Online citations, reference lists, and bibliographies.
← Back to Search

Faster Authenticated Key Agreement With Perfect Forward Secrecy For Industrial Internet-of-Things

Zheng Yang, J. He, Y. Tian, J. Zhou
Published 2020 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Industrial Internet-of-Things (IIoT) is the basis of Industry 4.0, which extends Internet connectivity beyond traditional computing devices like computers and smartphones to the physical world for improving efficiency and accuracy while reducing the production cost. However, there are tremendous security threats to IIoT, such as IIoT device hijacking and data leaks. Therefore, a lightweight authenticated key agreement (AKA) protocol is commonly applied to establish a session key for securing the communication between IIoT devices. To protect the previous session keys from being compromised, perfect forward secrecy (PFS) has been one of the most important security properties of AKA. In this article, we present an efficient PFS-enabled AKA protocol for IIoT systems, which is developed based on a new dynamic authentication credential (DAC) framework, without using any public-key cryptographic primitives. It is worth noting that our protocol is also faster than the state-of-the-art DAC-based AKA protocols with PFS. Moreover, we give the formal security result of the proposed protocol in the random oracle model.
This paper references
Slammer worm crashed Ohio nuke plant net
K. Poulsen (2003)
A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks
Yue Qiu (2016)
Trisis has the security world spooked, stumped and searching for answers
C. Bing (2018)
A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards
Vanga Odelu (2015)
Miracl cryptographic library
On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks
J. He (2018)
Signature-based three-factor authenticated key exchange for internet of things applications
Xiaoying Jia (2017)
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
R. Amin (2016)
A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
C. Chang (2016)
Password-Based Authenticated Key Exchange in the Three-Party Setting
M. Abdalla (2004)
Authenticated key exchange with synchronized state
Z. Yang (2014)
Security challenges in IoT development: a software engineering perspective
Anh Nguyen-Duc (2017)
Crossover: Online Pests Plaguing the Offline World
E. Levy (2003)
Industrial Internet of Things: Challenges, Opportunities, and Directions
E. Sisinni (2018)
Provably secure user authentication and key agreement scheme for wireless sensor networks
A. K. Das (2016)
AKAIoTs: authenticated key agreement for Internet of Things
Mutaz Elradi S. Saeed (2019)
Authenticated Key Exchange Secure against Dictionary Attacks
M. Bellare (2000)
CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud
Deholo Nali (2008)
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
X. Li (2018)
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Younsung Choi (2014)
Simpler Generic Constructions for Strongly Secure One-round Key Exchange from Weaker Assumptions
Z. Yang (2017)
A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things
X. Li (2018)
An efficient cryptographic protocol verifier based on prolog rules
B. Blanchet (2001)
SignORKE: improving pairing-based one-round key exchange without random oracles
Z. Yang (2017)
Security and privacy challenges in industrial Internet of Things
A. Sadeghi (2015)
OPC UA online reference
A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
F. Wu (2017)
A new and secure authentication scheme for wireless sensor networks with formal proof
F. Wu (2017)
An untraceable temporalcredential-based two-factor authentication scheme using ECC for wireless sensor networks
J. Qi (2016)
A Lightweight Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: LightPriAuth
Yuwen Chen (2018)
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
K. Xue (2013)
Formal Analysis of Security Properties on the OPC-UA SCADA Protocol
Maxime Puys (2016)
A Novel Authenticated Key Agreement Protocol With Dynamic Credential for WSNs
Z. Yang (2019)
Secure Authentication in the Grid: A Formal Analysis of DNP3: SAv5
C. Cremers (2017)
A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring
R. Ali (2018)
A Lightweight Security and Privacy-Enhancing Key Establishment for Internet of Things Applications
Abubakar Sadiq Sani (2018)
A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
A. K. Das (2016)
Provably secure session key distribution: the three party case
M. Bellare (1995)
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks
M. Wazid (2018)
TOSN), and designs codes and cryptography (DESI), etc. He has also served as Program Committee Co-Chair/members for ICICS
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
S. Challa (2017)
A Security Analysis Method for Industrial Internet of Things
H. Mouratidis (2018)
A Lightweight Authentication Scheme for Multi-gateway Wireless Sensor Networks Under IoT Conception
Lili Xu (2019)
A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things
X. Li (2018)
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction
W. Li (2019)
Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps
J. Li (2018)
Modbus/TCP security protocol specification
Modbus (2018)
Fog Computing for 5G Tactile Industrial Internet of Things: QoE-Aware Resource Allocation Model
Mohammad Aazam (2019)
Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol
Garrett Hayes (2013)
An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks
Chenyu Wang (2017)
Attackers deploy new ICS attack framework “triton“ and cause operational disruption to critical infrastructure
B. Johnson (2017)
W32. stuxnet dossier
N. Falliere (2011)

This paper is referenced by
Semantic Scholar Logo Some data provided by SemanticScholar