survey [J].
Chanal, Poornima M. ;
Kakkasageri, Mahabaleshwar S. .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 115 (02) :1667-1693
[6]   Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment [J].
Chatterjee, Santanu ;
Roy, Sandip ;
Das, Ashok Kumar ;
Chattopadhyay, Samiran ;
Kumar, Neeraj ;
Vasilakos, Athanasios V. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (05) :824-839
[7]  
Chen Y., 2018, Lightpriauth, J. Sens, V2018
[8]  
Chen Y., 2022, IEEE Internet Things J
[9]   Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment [J].
Das, Ashok Kumar ;
Wazid, Mohammad ;
Kumar, Neeraj ;
Vasilakos, Athanasios V. ;
Rodrigues, Joel J. P. C. .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (06) :4900-4913
[10]  
Dharminder D., 2022, IEEE Internet Things J., P1, DOI [10.1109/JIOT.2022.3213990, DOI 10.1109/JIOT.2022.3213990]