Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things
- 31 December 2019
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Industrial Informatics
- Vol. 16 (10), 6584-6596
- https://doi.org/10.1109/tii.2019.2963328
Abstract
Industrial Internet-of-Things (IIoT) is the basis of Industry 4.0, which extends Internet connectivity beyond traditional computing devices like computers and smartphones to the physical world for improving efficiency and accuracy while reducing the production cost. However, there are tremendous security threats to IIoT, such as IIoT device hijacking and data leaks. Therefore, a lightweight authenticated key agreement (AKA) protocol is commonly applied to establish a session key for securing the communication between IIoT devices. To protect the previous session keys from being compromised, perfect forward secrecy (PFS) has been one of the most important security properties of AKA. In this work, we present an efficient PFS-enabled AKA protocol for IIoT systems, which is developed based on a new dynamic authentication credential (DAC) framework, without using any public-key cryptographic primitives. It is worth noting that our protocol is also faster than the state-of-the-art DAC-based AKA protocols with PFS. Moreover, we give the formal security result of the proposed protocol in the random oracle model.Keywords
Funding Information
- A*Star (RIE2020)
- Advanced Manufacturing and Engineering Industry Alignment Fund – Pre Positioning (A19D6a0053)
- National Natural Science Foundation of China (61872051)
This publication has 45 references indexed in Scilit:
- Security and privacy challenges in industrial internet of thingsPublished by Association for Computing Machinery (ACM) ,2015
- A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart CardsIEEE Transactions on Information Forensics and Security, 2015
- A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networksPeer-to-Peer Networking and Applications, 2014
- Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves CryptographySensors, 2014
- Authenticated key exchange with synchronized stateSecurity and Communication Networks, 2014
- A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networksJournal of Network and Computer Applications, 2013
- CROO: A Universal Infrastructure and Protocol to Detect Identity FraudLecture Notes in Computer Science, 2008
- Password-Based Authenticated Key Exchange in the Three-Party SettingLecture Notes in Computer Science, 2005
- Crossover: online pests plaguing the off line worldIEEE Security & Privacy, 2003
- Authenticated Key Exchange Secure against Dictionary AttacksLecture Notes in Computer Science, 2000