A secure lightweight mutual authentication scheme in Social Industrial IoT environment

被引:0
作者
Arij Ben Amor
Sarra Jebri
Mohamed Abid
Aref Meddeb
机构
[1] University of Gabes,IResCoMath, National Engineering School of Gabes
[2] University of Sousse,NOCCS Lab, National Engineering School of Sousse
来源
The Journal of Supercomputing | 2023年 / 79卷
关键词
Fog computing; Social IoT; Industrial Internet of Things (IIoT); Social profile; Mutual authentication; Key agreement;
D O I
暂无
中图分类号
学科分类号
摘要
The Social Industrial Internet of Things (SIIoT) is a new paradigm that integrates social networking features into the Industrial IoT (IIoT) environment to enforce efficient and effective service discovery and collaboration between smart IoT objects in a friendly and scalable way. Therefore, in such environment, the establishment of secure and trust communication scheme is a crucial need between peer IoT devices having similar social profiles. In addition, the limited resource-constrained IoT devices are unable to deal with huge computational overheads. To address these issues, we propose a novel solution offering secure fog-based Social Industrial IoT (Fog-SIIoT) scheme. Fog-SIIoT guarantees mutual authentication, anonymity and secure communication through a trust key agreement between social smart things. The proposed scheme is suitable for the social resource-constrained IIoT as it only uses hash function, bitwise XOR operation and symmetric cryptography. Compared to correlative schemes, our solution presents many advantages in terms of security aspects, efficiency, social awareness and reduced computation overheads. Besides, the security analysis indicates that our scheme can withstand many known attacks and we proved it with the help of the formal security analysis using the BAN logic and the formal security verification using AVISPA tool.
引用
收藏
页码:13578 / 13600
页数:22
相关论文
共 92 条
[1]  
Choo KKR(2018)A foggy research future: advances and future opportunities in fog computing research Futur Gener Comput Syst 78 677-679
[2]  
Lu R(2017)Challenges of connecting edge and cloud computing: a security and forensic perspective IEEE Cloud Comput 4 13-17
[3]  
Chen L(2017)From cloud to fog computing: a review and a conceptual live VM migration framework IEEE Access 5 8284-8300
[4]  
Yi X(2018)Deploying fog computing in industrial Internet of things and industry 4.0 IEEE Trans Ind Inform 14 4674-4682
[5]  
Esposito C(2019)Fog/edge computing-based IoT (FECIoT): architecture, applications, and research issues IEEE Internet Things J 6 4118-4149
[6]  
Castiglione A(2019)A lightweight authentication mechanism for M2M communications in industrial IoT environment IEEE Internet Things J 6 288-296
[7]  
Pop F(2018)A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of things IEEE Trans Ind Inform 14 3599-3609
[8]  
Choo KKR(2020)Blockchain-enabled secure energy trading with verifiable fairness in industrial internet of things IEEE Trans Ind Inf 16 6564-6574
[9]  
Osanaiye OA(2019)Towards secure industrial IoT: blockchain system with credit-based consensus mechanism IEEE Trans Ind Inf 15 3680-3689
[10]  
Chen S(2018)Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks IEEE Access 6 2241-2250