A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things

被引:1
|
作者
Diksha Rangwani
Dipanwita Sadhukhan
Sangram Ray
Muhammad Khurram Khan
Mou Dasgupta
机构
[1] National Institute of Technology Sikkim Ravangla,Department of Computer Science and Engineering
[2] King Saud University,Center of Excellence in Information Assurance, College of Computer & Information Sciences
[3] National Institute of Technology,Department of Computer Application
[4] Raipur,undefined
来源
Peer-to-Peer Networking and Applications | 2021年 / 14卷
关键词
Industrial Internet of things (IIoT); Authentication; Privacy preservation; ProVerIf;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless sensor networks (WSNs) accomplish a key aspect in the Industrial Internet of Things (IIoT) that has turned out to be the most flourishing perception for computerizations in an industrial maneuver. IIoT environment is a significant application of the Internet of Things (IoT) that facilitate the professionals related to industries for remote supervision of factory, warehouses, etc. In this environment, the data must constantly be analyzed to take important real-time decisions. It makes remote confirmation most essential to secure the data transmission through insure channel so that alteration, interception, modifications of data cannot occur. As a result, there remains an immense requirement of remote user authentication protocol to restrict any illicit access to the data. In this scenario, to eradicate all the security attacks, it is aimed to design a robust provable-secure privacy-preserving three-factor authentication protocol for IIoT in this research. Our scheme is analyzed using both informal and formal security reviews using broadly known random oracle models, BAN logic as well as simulated using a well-accepted ProVerif simulation tool that confirms that the protocol is well-secured against all existing security threats. It is exhibited in the performance estimation that the proposed scheme is more efficient as well as lightweight than other existing schemes. To conclude it can be said that the proposed scheme is easy to be realized in the resource-constrained IIoT environment.
引用
收藏
页码:1548 / 1571
页数:23
相关论文
共 50 条
  • [31] Lightweight and efficient privacy-preserving mutual authentication scheme to secure Internet of Things-based smart healthcare
    Das, Sangjukta
    Namasudra, Suyel
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2023, 34 (11)
  • [32] A Secure and Privacy-Preserving Three-Factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things
    Xie, Qi
    Ding, Zixuan
    Hu, Bin
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021 (2021)
  • [33] Provable Secure Identity-Based Anonymous and Privacy-Preserving Inter-Vehicular Authentication Protocol for VANETS Using PUF
    Umar, Muhammad
    Islam, S. K. Hafizul
    Mahmood, Khalid
    Ahmed, Shafiq
    Ghaffar, Zahid
    Saleem, Muhammad Asad
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (11) : 12158 - 12167
  • [34] Physically secure and privacy-preserving blockchain enabled authentication scheme for internet of drones
    Subramani, Jegadeesan
    Maria, Azees
    Rajasekaran, Arun Sekar
    Lloret, Jaime
    SECURITY AND PRIVACY, 2024, 7 (03)
  • [35] Blockchain Enabled Anonymous Privacy-Preserving Authentication Scheme for Internet of Health Things
    Rajasekaran, Arun Sekar
    Maria, Azees
    Rajagopal, Maheswar
    Lorincz, Josip
    SENSORS, 2023, 23 (01)
  • [36] A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things
    Li, Xiong
    Peng, Jieyao
    Niu, Jianwei
    Wu, Fan
    Liao, Junguo
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (03): : 1606 - 1615
  • [37] A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city
    Xie, Qi
    Li, Keheng
    Tan, Xiao
    Han, Lidong
    Tang, Wen
    Hu, Bin
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
  • [38] A privacy-preserving authentication protocol with secure handovers for the LTE/LTE-A networks
    Singh, Garima
    Shrimankar, Deepti
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2018, 43 (08):
  • [39] A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city
    Qi Xie
    Keheng Li
    Xiao Tan
    Lidong Han
    Wen Tang
    Bin Hu
    EURASIP Journal on Wireless Communications and Networking, 2021
  • [40] A privacy-preserving authentication protocol with secure handovers for the LTE/LTE-A networks
    Garima Singh
    Deepti Shrimankar
    Sādhanā, 2018, 43