SAKE*: A Symmetric Authenticated Key Exchange Protocol With Perfect Forward Secrecy for Industrial Internet of Things

被引:23
作者
Fan, Qing [1 ,2 ]
Chen, Jianhua [1 ,2 ]
Shojafar, Mohammad [3 ]
Kumari, Saru [4 ]
He, Debiao [5 ,6 ,7 ]
机构
[1] Wuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin 541004, Peoples R China
[3] Univ Surrey, Inst Commun Syst ICS, 5GIC & 6GIC, Guildford GU27XH, Surrey, England
[4] Chaudhary Charan Singh Univ, Dept Math, Meerut 250001, Uttar Pradesh, India
[5] Qilu Univ Technol, Shandong Prov Key Lab Comp Networks, Shandong Acad Sci, Jinan 250316, Peoples R China
[6] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[7] Shanghai Key Lab Privacy Preserving Comp Matrix E, Shanghai 430072, Peoples R China
基金
中国国家自然科学基金;
关键词
Protocols; Security; Authentication; Industrial Internet of Things; Informatics; Synchronization; Computational modeling; Authentication and key exchange (AKE); Industry; 4; 0; perfect forward secrecy (PFS); symmetric key; MUTUAL AUTHENTICATION; SECURE;
D O I
10.1109/TII.2022.3145584
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security in the Industrial Internet of Things (IIoT) is vital as there are some cases where IIoT devices collect sensory information for crucial social production and life. Thus, designing secure and efficient communication channels is always a research hotspot. However, end devices have memory, computation, and power-supplying capacities limitations. Moreover, perfect forward secrecy (PFS), which means that long-term key exposure still discloses previous session keys, is a critical security property for authentication and key exchange (AKE). This article proposes an AKE protocol named SAKE* for the IIoT environment, where two types of keys (i.e., a master key and an evolution key) guarantee PFS. In addition, the SAKE* protocol merely uses concatenation, XOR, and hash-function operations to achieve lightweight authentication, key exchange, and message integrity. We also compare the SAKE* protocol with seven current and IoT-related authentication protocols regarding security properties and performance. Comparison results indicate that the SAKE* protocol consumes the least computation resource and third-least communication cost among eight AKE protocols while equipping 12 security properties.
引用
收藏
页码:6424 / 6434
页数:11
相关论文
共 30 条
[1]   Deep-IFS: Intrusion Detection Approach for Industrial Internet of Things Traffic in Fog Environment [J].
Abdel-Basset, Mohamed ;
Chang, Victor ;
Hawash, Hossam ;
Chakrabortty, Ripon K. ;
Ryan, Michael .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (11) :7704-7715
[2]   TrustE-VC: Trustworthy Evaluation Framework for Industrial Connected Vehicles in the Cloud [J].
Aladwan, Mohammad N. ;
Awaysheh, Feras M. ;
Alawadi, Sadi ;
Alazab, Mamoun ;
Pena, Tomas F. ;
Cabaleiro, Jose C. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (09) :6203-6213
[3]   LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment [J].
Alsahlani, Ahmed Yaser Fahad ;
Popa, Alexandru .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 192
[4]   Low-cost Security for Next-generation IoT Networks [J].
Anagnostopoulos, Nikolaos Athanasios ;
Ahmad, Saad ;
Arul, Tolga ;
Steinmetzer, Daniel ;
Hollick, Matthias ;
Katzenbeisser, Stefan .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2020, 20 (03)
[5]   Symmetric-Key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy [J].
Avoine, Gildas ;
Canard, Sebastien ;
Ferreira, Loic .
TOPICS IN CRYPTOLOGY, CT-RSA 2020, 2020, 12006 :199-224
[6]   IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography [J].
Avoine, Gildas ;
Canard, Sebastien ;
Ferreira, Loic .
COMPUTER SECURITY - ESORICS 2019, PT II, 2019, 11736 :463-483
[7]  
Bellare M., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P1
[8]  
Bellare M., 1994, P ANN INT CRYPT C, P232, DOI DOI 10.1007/3-540-48329-2_21
[9]   Safely Exporting Keys from Secure Channels On the Security of EAP-TLS and TLS Key Exporters [J].
Brzuska, Christina ;
Jacobsen, Hakon ;
Stebila, Douglas .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I, 2016, 9665 :670-698
[10]   Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment [J].
Chaudhry, Shehzad Ashraf ;
Irshad, Azeem ;
Yahya, Khalid ;
Kumar, Neeraj ;
Alazab, Mamoun ;
Bin Zikria, Yousaf .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2021, 21 (03)