Online citations, reference lists, and bibliographies.
← Back to Search

Faster Authenticated Key Agreement With Perfect Forward Secrecy For Industrial Internet-of-Things

Zheng Yang, J. He, Y. Tian, J. Zhou
Published 2020 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Industrial Internet-of-Things (IIoT) is the basis of Industry 4.0, which extends Internet connectivity beyond traditional computing devices like computers and smartphones to the physical world for improving efficiency and accuracy while reducing the production cost. However, there are tremendous security threats to IIoT, such as IIoT device hijacking and data leaks. Therefore, a lightweight authenticated key agreement (AKA) protocol is commonly applied to establish a session key for securing the communication between IIoT devices. To protect the previous session keys from being compromised, perfect forward secrecy (PFS) has been one of the most important security properties of AKA. In this article, we present an efficient PFS-enabled AKA protocol for IIoT systems, which is developed based on a new dynamic authentication credential (DAC) framework, without using any public-key cryptographic primitives. It is worth noting that our protocol is also faster than the state-of-the-art DAC-based AKA protocols with PFS. Moreover, we give the formal security result of the proposed protocol in the random oracle model.
This paper references
Slammer worm crashed Ohio nuke plant net
K. Poulsen (2003)
10.1109/TII.2016.2604681
A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks
Yue Qiu (2016)
Trisis has the security world spooked, stumped and searching for answers
C. Bing (2018)
10.1109/TIFS.2015.2439964
A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards
Vanga Odelu (2015)
Miracl cryptographic library
(2018)
10.1177/1550147718756311
On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks
J. He (2018)
10.1007/s11042-017-5560-6
Signature-based three-factor authenticated key exchange for internet of things applications
Xiaoying Jia (2017)
10.1016/j.comnet.2016.01.006
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
R. Amin (2016)
10.1109/TWC.2015.2473165
A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
C. Chang (2016)
10.1049/IP-IFS:20055073
Password-Based Authenticated Key Exchange in the Three-Party Setting
M. Abdalla (2004)
10.1002/sec.948
Authenticated key exchange with synchronized state
Z. Yang (2014)
10.1145/3120459.3120471
Security challenges in IoT development: a software engineering perspective
Anh Nguyen-Duc (2017)
10.1109/MSECP.2003.1253573
Crossover: Online Pests Plaguing the Offline World
E. Levy (2003)
10.1109/TII.2018.2852491
Industrial Internet of Things: Challenges, Opportunities, and Directions
E. Sisinni (2018)
10.1002/sec.1573
Provably secure user authentication and key agreement scheme for wireless sensor networks
A. K. Das (2016)
10.1007/S11276-018-1704-5
AKAIoTs: authenticated key agreement for Internet of Things
Mutaz Elradi S. Saeed (2019)
10.1007/3-540-45539-6_11
Authenticated Key Exchange Secure against Dictionary Attacks
M. Bellare (2000)
10.1007/978-3-540-88313-5_9
CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud
Deholo Nali (2008)
10.1016/j.jnca.2017.07.001
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
X. Li (2018)
10.3390/s140610081
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Younsung Choi (2014)
10.1093/comjnl/bxw095
Simpler Generic Constructions for Strongly Secure One-round Key Exchange from Weaker Assumptions
Z. Yang (2017)
10.1109/TII.2017.2773666
A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things
X. Li (2018)
10.1109/CSFW.2001.930138
An efficient cryptographic protocol verifier based on prolog rules
B. Blanchet (2001)
10.1049/iet-ifs.2016.0320
SignORKE: improving pairing-based one-round key exchange without random oracles
Z. Yang (2017)
10.1145/2744769.2747942
Security and privacy challenges in industrial Internet of Things
A. Sadeghi (2015)
OPC UA online reference
10.1007/s12652-016-0345-8
A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
F. Wu (2017)
10.1007/s12083-015-0404-5
A new and secure authentication scheme for wireless sensor networks with formal proof
F. Wu (2017)
An untraceable temporalcredential-based two-factor authentication scheme using ECC for wireless sensor networks
J. Qi (2016)
10.1155/2018/7574238
A Lightweight Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: LightPriAuth
Yuwen Chen (2018)
10.1016/j.jnca.2012.05.010
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
K. Xue (2013)
10.1007/978-3-319-45477-1_6
Formal Analysis of Security Properties on the OPC-UA SCADA Protocol
Maxime Puys (2016)
10.1145/3303704
A Novel Authenticated Key Agreement Protocol With Dynamic Credential for WSNs
Z. Yang (2019)
10.1007/978-3-319-66402-6_23
Secure Authentication in the Grid: A Formal Analysis of DNP3: SAv5
C. Cremers (2017)
10.1016/j.future.2017.06.018
A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring
R. Ali (2018)
10.1109/ICC.2018.8422725
A Lightweight Security and Privacy-Enhancing Key Establishment for Internet of Things Applications
Abubakar Sadiq Sani (2018)
10.1007/s12083-014-0324-9
A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
A. K. Das (2016)
10.1145/225058.225084
Provably secure session key distribution: the three party case
M. Bellare (1995)
10.1109/JIOT.2017.2780232
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks
M. Wazid (2018)
TOSN), and designs codes and cryptography (DESI), etc. He has also served as Program Committee Co-Chair/members for ICICS
(2013)
10.1109/ACCESS.2017.2676119
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
S. Challa (2017)
10.1109/TII.2018.2832853
A Security Analysis Method for Industrial Internet of Things
H. Mouratidis (2018)
10.1007/S13369-019-03752-7
A Lightweight Authentication Scheme for Multi-gateway Wireless Sensor Networks Under IoT Conception
Lili Xu (2019)
10.1109/JIOT.2017.2787800
A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things
X. Li (2018)
10.1016/J.FUTURE.2019.06.020
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction
W. Li (2019)
10.1002/ett.3295
Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps
J. Li (2018)
Modbus/TCP security protocol specification
Modbus (2018)
10.1109/TII.2019.2902574
Fog Computing for 5G Tactile Industrial Internet of Things: QoE-Aware Resource Allocation Model
Mohammad Aazam (2019)
10.1109/ICCITECHNOLOGY.2013.6579545
Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol
Garrett Hayes (2013)
10.3390/s17122946
An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks
Chenyu Wang (2017)
Attackers deploy new ICS attack framework “triton“ and cause operational disruption to critical infrastructure
B. Johnson (2017)
W32. stuxnet dossier
N. Falliere (2011)



This paper is referenced by
Semantic Scholar Logo Some data provided by SemanticScholar