AI-Envisioned Blockchain-Enabled Signature-Based Key Management Scheme for Industrial Cyber-Physical Systems

被引:25
作者
Das, Ashok Kumar [1 ]
Bera, Basudeb [1 ]
Saha, Sourav [1 ]
Kumar, Neeraj [2 ,3 ,4 ]
You, Ilsun [5 ]
Chao, Han-Chieh [6 ]
机构
[1] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[2] Thapar Univ, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
[3] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 413, Taiwan
[4] Univ Petr & Energy Studies, Sch Comp Sci, Dehra Dun 248007, Uttarakhand, India
[5] Soonchunhyang Univ, Dept Informat Secur Engn, Asan 31538, South Korea
[6] Natl Dong Hwa Univ, Dept Elect Engn, Hualien 97401, Taiwan
基金
新加坡国家研究基金会;
关键词
Security; Servers; Smart devices; Blockchains; Logic gates; Cloud computing; Protocols; Authentication; blockchain; industrial cyber-physical systems (ICPSs); key management; security; ACCESS-CONTROL SCHEME; AUTHENTICATION SCHEMES; MUTUAL AUTHENTICATION; SECURITY; INTERNET;
D O I
10.1109/JIOT.2021.3109314
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article proposes a new blockchain-envisioned key management protocol for artificial intelligence (AI)-enabled industrial cyber-physical systems (ICPSs). The designed key management protocol enables key establishment among the Internet of Things (IoT)-enabled smart devices and their respective gateway nodes. The blocks partially constructed with secure data from smart devices by fog servers are provided to cloud servers that are responsible for completing blocks, and then mining those blocks for verification and addition in the blockchain. The most important application of the private blockchain construction is to apply AI algorithms for accurate predictions in Big data analytics. A detailed security analysis along with formal security verification show that the proposed scheme resists various potential attacks in an ICPS environment. Moreover, practical testbed experiments have been conducted using the multiprecision integer and rational arithmetic cryptographic library (MIRACL). Furthermore, a detailed comparative analysis shows superiority of the proposed scheme over recent relevant schemes. In addition, the practical implementation using the blockchain for the proposed scheme demonstrates the total computational costs when the number of transactions per block and also the number of blocks mined in the blockchain are varied.
引用
收藏
页码:6374 / 6388
页数:15
相关论文
共 59 条
  • [51] Shroff R, BLOCKCHAIN MEETS ART
  • [52] A novel remote user authentication and key agreement scheme for mobile client-server environment
    Sun, Haiyan
    Wen, Qiaoyan
    Zhang, Hua
    Jin, Zhengping
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (04): : 1365 - 1374
  • [53] Blockchain-Enabled Certificate-Based Authentication for Vehicle Accident Detection and Notification in Intelligent Transportation Systems
    Vangala, Anusha
    Bera, Basudeb
    Saha, Sourav
    Das, Ashok Kumar
    Kumar, Neeraj
    Park, Youngho
    [J]. IEEE SENSORS JOURNAL, 2021, 21 (14) : 15824 - 15838
  • [54] Vegh L., 2014, PROC 10 INT C COMMUN, P1
  • [55] Cyber-Physical Systems Security through Multi-Factor Authentication and Data Analytics
    Vegh, Laura
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2018, : 1369 - 1374
  • [56] Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
    Wang, Ding
    Li, Wenting
    Wang, Ping
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (09) : 4064 - 4075
  • [57] Targeted Online Password Guessing: An Underestimated Threat
    Wang, Ding
    Zhang, Zijian
    Wang, Ping
    Yan, Jeff
    Huang, Xinyi
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1242 - 1254
  • [58] Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
    Wang, Ding
    He, Debiao
    Wang, Ping
    Chu, Chao-Hsien
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (04) : 428 - 442
  • [59] Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment
    Wazid, Mohammad
    Das, Ashok Kumar
    Khan, Muhammad Khurram
    Al-Ghaiheb, Abdulatif Al-Dhawailie
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05): : 1634 - 1646