A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things

被引:1
|
作者
Diksha Rangwani
Dipanwita Sadhukhan
Sangram Ray
Muhammad Khurram Khan
Mou Dasgupta
机构
[1] National Institute of Technology Sikkim Ravangla,Department of Computer Science and Engineering
[2] King Saud University,Center of Excellence in Information Assurance, College of Computer & Information Sciences
[3] National Institute of Technology,Department of Computer Application
[4] Raipur,undefined
来源
Peer-to-Peer Networking and Applications | 2021年 / 14卷
关键词
Industrial Internet of things (IIoT); Authentication; Privacy preservation; ProVerIf;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless sensor networks (WSNs) accomplish a key aspect in the Industrial Internet of Things (IIoT) that has turned out to be the most flourishing perception for computerizations in an industrial maneuver. IIoT environment is a significant application of the Internet of Things (IoT) that facilitate the professionals related to industries for remote supervision of factory, warehouses, etc. In this environment, the data must constantly be analyzed to take important real-time decisions. It makes remote confirmation most essential to secure the data transmission through insure channel so that alteration, interception, modifications of data cannot occur. As a result, there remains an immense requirement of remote user authentication protocol to restrict any illicit access to the data. In this scenario, to eradicate all the security attacks, it is aimed to design a robust provable-secure privacy-preserving three-factor authentication protocol for IIoT in this research. Our scheme is analyzed using both informal and formal security reviews using broadly known random oracle models, BAN logic as well as simulated using a well-accepted ProVerif simulation tool that confirms that the protocol is well-secured against all existing security threats. It is exhibited in the performance estimation that the proposed scheme is more efficient as well as lightweight than other existing schemes. To conclude it can be said that the proposed scheme is easy to be realized in the resource-constrained IIoT environment.
引用
收藏
页码:1548 / 1571
页数:23
相关论文
共 50 条
  • [1] A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things
    Rangwani, Diksha
    Sadhukhan, Dipanwita
    Ray, Sangram
    Khan, Muhammad Khurram
    Dasgupta, Mou
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (03) : 1548 - 1571
  • [2] A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things
    Li, Xiong
    Niu, Jianwei
    Bhuiyan, Md Zakirul Alam
    Wu, Fan
    Karuppiah, Marimuthu
    Kumari, Saru
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3599 - 3609
  • [3] Secure authentication and privacy-preserving blockchain for industrial internet of things
    Sharma, Prakash Chandra
    Mahmood, Md Rashid
    Raja, Hiral
    Yadav, Narendra Singh
    Gupta, Brij B.
    Arya, Varsha
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 108
  • [4] Secure and Privacy-Preserving RFID Authentication Scheme for Internet of Things Applications
    Das, Manik Lal
    Kumar, Pardeep
    Martin, Andrew
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 110 (01) : 339 - 353
  • [5] Secure and Privacy-Preserving RFID Authentication Scheme for Internet of Things Applications
    Manik Lal Das
    Pardeep Kumar
    Andrew Martin
    Wireless Personal Communications, 2020, 110 : 339 - 353
  • [6] A privacy-preserving code-based authentication protocol for Internet of Things
    Noureddine Chikouche
    Pierre-Louis Cayrel
    El Hadji Modou Mboup
    Brice Odilon Boidje
    The Journal of Supercomputing, 2019, 75 : 8231 - 8261
  • [7] A privacy-preserving code-based authentication protocol for Internet of Things
    Chikouche, Noureddine
    Cayrel, Pierre-Louis
    Mboup, El Hadji Modou
    Boidje, Brice Odilon
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (12): : 8231 - 8261
  • [8] Privacy-Preserving Delegable Authentication in the Internet of Things
    Gritti, Clementine
    Onen, Melek
    Molva, Refik
    SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 861 - 869
  • [9] Provable Privacy Preserving Authentication Solution for Internet of Things Environment
    Alzahrani, Bander A.
    Mahmood, Khalid
    IEEE ACCESS, 2021, 9 : 82857 - 82865
  • [10] Design of a provable secure lightweight privacy-preserving authentication protocol for autonomous vehicles in IoT systems
    Shariq, Mohd
    Ahmed, Ismail Taha
    Masud, Mehedi
    Berini, Aymen Dia Eddine
    Jamil, Norziana
    COMPUTER NETWORKS, 2025, 261