Skip to main content
Erschienen in: Wireless Networks 2/2021

02.01.2021

LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT

verfasst von: Hossein Abdi Nasib Far, Majid Bayat, Ashok Kumar Das, Mahdi Fotouhi, S. Morteza Pournaghi, M. A. Doostari

Erschienen in: Wireless Networks | Ausgabe 2/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays, wireless sensor networks (WSNs) are essential for monitoring and data collection in many industrial environments. Industrial environments are usually huge. The distances between the devices located in them can be vast; in this case, the Industrial Internet of Things (IIoT) leads to greater productivity and efficiency of industries. Furthermore, the sensor devices in IIoT have limited memory and constrained processing power, and using gateway nodes is inevitable to cover these vast areas and manage communications between industrial sensors. Security threats such as compromised devices, denial of service, and leakage of confidential information can incur hefty expenses and irreparable damage to industrial systems. Hence, in the IIoT hierarchical architecture, anonymous and mutual authentication between users, gateway nodes, and sensor nodes is essential to protect users and the system’s security and privacy. In this article, we propose a lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-Based IIoT (LAPTAS). In LAPTAS, registered users can use their security smartcard to communicate with sensors and access their data. Moreover, the proposed scheme supports sensor node dynamic registration, password and biometric change, and revocation phase. Additionally, we evaluate and verify our scheme’s security formally using the Real-or-Random model and informally with the automatic cryptographic Protocol Verifier tool(ProVerif). Finally, our scheme is simulated by the OPNET network simulator and compared with other similar schemes to ensure that the LAPTAS meets all security and performance requirements.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
14.
Zurück zum Zitat Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions on Industrial Informatics, 10(4), 2233–2243.CrossRef Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions on Industrial Informatics, 10(4), 2233–2243.CrossRef
18.
Zurück zum Zitat He, D., Gao, Y., Chan, S., Chen, C., & Bu, J. (2010). An enhanced two-factor user authentication scheme in wireless sensor networks. Ad-Hoc and Sensor Wireless Networks, 10(4), 361–371. He, D., Gao, Y., Chan, S., Chen, C., & Bu, J. (2010). An enhanced two-factor user authentication scheme in wireless sensor networks. Ad-Hoc and Sensor Wireless Networks, 10(4), 361–371.
21.
22.
Zurück zum Zitat Xue, K., Ma, C., Hong, P., & Ding, R. (2013). A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications, 36(1), 316–323.CrossRef Xue, K., Ma, C., Hong, P., & Ding, R. (2013). A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications, 36(1), 316–323.CrossRef
31.
Zurück zum Zitat Schwab, K. (2017). The fourth industrial revolution (First U.S. edition). Crown Business. Schwab, K. (2017). The fourth industrial revolution (First U.S. edition). Crown Business.
32.
Zurück zum Zitat Meng, Z., Wu, Z., Muvianto, C., & Gray, J. (2016). A data-oriented m2m messaging mechanism for industrial iot applications. IEEE Internet of Things Journal, 4(1), 236–246.CrossRef Meng, Z., Wu, Z., Muvianto, C., & Gray, J. (2016). A data-oriented m2m messaging mechanism for industrial iot applications. IEEE Internet of Things Journal, 4(1), 236–246.CrossRef
35.
Zurück zum Zitat Dolev, D., & Yao, A. (1983). On the security of public key protocols. IEEE Transactions on information theory, 29(2), 198–208.MathSciNetCrossRef Dolev, D., & Yao, A. (1983). On the security of public key protocols. IEEE Transactions on information theory, 29(2), 198–208.MathSciNetCrossRef
38.
Zurück zum Zitat Carper, T., & Hemmo, D. (2002). Smart card memory management system and method. US Patent 6,480,935 Carper, T., & Hemmo, D. (2002). Smart card memory management system and method. US Patent 6,480,935
39.
Zurück zum Zitat Hamann, E.M., & Kaisser, M. (2001). Storing data objects in a smart card memory. US Patent 6,296,191. Hamann, E.M., & Kaisser, M. (2001). Storing data objects in a smart card memory. US Patent 6,296,191.
43.
Zurück zum Zitat Wazid, M., Das, A. K., Kumar, N., Vasilakos, A. V., & Rodrigues, J. J. P. C. (2019). Design and analysis of secure lightweight remote user authentication and key agreement scheme in internet of drones deployment. IEEE Internet of Things Journal, 6(2), 3572–3584.CrossRef Wazid, M., Das, A. K., Kumar, N., Vasilakos, A. V., & Rodrigues, J. J. P. C. (2019). Design and analysis of secure lightweight remote user authentication and key agreement scheme in internet of drones deployment. IEEE Internet of Things Journal, 6(2), 3572–3584.CrossRef
44.
Zurück zum Zitat Odelu, V., Das, A. K., & Goswami, A. (2015). A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Transactions on Information Forensics and Security, 10(9), 1953–1966.CrossRef Odelu, V., Das, A. K., & Goswami, A. (2015). A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Transactions on Information Forensics and Security, 10(9), 1953–1966.CrossRef
48.
Zurück zum Zitat Daynes, L.P., & Czajkowski, G.J. (2007). Multi-level undo of main-memory and volatile resources. US Patent 7,234,076. Daynes, L.P., & Czajkowski, G.J. (2007). Multi-level undo of main-memory and volatile resources. US Patent 7,234,076.
51.
Zurück zum Zitat Blanchet, B. (2014). Automatic verification of security protocols in the symbolic model: The verifier proverif. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics) (pp. 54–87). Cham: Springer. Blanchet, B. (2014). Automatic verification of security protocols in the symbolic model: The verifier proverif. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics) (pp. 54–87). Cham: Springer.
52.
Zurück zum Zitat Cheval, V., & Blanchet, B. (2013). Proving more observational equivalences with proverif. in: International conference on principles of security and trust (pp. 226–246). Cham: Springer.MATH Cheval, V., & Blanchet, B. (2013). Proving more observational equivalences with proverif. in: International conference on principles of security and trust (pp. 226–246). Cham: Springer.MATH
59.
Zurück zum Zitat Zhu, C., Yang, O. W., Aweya, J., Ouellette, M., & Montuno, D. Y. (2002). A comparison of active queue management algorithms using the opnet modeler. IEEE Communications Magazine, 40(6), 158–167.CrossRef Zhu, C., Yang, O. W., Aweya, J., Ouellette, M., & Montuno, D. Y. (2002). A comparison of active queue management algorithms using the opnet modeler. IEEE Communications Magazine, 40(6), 158–167.CrossRef
60.
Zurück zum Zitat Cao, C., Zuo, Y., & Zhang, F. (2018). Research on comprehensive performance simulation of communication ip network based on opnet. In: 2018 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS), IEEE, pp 195–197. Cao, C., Zuo, Y., & Zhang, F. (2018). Research on comprehensive performance simulation of communication ip network based on opnet. In: 2018 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS), IEEE, pp 195–197.
61.
Zurück zum Zitat Salah, K., Calyam, P., & Buhari, M. (2008). Assessing readiness of ip networks to support desktop videoconferencing using opnet. Journal of Network and Computer Applications, 31(4), 921–943.CrossRef Salah, K., Calyam, P., & Buhari, M. (2008). Assessing readiness of ip networks to support desktop videoconferencing using opnet. Journal of Network and Computer Applications, 31(4), 921–943.CrossRef
Metadaten
Titel
LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT
verfasst von
Hossein Abdi Nasib Far
Majid Bayat
Ashok Kumar Das
Mahdi Fotouhi
S. Morteza Pournaghi
M. A. Doostari
Publikationsdatum
02.01.2021
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 2/2021
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-020-02523-9

Weitere Artikel der Ausgabe 2/2021

Wireless Networks 2/2021 Zur Ausgabe