Lightweight Digital Certificate Management and Efficacious Symmetric Cryptographic Mechanism over Industrial Internet of Things

被引:14
作者
Ahmed, Adel A. [1 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Jeddah 25729, Saudi Arabia
关键词
digital certificate; ECDH; IIoT; symmetric cryptographic; AUTHENTICATION SCHEME; ENCRYPTION; SECURE; ECC;
D O I
10.3390/s21082810
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The certificate authority, a trusted entity, issues digital certificates which contain identity credentials to help Industrial Internet of Things (IIoT) devices to represent their authenticity in a secure means. The crucial challenge of a digital certificate is to how design a secure certification authority management system that can counteract cyberattacks on the IIoT network. Moreover, current IIoT systems are not capable of implementing complex mathematical operations due to their constrained power capacity and processing capability. This paper proposes an effective, secure symmetric cryptographic mechanism (ESSC) based on the certificate authority management and Elliptic Curve Diffie Hellman (ECDH) to share a digital certificate among IIoT devices. The proposed certificate authority is used to securely exchange the shared secret key and to resolve the problem of spoofing attacks that may be used to impersonate the identity of the certificate authority. Also, ESSC uses the shared secret key to encrypt the sensitive data during transmission through the insecure communication channel. This research studies the adversary model for ESSC on IIoT and analyzes the cybersecurity of ESSC in the random oracle model. The findings that result from the experiments show that ESSC outperforms the baseline in terms of communication, computation, and storage costs. ESSC thus provides an adequate lightweight digital certificate management and cryptographic scheme which can help in the detection and prevention of several cyberattacks that can harm IIoT networks.
引用
收藏
页数:24
相关论文
共 37 条
[1]  
Abdullah J., 2017, J. Telecommun., Electron. Comput. Eng. (JTEC), V9, P99
[2]   A Lightweight Elliptic-Elgamal-Based Authentication Scheme for Secure Device-to-Device Communication [J].
Abro, Adeel ;
Deng, Zhongliang ;
Memon, Kamran Ali .
FUTURE INTERNET, 2019, 11 (05)
[3]   An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things [J].
Ahmed, Adel Ali ;
Ahmed, Waleed Ali .
SENSORS, 2019, 19 (17)
[4]  
Alizai Zahoor Ahmed, 2018, 2018 International Conference on Applied and Engineering Mathematics (ICAEM), P115, DOI 10.1109/ICAEM.2018.8536261
[5]  
[Anonymous], 2003, TECHNICAL REPORT NAT
[6]  
Bellare M, 2003, LECT NOTES COMPUT SC, V2656, P491
[7]  
Biryukov A., 2011, Encyclopedia of cryptography and security
[8]   A PUF-Based Secure Communication Protocol for IoT [J].
Chatterjee, Urbi ;
Chakraborty, Rajat Subhra ;
Mukhopadhyay, Debdeep .
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (03)
[9]   Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities [J].
Choo, Kim-Kwang Raymond ;
Gritzalis, Stefanos ;
Park, Jong Hyuk .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) :3567-3569
[10]   A Lightweight Continuous Authentication Protocol for the Internet of Things [J].
Chuang, Yo-Hsuan ;
Lo, Nai-Wei ;
Yang, Cheng-Ying ;
Tang, Ssu-Wei .
SENSORS, 2018, 18 (04)