A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things

被引:1
|
作者
Diksha Rangwani
Dipanwita Sadhukhan
Sangram Ray
Muhammad Khurram Khan
Mou Dasgupta
机构
[1] National Institute of Technology Sikkim Ravangla,Department of Computer Science and Engineering
[2] King Saud University,Center of Excellence in Information Assurance, College of Computer & Information Sciences
[3] National Institute of Technology,Department of Computer Application
[4] Raipur,undefined
来源
Peer-to-Peer Networking and Applications | 2021年 / 14卷
关键词
Industrial Internet of things (IIoT); Authentication; Privacy preservation; ProVerIf;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless sensor networks (WSNs) accomplish a key aspect in the Industrial Internet of Things (IIoT) that has turned out to be the most flourishing perception for computerizations in an industrial maneuver. IIoT environment is a significant application of the Internet of Things (IoT) that facilitate the professionals related to industries for remote supervision of factory, warehouses, etc. In this environment, the data must constantly be analyzed to take important real-time decisions. It makes remote confirmation most essential to secure the data transmission through insure channel so that alteration, interception, modifications of data cannot occur. As a result, there remains an immense requirement of remote user authentication protocol to restrict any illicit access to the data. In this scenario, to eradicate all the security attacks, it is aimed to design a robust provable-secure privacy-preserving three-factor authentication protocol for IIoT in this research. Our scheme is analyzed using both informal and formal security reviews using broadly known random oracle models, BAN logic as well as simulated using a well-accepted ProVerif simulation tool that confirms that the protocol is well-secured against all existing security threats. It is exhibited in the performance estimation that the proposed scheme is more efficient as well as lightweight than other existing schemes. To conclude it can be said that the proposed scheme is easy to be realized in the resource-constrained IIoT environment.
引用
收藏
页码:1548 / 1571
页数:23
相关论文
共 50 条
  • [41] An Efficient RLWE-Based Privacy-Preserving Authentication Scheme Based on Edge Computing in Industrial Internet of Things
    Huang, Yongfei
    Xu, Guangxia
    Song, Xiaoling
    Xu, Yuqing
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (05) : 2012 - 2026
  • [42] A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion
    Ding, Wenxiu
    Jing, Xuyang
    Yan, Zheng
    Yang, Laurence T.
    INFORMATION FUSION, 2019, 51 : 129 - 144
  • [43] An Efficient Privacy-preserving Authentication Protocol in VANETs
    Zhang, Jianhong
    Zhen, Weina
    Xu, Min
    2013 IEEE NINTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2013), 2013, : 272 - 277
  • [44] Flexible and Robust Privacy-Preserving Implicit Authentication
    Domingo-Ferrer, Josep
    Wu, Qianhong
    Blanco-Justicia, Alberto
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 : 18 - 34
  • [45] A privacy preserving four-factor authentication protocol for internet of medical things
    Guo, Ping
    Liang, Wenfeng
    Xu, Shuilong
    COMPUTERS & SECURITY, 2024, 137
  • [46] A Lightweight Privacy-Preserving Authentication Protocol for VANETs
    Li, Xiong
    Liu, Tian
    Obaidat, Mohammad S.
    Wu, Fan
    Vijayakumar, Pandi
    Kumar, Neeraj
    IEEE SYSTEMS JOURNAL, 2020, 14 (03): : 3547 - 3557
  • [47] Privacy-Preserving Channel Access for Internet of Things
    Banerjee, Debasmit
    Dong, Bo
    Taghizadeh, Mahmoud
    Biswas, Subir
    IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (05): : 430 - 445
  • [48] Privacy-Preserving Redactable Blockchain for Internet of Things
    Ren, Yanli
    Cai, Xianji
    Hu, Mingqi
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [50] A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments
    R. Shashidhara
    Sriramulu Bojjagani
    Anup Kumar Maurya
    Saru Kumari
    Hu Xiong
    Peer-to-Peer Networking and Applications, 2020, 13 : 1943 - 1966