Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0

被引:69
作者
Wang, Chenyu [1 ,2 ]
Wang, Ding [2 ,3 ,4 ]
Xu, Guoai [1 ]
He, Debiao [5 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyber Secur, Beijing 100876, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Nankai Univ, Coll Cyber Sci, Tianjin 300350, Peoples R China
[4] Nankai Univ, Tianjin Key Lab Network & Data Secur Technol, Tianjin 300350, Peoples R China
[5] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
基金
中国国家自然科学基金;
关键词
industry; 4; 0; wireless sensor networks; password authentication; forward secrecy; offline dictionary attack; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; WIRELESS; SECURE; LIGHTWEIGHT; NETWORKS; PROTOCOL; INTERNET;
D O I
10.1007/s11432-020-2975-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industry 4.0, which combines information technology, network and industrial production, is expected to have a tremendous impact on our daily lives. In such a complex and security-critical system with resource-constrained sensor nodes, the design of a secure user authentication scheme for preventing real-time data from unauthorized access is full of challenges, and the main crux lies in how to realize the important property of forward secrecy. Existing schemes either fail to achieve forward secrecy or achieve forward secrecy with high computation cost on sensor nodes. Besides, they often fail to conform to the development trend of industry 4.0 systems where a cloud center is necessary to help intelligent decision-making and alleviate computation and storage pressure. Therefore, in this paper, we propose an efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0, and formally prove its security in the random oracle model. Compared with previous schemes, it has three advantages: (1) all eleven state-of-the-art criteria are achieved; (2) its computation cost on sensor nodes is comparable to those insecure schemes that employ only symmetric cryptographic algorithms, and is superior to those that also use asymmetric cryptographic algorithms; (3) it takes the advantage of the computation and storage capabilities of the cloud center to achieve user anonymity and the resistance to offline dictionary attack without performing any asymmetric cryptographic algorithms on gateways. Our computation cost on gateways is the smallest among all state-of-the-art relevant schemes for comparison.
引用
收藏
页数:15
相关论文
共 37 条
  • [1] A robust and anonymous patient monitoring system using wireless medical sensor networks
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Khan, Muhammad Khurram
    Kumar, Neeraj
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 : 483 - 495
  • [2] Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
    Choi, Younsung
    Lee, Donghoon
    Kim, Jiye
    Jung, Jaewook
    Nam, Junghyun
    Won, Dongho
    [J]. SENSORS, 2014, 14 (06) : 10081 - 10106
  • [3] Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment
    Das, Ashok Kumar
    Wazid, Mohammad
    Kumar, Neeraj
    Khan, Muhammad Khurram
    Choo, Kim-Kwang Raymond
    Park, YoungHo
    [J]. IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2018, 22 (04) : 1310 - 1322
  • [4] A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
    Das, Ashok Kumar
    Sharma, Pranay
    Chatterjee, Santanu
    Sing, Jamuna Kanta
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (05) : 1646 - 1656
  • [5] Two-Factor User Authentication in Wireless Sensor Networks
    Das, Manik Lal
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) : 1086 - 1090
  • [6] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208
  • [7] An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks
    Fan, Rong
    He, Dao-jing
    Pan, Xue-zeng
    Ping, Ling-di
    [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2011, 12 (07): : 550 - 560
  • [8] Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0
    Garg, Sahil
    Kaur, Kuljeet
    Kaddoum, Georges
    Choo, Kim-Kwang Raymond
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05): : 4598 - 4606
  • [9] Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures
    He, Debiao
    Zeadally, Sherali
    Kumar, Neeraj
    Wu, Wei
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (09) : 2052 - 2064
  • [10] A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
    He, Debiao
    Kumar, Neeraj
    Chilamkurti, Naveen
    [J]. INFORMATION SCIENCES, 2015, 321 : 263 - 277